choose-halcyon.txt 1.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940
  1. ---
  2. title: "Choosing an Exploit Chain"
  3. ---
  4. {% include toc title="Table of Contents" %}
  5. ## Section I - Overview of Exploits
  6. Your device is compatible with two exploit chains - E-Halcyon and traditional WP-disabled unenrollment. Read below for more information to choose between the exploits.
  7. + E-Halcyon
  8. + Pros
  9. + Can be booted temporarily or installed to the drive in semi-tethered mode
  10. + Provides a fully unenrolled environment on v107
  11. + "Just works" exploit, quick and easy setup
  12. + Cons
  13. + Requires a USB drive at every boot to startup, will display "ChromeOS is missing or damaged" if E-Halcyon is installed in semi-tethered mode
  14. + Won't "phone home" to GAC - you'll have to recover every couple of days for device information to update it if that's a concern for you
  15. + User data isn't saved between reboots due to cryptohome issues
  16. + Requires a Linux system to build
  17. + WP-disabled Unenrollment + fakemurk (murkmod)
  18. + Pros
  19. + Spoofs enrollment, will update GAC data without sending devmode status
  20. + Powerful exploit - provides utilities, full Crouton and Chromebrew
  21. + Semi-unenrolled environment on v105
  22. + Policy modification via Pollen, devpolicy modification via Lilac
  23. + Cons
  24. + Requires disassembly of Chromebook to disable firmware write-protect
  25. + Not noob-friendly, requires basic knowledge of using a terminal and a Linux system to build
  26. ## Section II - Choosing Next Steps
  27. Chosen an exploit chain? Great! Select a next step below.
  28. If you want to boot E-Halcyon or install it in semi-tethered mode, continue to [SH1mmer Unenrollment](sh1mmer)
  29. {: .notice--success}
  30. Or, if you want to disable WP and unenroll normally, continue to [Identifying Firmware WP](identify-wp)
  31. {: .notice--success}