Hacking a Knockoff Google Chromecast - Firmware Extraction

Поделиться
HTML-код
  • Опубликовано: 3 фев 2025

Комментарии • 252

  • @Mr._Mythical
    @Mr._Mythical 6 месяцев назад +43

    I wish these videos were longer, i would love to sit here and listen for hours to you rambling about the innerworkings of a device nobody has ever heard of

    • @g3r1-hp18
      @g3r1-hp18 28 дней назад

      try bird watching... DUDE... he just took of the f chip & blabla ! the are a lot of videos of this individual taking appart chips and whatever... then going in ssh looking at bootloader. SO ? sorry to be rude but that is all

  • @doubled8511
    @doubled8511 6 месяцев назад +175

    I love your videos man but they are just too damn short! I would happily sit here listening for a few hours whilst you ramble on figuring out how to extract the firmware.

    • @kennwood
      @kennwood 6 месяцев назад +5

      Haha I was just thinking the same thing

    • @PILATESDILEMMA
      @PILATESDILEMMA 5 месяцев назад

      Short? Is 25 minutes, a whole episode

    • @peckservers
      @peckservers 5 месяцев назад

      This!

    • @OfflineSetup
      @OfflineSetup 4 месяца назад

      I disagree he could easily cut it down to 5 mins and that includes the intro video.

    • @Bill_Bacon
      @Bill_Bacon 3 месяца назад

      Lullaby.

  • @MostlyPosative-nj5ex
    @MostlyPosative-nj5ex 25 дней назад +2

    Here’s another example of me wishing you’d number your videos. I’d like to see the next video but it isn’t on my list and I have to go search for it. I’m unsure if I’ll be successful. Excellent work btw, I like how detailed you are. I’m a newbie at this hobby and details are important so I can follow along easier.

  • @dieSpinnt
    @dieSpinnt 6 месяцев назад +23

    Great work and thanks for sharing, Matt:)
    Side-note, Tip, Womansplaining: Calipers 4TheWin! So you can measure the dimensions of the package. Works when soldered in and after some time you memorize the dimensions of TSSOP/SSOP/SOP/etc anyways. "To measure is to know!" And as a poor-(wo)men's-alternative: Print out a sheet with the whole zoo of electronics packages in the scale of 1:1

    • @KallePihlajasaari
      @KallePihlajasaari 6 месяцев назад +2

      Do you have a link to a sheet that you can link to for us other newbies?

    • @unh0lyav3ng3r8
      @unh0lyav3ng3r8 6 месяцев назад +1

      @@KallePihlajasaari i got an actual ruler with different package sizes on it..

  • @tweebs1
    @tweebs1 6 месяцев назад +7

    I really enjoy seeing how you methodically figure out how things tic and then bypass the security like its not even there. Firmware should be open, so we may use hardware as we see fit.

  • @martontichi8611
    @martontichi8611 6 месяцев назад +42

    binwalker said on the bottom that there's LZMA compressed data. Uncompressed size is 7M! probably squashfs!

    • @dazealex
      @dazealex 6 месяцев назад +5

      Also saw in the string something about unzip length.

  • @sqeekykleen49
    @sqeekykleen49 17 дней назад

    This style of yt is getting smaller, but in your advantage, it makes you shine. I love the direct, no bullshit music, graphics, and sponsoring of services that I won't do...
    Now if you did os system explanations, some frp lock removal.... some wifi router config.... no hurry, you haven't posted anything i find boring....

  • @M0UAW_IO83
    @M0UAW_IO83 6 месяцев назад +72

    16:58, there's reference to SC16550UART so there's good possibility of a UART output somewhere on that board for the bootloader

    • @bnister
      @bnister 6 месяцев назад +6

      Yep indeed, it's pin 99 on the SoC muxed to UART2_TX quite early on. It's supposed to be pulled up externally + there are some suspicious test points at the other side, but, generally speaking, manufacturers rarely care enough to break this one out in any convenient way

    • @qwertykeyboard5901
      @qwertykeyboard5901 6 месяцев назад

      Might be on the usb port. Sometimes they do that.

  • @TheWarhoop
    @TheWarhoop 6 месяцев назад +12

    Watching SMD's getting soldered onto PCB's is so satisfying... don't judge, I'm just saying what everyone's thinking.
    BTW, @Matt Brown, I switched to those little foam tipped eye makeup brushes which really elevated my flux clean up game over the Q tips, give 'em shot.

    • @mattbrwn
      @mattbrwn  6 месяцев назад +9

      I'll have to try that. Getting those Qtip hairs everywhere is annoying

  • @sjoer
    @sjoer 6 месяцев назад +18

    @17:23 it clearly says HDCP :D
    "HDCP stands for High-bandwidth Digital Content Protection. The purpose of HDCP is to protect digital copyrighted content as it travels from a device to your TV, usually through an HDMI, DVI or DisplayPort connection."
    You might be able to interface that programmer with flashrom, I'm not sure if it is but it should be possible to implement!
    I own a "Willem EPROM Programmer", it also supports SPI flash memory like these but these days I generally use a very cheap ch341a_spi USB device.

  • @jamesdim
    @jamesdim 6 месяцев назад +7

    My new favorite tech channel! Can't wait for the next hack adventure!

  • @Icemourne_
    @Icemourne_ 6 месяцев назад +107

    14:47 At the bottom it says LZMA compressed data

    • @4megii
      @4megii 6 месяцев назад +42

      Glad I'm not the only one to see this.
      Rootfs is probably compressed within LZMA and then uncompressed and mounted via the bootloader.

    • @RetroDelete
      @RetroDelete 6 месяцев назад

      I was just about to comment this, seems like it will be fairly easy to get access to the rootfs. +1

    • @monad_tcp
      @monad_tcp 6 месяцев назад +3

      cliffhanger !

    • @guiorgy
      @guiorgy 6 месяцев назад +1

      Towards the end of the video I could swear I had seen "lzma" somewhere, went back to strings and watched closely while pausing, thought I was going crazy 😂

    • @pete3897
      @pete3897 6 месяцев назад

      It's only 8MB though - the 980MB partition a couple above it will be the interesting one I would think...

  •  6 месяцев назад +23

    There's seem to be a compressed LZMA region, i'm pretty sure it's what you seen as high entropy, i'd bet it's the compressed rootfs mounted by the bootloader. Many times the MAC address is the one injected for the Wifi, as those modules don't have any hardcoded,
    Really interested to see your deep dive analysis. I'll join your discord, hopefully i can find the dump and analyze it myself also. I'd buy one of these if these if there's the possibility of a custom Firmware.

    • @4megii
      @4megii 6 месяцев назад +3

      I think you're spot on about LZMA being the rootfs and that it's uncompressed and then mounted by the bootloader.

    • @allwitchesdance
      @allwitchesdance 6 месяцев назад +6

      I bet it's going to be a kernel with the built in rootfs. No reason for these little gadgets to pivot root to a real file system

    • @309electronics5
      @309electronics5 6 месяцев назад

      ​@@allwitchesdancei had a miracast device that had a full rootfs and a kernel. It even had a recovery kernel. Mine used a Actions semiconductor SOC

    • @bnister
      @bnister 6 месяцев назад

      Yeah a custom one is possible, but I bet you won't like the only FreeRTOS-based SDK available

  • @ChrisMIA
    @ChrisMIA 6 месяцев назад +2

    great stuff bro! been so much into software have been slacking on the hardware firmware side of things, good to have this under my belt especially with todays supply chain being chip tainted

  • @meowyahh
    @meowyahh 6 месяцев назад +3

    Really good work, youtube's algorithm brought me here!

    • @mikehensley78
      @mikehensley78 6 месяцев назад +1

      same. a few weeks ago a Matt Brown video was in my recommended vids. i been subbed/watching ever since.

  • @compucar03
    @compucar03 6 месяцев назад +1

    I really want to see the next one! Disagree with some of the comments about your video being too short. It is just long enough so that I watch the whole thing and it leave me wanting next weeks episode! It is too short but that’s a good thing, in a way.

  • @tal1296
    @tal1296 6 месяцев назад +6

    Love your videos,I saw in strings HDCP which is hdmi copyright protection

    • @billf.2960
      @billf.2960 Месяц назад

      is that the program freezing the video on my computer when i open my OBS.. I was doing two different things.. but noticed this freeze.. and that it stopped if the obs was entirely exited and i had to refresh..

  • @JerryThings
    @JerryThings 6 месяцев назад

    I love this kind of videos where you showcase your adventure! Hope to see some in depth analysis in the future regarding the fw :D ty Matt

  • @XenoWiz
    @XenoWiz 4 месяца назад

    Ive been loving those tuts thanks its hard to get info like this in a video

  • @functiontek
    @functiontek 6 месяцев назад +6

    Don't know if someone already mentioned it, but I would bet that key you saw mentioned at the start is unrelated to the encryption. It has "HDCP" in it, which would make more sense to be HDMI Content Protection instead.

  • @antivaxxtoaster8919
    @antivaxxtoaster8919 6 месяцев назад +5

    Another banger as per usual

    • @Fatpumpumlovah2
      @Fatpumpumlovah2 6 месяцев назад

      Really? What did you learn? Nothing but more propraganda, every device you own is made by chinese/taiwanese companies.
      America makes nothing and tbis guy has no clue

  • @aldythsatya601
    @aldythsatya601 6 месяцев назад

    Glad to see this video, I don't understand the RUclips algorithm but videos like this don't show up when I search for them, but they magically appear on the homepage 🗿. And I have 4 devices like that that can't connect even though they have been reset

  • @samuraidriver4x4
    @samuraidriver4x4 6 месяцев назад +3

    The silkscreen of footprint on the board is a bit akward due to it being a fairly universal footprint.
    I do agree with you about the lead free solder, its definitely leaded solder seeing how easy it melted.
    No issues with using leaded solder in in China.

  • @rbmwiv
    @rbmwiv 6 месяцев назад

    Great video I just subscribed. I really enjoyed the one shot approach. Nice job. I am fixing to check out the second part!

  • @saad1983
    @saad1983 6 месяцев назад +1

    @Matt Brown good sir. you are on fire lately. another awesome video.

  • @qweriop
    @qweriop 6 месяцев назад +1

    Thank you youtube for showing me this channel! I love this kind of electronics hacking!

  • @SailAway33
    @SailAway33 6 месяцев назад +1

    Thanks Matt for your great video. I love to see how you can pull these out and get the information from it.

  • @adamkavala
    @adamkavala 6 месяцев назад

    Good job, looking foward to see more progress.

  • @fronbasal
    @fronbasal 6 месяцев назад

    Matt this was absolutely fantastic. Thanks for sharing!

  • @riccardopolelli1825
    @riccardopolelli1825 6 месяцев назад +1

    Cannot wait for part two

  • @paerrin1
    @paerrin1 6 месяцев назад +1

    Another great video! Keep them coming!

  • @Z-Ack
    @Z-Ack 6 месяцев назад +21

    I like how you spend way too much time going over all the laymen stuff like how to solder then jump through all the coding log processes and writing…lol

  • @wasabinow
    @wasabinow 6 месяцев назад +1

    Cool stuff! Thank you for sharing your electronic adventures!

  • @mogwopjr
    @mogwopjr 5 месяцев назад

    I like that D+ and D- are easy to trace out. Thanks for showing your process, I just got Xgpro working in anticipation for my T48 to show up tomorrow

  • @pamelax64
    @pamelax64 6 месяцев назад

    Let's wait for the next video about it,interested!

  • @raraujo4951
    @raraujo4951 6 месяцев назад +1

    Great video Matt,!!!

  • @n2cthe1
    @n2cthe1 6 месяцев назад

    love your videos, i also think there too short... i enjoy complete and in-depth look into IoT

  • @Dusty1778
    @Dusty1778 6 месяцев назад

    It is like reading and flashing a motherboard BIOS chip, I did it many times, but after this, I didn't understand anything anymore, but this is really cool.

  • @UndeadAlex
    @UndeadAlex 6 месяцев назад +1

    Loved this man awesome work!

  • @poweron3654
    @poweron3654 6 месяцев назад +2

    17:18, NCRCHDCPKey refers to HDCP, or high-bandwidth digital content protection, it is not an encryption key for the firmware

    • @OsX86H3AvY
      @OsX86H3AvY 5 месяцев назад +1

      and CRC is just cyclic redundancy check used all over to ensure data integrity I believe....so baciasll the string after that is just the HDCP key needed to get around content protection - I mean not get around it but actually use it properly

  • @bnister
    @bnister 6 месяцев назад +5

    You've got a fairly standard ALi Tech sat receiver dump :-) These run off a proprietary TDS2 RTOS. The HCSEMI clone chips have a FreeRTOS SDK available, but it's not as stable tbh

    • @revancedsubsfuckgimp
      @revancedsubsfuckgimp 6 месяцев назад

      And here I was wondering why the NCRC string seemed so familiar.... likely MIPS based as well

  • @MystJi
    @MystJi 6 месяцев назад +1

    I think I ventured into the fun side of RUclips

  • @richiebricker
    @richiebricker 6 месяцев назад

    very cool stuff. I look forward to learning from ya

  • @davidezequielborges392
    @davidezequielborges392 6 месяцев назад +1

    to clean stuff you can use an old toothbrush instead of qtips so it doesnt left off any fibers, at least to remove the most of flux witout much hussle.

  • @quetzalcoatl-pl
    @quetzalcoatl-pl 6 месяцев назад +5

    16:20 'anonymous' and '88888888' sounds like a default user-password pair, 8x 8 being the password, IIRC the '8' is a lucky number in china, so eight 8x would be sth like seven 7s in US.

    • @TerrisLeonis
      @TerrisLeonis 6 месяцев назад +3

      "anonymous" as the username makes me think of FTP.

    • @OsX86H3AvY
      @OsX86H3AvY 5 месяцев назад

      just came to say the same thing - thats exactly what it is

    • @nyckid
      @nyckid 5 месяцев назад

      Probably a firmware update check

    • @rares3968
      @rares3968 28 дней назад

      88888888 is an extremely common password for Chinese devices. I have a WiFi-controlled programmable LED sign that has a Wifi hotspot with that password.

  • @Roadbobek
    @Roadbobek 6 месяцев назад +1

    I have no idea what’s going on but I watched the whole thing

  • @-r-495
    @-r-495 6 месяцев назад +3

    using possibly compromised sw to dump a knockoff product.
    like it! 😏

  • @adagioleopard6415
    @adagioleopard6415 6 месяцев назад +1

    They put two footprints on top of one another so if the wide version of the chip is unavailable they can use a regular soic8.
    We did the same but we at least made a package with nice looking silk so it didn't look so crap

  • @allwitchesdance
    @allwitchesdance 6 месяцев назад +2

    The two lzma blobs are probably the kernel and initramfs

    • @bnister
      @bnister 6 месяцев назад +1

      One's the kernel, and another (usually) the localization data. This thingie doesn't need any fs at all

  • @pap3rw8
    @pap3rw8 6 месяцев назад +1

    I would guess it's compressed based on the output of strings including "unzip" but it's possible there's also some encryption of the bootloader or whatever.

  • @markmuir7338
    @markmuir7338 6 месяцев назад +10

    China is taking a big risk having most of their systems run a proprietary OS made by an American company. Hard to change that though, given the cultural attachment to Windows - shown by most Chinese software only being available on that OS.

    • @Tim_Small
      @Tim_Small 6 месяцев назад

      They're fine, they've got the source code...

  • @wlloxik
    @wlloxik 6 месяцев назад

    this is the perfect video to listen to in the background lmao

  • @hafiz468
    @hafiz468 6 месяцев назад +1

    8:16 What the FLUX is going on here ?! 😂

  • @surewill8190
    @surewill8190 6 месяцев назад

    always interesting to watch

  • @mmkf
    @mmkf 6 месяцев назад +5

    I wonder if the filesystem is compressed in a non-standard way.

  • @kksdls
    @kksdls 6 месяцев назад

    Another great video!

  • @videshx818
    @videshx818 6 месяцев назад +1

    Nice soldering skills, I have one of this device in which the micro USB is detached. I am yet to solder

  • @toxicpsion
    @toxicpsion 6 месяцев назад +1

    that entropy spike is totally compression; probably a ramfs of some kind, looks like it showed up at the bottom of binwalk.

  • @adnanalam6201
    @adnanalam6201 6 месяцев назад

    Dude I've the same thing 😅 gotta follow this guy now

  • @samuie2
    @samuie2 6 месяцев назад

    There were multiple strings that referred LZMA and unzip "main code". I think that the code is just compressed, and the key if for hdmi drm not the firmware.

  • @maxcambiaso
    @maxcambiaso 20 дней назад

    Great video! I have a question, witch temperature do you set on your heat gun?

  • @matheuscezar6309
    @matheuscezar6309 6 месяцев назад

    Nice! I'm curious to discover how to decompress/decrypt those data!

    • @bnister
      @bnister 6 месяцев назад

      Bog standard LZMA. binwalk -e handles it well, but any unlzma tool will suffice. An RTOS2 SDK seems to come with the unmodified LZMA build from Igor Pavlov, too

  • @Sonny482
    @Sonny482 6 месяцев назад +1

    Great job! Which microscope / camera do you use?

  • @nohaynoticias
    @nohaynoticias 6 месяцев назад

    "the logo for the company that makes this device" SHERLOCK!

  • @roelbrook7559
    @roelbrook7559 6 месяцев назад

    You've got LZMA compressed data there. That might explain the entropy results you're seeing.

  • @peterb2614
    @peterb2614 Месяц назад

    Nice videos! How hot do you set the hot air gun to remove a component without destroying it?

  • @Ibrahim-rc8sn
    @Ibrahim-rc8sn 6 месяцев назад +1

    What analyzation software do you use in 18:50 ? I subscribed to your channel , great content

    • @ilyassamraoui3234
      @ilyassamraoui3234 6 месяцев назад +1

      That's binwalk program running -E [capital e for Entropy, if -e it will extract firmware "structure" I guess ]....

  • @VulcanOnWheels
    @VulcanOnWheels 6 месяцев назад

    1:01 You say, "*to* your TV", but I read "*on* your TV".
    Why do you keep hitting the Return key so often?

  • @npegg
    @npegg 5 месяцев назад

    "lets just not think about that right now" lol

  • @KlimentOgnianov
    @KlimentOgnianov 18 дней назад

    Waiting for the next part. Any idea when it will pop up here?

  • @bossysmaxx
    @bossysmaxx 6 месяцев назад

    dude are you an american knockoff of china?
    By the way great video Here goes the subscribe puk!!!

  • @RemovedBrain
    @RemovedBrain 6 месяцев назад

    Nice. One thing - that SW you are using, it is not (only) Chinese crap, it is standard crap. Those ergonomy-hells are created mostly by HW engineers who's simply doesn't understand how (and why) to make user friendly GUI. :)

  • @kikihun9726
    @kikihun9726 6 месяцев назад

    It had a hdcp string above so that encrypted data propably contains hdmi hdcp handshake key too.

  • @UndernetSystems
    @UndernetSystems 6 месяцев назад

    The good thing about dumping the firmware is that you can just buy another flash chip and reflash it if it breaks.

    • @bnister
      @bnister 6 месяцев назад +1

      Not unless the firmware ties itself to the flash Unique ID, and Chinese-sourced thingies usually DO... as a form of copycat protection

  • @rrrlasse2
    @rrrlasse2 6 месяцев назад

    I think if it's encrypted, entropy is almost exactly 1. If it's compressed it might be slightly lower

  • @jonathanzimmer8143
    @jonathanzimmer8143 6 месяцев назад

    Great video this was fun! Please do something on a Vortex phone, Oxtab tablet or other freeware. TV devices are big duh, I have an M-95 4k box that was immediate full throttle/unresponsive... turns out they're pretty much all spyware. Tried to hack my google acct from Shenzen. Oops. But devices handed out to the elderly etc are no longer motorola or lg, but chinese companies with knock off Galaxy designs and questionable Android builds.

  • @TheGreendabomb
    @TheGreendabomb 5 месяцев назад

    You said you didn't open it.. then you said you opened it.. 😂

  • @phuo2185
    @phuo2185 6 месяцев назад +1

    can you make a video on synology TC500

  • @gamerriasaat6622
    @gamerriasaat6622 6 месяцев назад +3

    How about modding a xiaomi 4c router (which is really cheap) to port usb(it has two open data pins) and openwrt (just enable ohci and ehci in kernel while complling) and then make a wifi pineapple(decompile pineapple rom and port using overlay) bcz they both use mips24kc :) then tada 15$ pineapple 🍍 btw it has better specs then original pineapple...

    • @gamerriasaat6622
      @gamerriasaat6622 6 месяцев назад

      I can't try this bcz of my upcoming entrance exam for varsity...

    • @OsX86H3AvY
      @OsX86H3AvY 5 месяцев назад

      i have the xiaomi 4A gigabit and its super easy to openwrt, don't need to open it can do it just by firmware upgrade, and YES please someone make a pineapple out of it, I got part way there and had to move on to other things but I still have it and WISH someone would make it a package!!!

  • @tomteiter7192
    @tomteiter7192 6 месяцев назад +2

    I think the XGecu Software isn't that bad, it's rather barebones and packs a shtload of functions in a no-frills kind of way.
    To be honest it kinda feels like someones project rather than a productof a big evil chinese spyware flinging knockoff company....
    A Linux Version and an API to add new programming algorithms and chips would be banger, though.

    • @mattbrwn
      @mattbrwn  6 месяцев назад

      Totally agree. As much as I complain about XGecu it's the best thing we've got.

    • @tomteiter7192
      @tomteiter7192 6 месяцев назад

      @@mattbrwn I still remember my utter disbelief when I first saw the older version popping up, together with a boatload of zif adapter sockets, for a total price of less than one tenth of what a single tsop adapter for a "respectable" programmer cost.

  • @pachapa3030
    @pachapa3030 6 месяцев назад

    This is awesome

  • @mikesyr
    @mikesyr 6 месяцев назад +2

    Hi Matt, do they make clips for SOP8s that size? Seems like that would be quicker than desoldering that chip, then again it came off with no issue. :)

    • @309electronics5
      @309electronics5 6 месяцев назад +1

      Sadly often when you put the clip on it powers the flash but also the soc/cpu its connected to which then tries to read from it and messes up the firmware read

    • @bnister
      @bnister 6 месяцев назад +1

      Yeah this exact platform has no trouble being dumped via the cheap ass clip usually shipped with CH341A kit. The LZMA packed firmware gets extracted to the RAM, and the SPI chip gets almost no accesses at all

  • @puolukka_hill_0
    @puolukka_hill_0 5 месяцев назад

    I'm just here to tickle the RUclips gods don't mind me

  • @IMakeVideos4Fun
    @IMakeVideos4Fun 6 месяцев назад +1

    this broke my tv 💀

  • @ghostmantagshome-er6pb
    @ghostmantagshome-er6pb 2 месяца назад

    I watch these even though i feel like Homer Simpson.

  • @MrCustomabstract
    @MrCustomabstract 6 месяцев назад

    Goated vids

  • @Ela-t9k9d
    @Ela-t9k9d 6 месяцев назад

    I used bug prove for complication software.İt's can't decyrpt firmware if it's encyrpted but if it's uncrypted bugprove can good job and you can detect old binarys,vulnarabilities etc.

  • @jheimissantos8682
    @jheimissantos8682 6 месяцев назад

    Nice video, Matt! Tks for share your knowledge!
    It's possible extracting the firmware via software? connecting via terminal (adb) and copy some partitions? sometimes i have dificult to consider what is the firmware, e.g all image firmware or only bootloader firmware.

    • @309electronics5
      @309electronics5 6 месяцев назад

      Adb is android only. If a device runs Uboot as bootloader you can interrupt the boot process and dump the flash.

    • @bnister
      @bnister 6 месяцев назад

      @@309electronics5 This one doesn't, everything is proprietary. Doesn't like to respond over USB, as well. There's usually some form of OTA on these, though, but dumping is tough

  • @Ibrahim-rc8sn
    @Ibrahim-rc8sn 6 месяцев назад

    Where can I find this software you use called Xgpro in 5:00 ?

  • @AymanAlhkeemi
    @AymanAlhkeemi 6 месяцев назад

    Please make a video on how to rebuild the firmware and calculate the checksum

  • @john_titor1
    @john_titor1 3 месяца назад

    What happened to the dynamic analysis vid?

  • @Its2Reel4U
    @Its2Reel4U 6 месяцев назад

    Love it

  • @frtls
    @frtls 6 месяцев назад +1

    Are these not cracking videos?

  • @reddinghiphop1
    @reddinghiphop1 6 месяцев назад

    Fantastic

  • @Neolith100
    @Neolith100 6 месяцев назад +1

    If the XGecu Pro software is windows, how do you run it in linux? Are you using WINE or Bottles... I am incredibly curious?

  • @duefourbail
    @duefourbail 6 месяцев назад

    what terminal ui is that when you check through the device i’m trying to learn more about the software you use

  • @Holycurative9610
    @Holycurative9610 6 месяцев назад +3

    The anycast logo looks like it was stolen from Paul Daniels of Apple fixing fame...

  • @ТошоТошо-с4ф
    @ТошоТошо-с4ф 6 месяцев назад

    The problem of Chromecast devices is too small internal storage, and i am curious can you replace the original with a bigger one?

  • @MotSter
    @MotSter 6 месяцев назад

    does it not work out of the box? Is there a further use goal to add to it or is this just pull the firmware cause you can as title kind of obviously states?

  • @arashgudarzi2623
    @arashgudarzi2623 6 месяцев назад

    hey Matt, I like you videos and watched many of them. I am a student who loves hardware hacking. I started electronics basics and Arduino to kinda get familiar with the hardware stuff. do you have any roadmaps to be successful in this field of job ?