OK, all this is good but I really need to talk to someone who's into featurephones topic. #asknostr
I'm stuck on several directions of reverse-engineering:
1) MT6261:
- decrypting/unpacking MAUI partitions (**besides** ALICE_2)
- an open source way to flash any area (don't point me to Ubuntu FlashTool version please, the libflashtool.so is not open source)
- META mode (protocol, commands, everything)
2) MT6276: handshake, dumping, META mode (protocol, commands, everything)
3) SC6531 (any revision): diag protocol, direct NVRAM access within packed ROMs
4) SC770x: handshake, dumping, FS structure
5) UMS9117(L): handshake, dumping, FS structure
6) MT6572: flashing (low-level), META mode (protocol, commands, everything)
7) MT6731: flashing (low-level), secureboot bypass, META mode (protocol, commands, everything)
Any piece of information on the above topics would be extremely helpful for the development of FOSS featurephone customization and malware removal tools.
Also, if anyone has a full flash dump of CAT B26, I'd appreciate it too to be able to repair mine.