mikeslr wrote: ↑Tue Feb 16, 2021 5:28 pmBut in the meantime if you don’t already have one, spend your money on a refurbished 7” Tablet with an Android (not Amazon fire or other specialized/cut-down) OS, wifi enabled.
Coincidentally, yesterday I found an old 7" Android 4.0 Ice Cream Sandwich tablet for sale at 8 NZ dollars. I paid the money and thought I had a bargain till I took it home, successfully charged it, and switched it on. Oops, was pin protected. Googled online for ways to hard reset - tried every botton press combination suggested from tons of reports (some for this specific Chinese rebranded tablet).
This morning I took the tablet back and explained why it was useless and they happily gave me my 8 dollars back but asked if I wanted to keep the junk since they were just going to chuck it in the bucket anyway. So, for some daft reason, I took it, with the idea in my head I'd open it up and see if I could find any other solution to the issue.
So as that last resort (with nothing to lose), I unscrewed/unclipped and opened the Android tablet case and checked if anything written on circuit board would help with reset. Unfortunatly not.... except I noted the part number of the (soldered in) flash RAM chip and it struck me that if I could somehow reset that directly I would either totally brick the as-was-useless device or maybe with tons of luck unlock it. However, engineering mindset told me to look for data sheet on the flash RAM chip online, so using my magnifying glass I noted the device number and entered it into google...
Found pdf of the datasheet; almost an ebook to make this comment less off-topic...
Noted from that that there was a 'reset' chip command, which was to put hex FF onto the 8 data command input pins and send some kind of up/down pulse of around 30ms... sigh. Anyway, no harm in trying brute force since useless locked ancient tablet anyway... so I noted from pin-out that the 8 data input pins all ran down one side of the chip and only other used pin there was Vcc. Since I needed logic high on each input pin, seemed likely that Vcc would do that for me... so what I did was:
took a straight-edged craft knife out of my toolbox (whilst Android tablet was switched on but, as I said, locked) and held that sharp part of the blade against that whole one side of the flash RAM chip, thus shorting out all the pins there. Not surprisingly the Android screen immediately went blank. I then (with little real hope) pressed the power button, but alas no response, so I shrugged my shoulders assuming I had fried it. However, just for completion I then stuck charging cable back in and (somewhat albeit slightly promisingly) its tablet led power-indicator light came on again and ... drum roll... after a few seconds a screen popped up saying encryption data had been corrupted so could no longer login with pin and that a hard reset was thus required, and the ancient old Android tablet then kindly presented an on-screen button with the word "RESET" on it, which I pressed and it then booted up without issues (bypassing previous login pin screen)!
I would not recommend above procedure to anyone - but it just shows you that a bit 'logical thought' sometimes works - it wasn't after all a case of random destruction on my part (and I really did previously google and try every possible alternative hard reset method known published by humanity - power/volumeUP/DOWN/Home/reset pin and so on it goes... nothing like that worked on this wee beast). As for the 30ms pulse to enter the hex FF input reset command... well the machine was on when I did this drastic action so data was being pulsed in all the time (that was my hope, and my hope was answered)...
So that's a wee ebook-like story, to make this post even more slightly on topic, albeit not about Python except all Android tablets could have some version of Python installed onto them if so required and useful for reading ebooks about Python certainly.
wiak
EDIT: for absolute completion, I should add that the chip inside the Android tablet I thus dubiously 'reset' was a Legacy MLC NAND Flash "Hynix H27UBG8T2BTR". Again: PLEASE do not do any of the above to any android unless you are happy to destroy the device... Sorry for such ridiculously long 'story' but technical forum requires detail or I'd just write that the bit about taking a knife to the chip...