Hi everyone. While I haven't made huge progress on unlocking the Amazon G Play's bootloader, I do have a few leads.First, there's Initroot . Initroot is a way to get root access on Moto phones that have locked bootloaders. In their GitHub repository , a community member confirmed this exploit to work on his G4 Play that has a locked bootloader. I'm still trying to figure out how to patch the init. I'm not good with IDA, so it's gonna be hard. I'd love some help. While yeah, root is awesome, it's not as awesome as unlocking your bootloader. That's where the next exploit below kicks in.There's a Amazon Exclusive Blu R1 bootloader exploit that someone here on XDA made. It uses the dirtycow exploit to obtain root then overwrite. For a lot of us, dirtycow won't work because of security patches. But initroot will!So, using knowledge from another XDA thread , we know that the third line of our get_unlock_data is a hash validated by Motorola to allow us to unlock our bootloader. Combining the initroot and the Blu R1 unlock exploit could allow us to unlock our device.We need to first obtain root using Initroot, to do this we need to patch initramfs. After we obtain root, we need to replace either the frp or cid partition, sounds like cid, with another patched version. This is where community help is needed! I know y'all are smart, let's do this!