[Jeff is here as Jeffro_. Mode is +m and only ops and those with voice can talk. If you have anything urgent that needs to be relayed, pm an Op to request voice. Spamming PMs will be banned.]

[00:49] <+introspection> open the "About this mac" menu by clicking the apple in the top left

[00:49] <@Jeffro_> at security settings

[00:49] <@gravufo> okay

[00:49] <@gravufo> is the data encrypted?

[00:49] <+introspection> hit "More info..."

[00:49] <@gravufo> introspection: please wait

[00:49] <+introspection> click "System report"

[00:49] <+introspection> gravufo: Oh sorry, thought we were idling

[00:50] <@Jeffro_> no

[00:50] <@gravufo> np!

[00:50] <@gravufo> okay great jeff

[00:50] <@gravufo> okay guys, should we go back to recovery? or try to get adb working now?

[00:50] <@vividboarder> Ok. While in settings let's turn on Adb and give that another shot

[00:50] <+introspection> When you're ready, I'd like to run through and check that the device is being detected at all

[00:50] <@gravufo> ok do so!

[00:51] <@gravufo> so first

[00:51] <@gravufo> let's activate usb debugging

[00:51] <@Jeffro_> done

[00:51] <@efrant> You should be able to enabke usb debugging ans pull the ahatem

[00:51] <@gravufo> efrant: we need root before pulling through OS

[00:52] <@vividboarder> But we need adb working in generally. We can do it all through adb after twrp anyway. Just gotta get adb working first.

[00:52] <@efrant> You should have read access with no root i think

[00:52] <@gravufo> not sure

[00:52] <+introspection> Here's a check to make sure it is being recognized at system level

[00:52] <+introspection> Alright, click the apple menu in the top left corner and go to "About This Mac". Click More info, then System Report. Look in the left listview that comes up and scroll down to USB. See if there are any android devices / usb hosts at all that you do not recognize from other devices you may have connected.

[00:53] <@vividboarder> fastboot works, so I think that will show the device.

[00:53] <@efrant> Is usb debugging enabled first of all?

[00:53] <+introspection> Unless the device is in bootloader it shouldn't show in fastboot?

[00:53] <@gravufo> well, if it is like linux, i had to modify some rules.d file or so

[00:53] <@Jeffro_> says Hub > Nexus 4

[00:53] <+introspection> efrant: yep, is

[00:54] <+introspection> Jeffro_: Great

[00:54] <+introspection> do "./adb kill-server"

[00:54] <+introspection> and then "./adb devices" That should kill and restart the daemon in case we had any persistence problems

[00:54] <@Jeffro_> ok

[00:55] <+introspection> ..Did anything come up with adb devices?

[00:55] <@Jeffro_> nope

[00:55] <+Introspection> hm

[00:55] <@gravufo> if it is anything like linux, i had to modify some rules.d file

[00:56] <@gravufo> oh yeah, try running adb as root maybe

[00:56] <@vividboarder> Don't have to on Mac as far as I know. Introspection can confirm.

[00:56] <+Introspection> jeh-: just PM'd me and said try running it as su

[00:56] <@vividboarder> sudo ./adb devices

[00:56] <@gravufo> ^

[00:56] <@vividboarder> Then your computer password

[00:56] <@vividboarder> Not any phone device password.

[00:58] <+Introspection> Anything come up?

[00:58] <@Jeffro_> I tried ./adb then su using admin password and no luck

[00:58] <@gravufo> no!

[00:58] <+Introspection> nono

[00:58] <@gravufo> sudo ./adb devices

[00:58] <@gravufo> this is the command u have to try

[00:58] <+Introspection> type "sudo ./adb devices"

[00:58] <@vividboarder> ^

[00:59] <@Jeffro_> ./adb devices comes up blank

[00:59] <+Introspection> sudo ./adb devices

[00:59] <+Introspection> not just ./adb devices

[00:59] <@Jeffro_> nothing listed

[01:00] <+Introspection> we need to run it in an elevated session in case something else is screwing with us

[01:00] <@gravufo> okay well guys, let's stop wasting time and try the recovery again

[01:00] <@Jeffro_> still blank with sudo ./adb devices

[01:00] <+Introspection> One more thing to check

[01:00] <@gravufo> okay go on

[01:00] <+Introspection> type in "sudo nano ~/.android/adb_usb.ini"

[01:01] <+Introspection> And then is anything in that file?

[01:01] <@Jeffro_> ok

[01:01] <@Jeffro_> nope

[01:01] <+Introspection> efrant: Are we trying to pull a system dump through adb?

[01:01] <+Introspection> Jeffro_: good, that means we can do one last thing for adb

[01:02] <+Introspection> open up about this mac, more info and then system report again

[01:02] <+Introspection> go to usb and then select the nexus device in there

[01:02] <@Jeffro_> ok

[01:02] <+Introspection> and then see the vendor id?

[01:02] <@Jeffro_> ok

[01:02] <+Introspection> just the 0x**** number

[01:02] <@Jeffro_> yes

[01:02] <+Introspection> type "sudo echo ***that number without the asterisks* >> ~/.android/adb_usb.ini

[01:03] <+Introspection> and then if that works do "sudo adb kill-server; sudo adb devices"

[01:03] <@efrant> Im not a mac guy, but at this point, it would seem that he should just boot cwm, and do a nandroid. He shouldn't have any issues with not being able to mount data given that he has already booted into android once

[01:04] <@gravufo> ^

[01:04] <@gravufo> this

[01:04] <+Introspection> I concur, let's just see if this works though

[01:04] <@Jeffro_> so type this while still in android/adb_usb.ini?

[01:04] <@vividboarder> We'll definitely try that. Just want to try and have a backup plan so he's not booting rebooting all night.

[01:04] <+Introspection> oh crap no, sorry

[01:04] <+Introspection> push ctrl+x to escape nano

[01:05] <+Introspection> then do "sudo echo *vendor_id_you_got* >> ~/.android/adb_usb.ini"

[01:05] <+Introspection> No asterisks please

[01:05] <+Introspection> the vendor id is a 0xsomething number

[01:05] <@gravufo> (but does he put the 0x?)

[01:06] <+Introspection> yep

[01:06] <@vividboarder> Yea

[01:06] <@gravufo> cool

[01:06] <@Jeffro_> so sudo echo 0x**** ~.android/adb_usb.ini (but with the vedor id instead of *? )

[01:06] <@gravufo> you're missing the >>

[01:06] <@Jeffro_> ok

[01:06] <@gravufo> sudo echo 0x**** >> ~.android/adb_usb.ini

[01:06] <+Introspection> for example if your code was 0x1234 then it would be

[01:06] <+Introspection> sudo echo 0x1234 >> ~/.android/adb_usb.ini

[01:07] <@vividboarder> Well, don't need sudo there actually. It's in $HOME. But should work all the same.

[01:07] <+Introspection> true, I'm just running these all through sudo to save time if something is screwed up in his permissions from anything else

[01:07] <@Jeffro_> I did it ,it asked for password, I put my admin password, then it went back to the normal prompt

[01:08] <+Introspection> excellent

[01:08] <+Introspection> alright

[01:08] <+Introspection> now run

[01:08] <+Introspection> sudo ./adb kill-server

[01:08] <+Introspection> sudo ./adb devices

[01:08] <+Introspection> and tell me if anything comes up after that

[01:08] <@Jeffro_> Still not listing the serial #

[01:08] <+Introspection> hm

[01:08] <@gravufo> LAST thing

[01:08] <+Introspection> er

[01:08] <@gravufo> just replug the phone

[01:08] <+Introspection> unplug and replug your device?

[01:08] <+Introspection> lmao

[01:09] <@gravufo> once it's replugged, make sure you give security permission and all

[01:09] <+Introspection> and then do ./adb devices again

[01:10] <+Introspection> anything coming up?

[01:10] <@Jeffro_> did that, nothing

[01:10] <@gravufo> okay then

[01:10] <@gravufo> let's just skip ahead

[01:10] <+Introspection> alright, I guess it's back to recovery then

[01:10] <@gravufo> let's reboot to recovery please

[01:10] <@gravufo> turn off and boot using VOL DOWN

[01:11] <@vividboarder> Back to recovery! Woot!

[01:11] <+Introspection> efrant and vividboarder: If the goal is to get adb working for a system dump, could we not just connect over network? (This might be a CM only feature, can't remember)

[01:11] <@vividboarder> Not built in.

[01:11] <@Jeffro_> ok

[01:11] <@vividboarder> There is an Adb Wilreless app

[01:11] <+Introspection> oh

[01:11] <@gravufo> hey guys, stop with the nick changes

[01:11] <@gravufo> please.

[01:11] <+Introspection> I'm used to pa/cm as under adb there is "ADB over network"

[01:13] <@Jeffro_> now what?

[01:13] <@vividboarder> Ok, back in recovery or fastboot?

[01:13] <+Introspection> vivid/efrant, is there a fastboot getvar for the specific nexus 4 model? That would tell us if we are working with the same device or a prototype, which would give reasons as to why flashing is failing

[01:13] <@Jeffro_> fastboot

[01:14] <@gravufo> go into recovery please

[01:14] <@vividboarder> Well, flashing has worked. So that's fine.

[01:14] <@vividboarder> Wait

[01:14] <@efrant> Fastboot getvar all

[01:14] <@Jeffro_> ok

[01:14] <@vividboarder> What recovery is installed CWM? Does that allow just backups of System?

[01:14] <+Introspection> Oh, I thought gravufo said cwm/twrp failed?

[01:14] <@vividboarder> Twrp does have an option to uncheck other backups.

[01:14] <@gravufo> oh, we could reflash twrp

[01:14] <@vividboarder> Yea.

[01:14] <@Jeffro_> CM

[01:14] <@gravufo> ok Jeffro_ are you still in fastboot?

[01:14] <@Jeffro_> CWM

[01:14] <@vividboarder> Jeffro_ you still have twrp on your computer?

[01:15] <@gravufo> do we flash the 2.6 guys?

[01:15] <@Jeffro_> I'm in recovery and yes still have twrop

[01:15] <+Introspection> So cwm is installed ?

[01:15] <@Jeffro_> twrp

[01:15] <@efrant> I would download cwm, fastboot boot cwm.img then nandroid

[01:15] <+Introspection> twrp is installed?

[01:15] <@vividboarder> Nah nah. efrant he's in CWM.

[01:15] <@gravufo> wait guys, wait.

[01:15] <+Introspection> vividboarder: He just said twrp?

[01:15] <@Jeffro_> sorry, cwm is, but I still have the twrp files

[01:15] <@vividboarder> He said he still has it.

[01:15] <+Introspection> ah

[01:15] <@vividboarder> ^^

[01:16] <@vividboarder> Ok. So. Does CWM let someone backup a single partition

[01:16] <@vividboarder> Anyone know?

[01:16] <@vividboarder> Or should we go back to twrp?

[01:16] <+Introspection> ..so adb is not working in recovery either?

[01:16] <@gravufo> no, but we can pull the system.img from it

[01:16] <@gravufo> afaik

[01:16] <+Introspection> vividboarder: I'm pretty sure cwm is the whole deal

[01:16] <@gravufo> if it's still like in the old days

[01:16] <@vividboarder> If we can get to adb.

[01:16] <@vividboarder> Which we can't.

[01:16] <+Introspection> nandroid everything

[01:16] <@efrant> Whole deal is fine

[01:16] <@gravufo> yeah

[01:16] <@gravufo> ok Jeffro_

[01:16] <@gravufo> just backup

[01:16] <+Introspection> But q: If adb does not work in recovery how are we going to pull the dump?

[01:16] <@vividboarder> Possibly. Except he had errors about mounting /cache

[01:16] <@gravufo> the whole thing

[01:16] <@vividboarder> Boot and pull it with MTP

[01:17] <@gravufo> ^

[01:17] <@efrant> Yes

[01:17] <@Jeffro_> ok, it's going

[01:17] <+Introspection> ah

[01:17] <@gravufo> great, no errors

[01:17] <@vividboarder> The backup is going?

[01:17] <@gravufo> seems like it's gonna work

[01:18] <@Jeffro_> backup complete

[01:18] <@gravufo> what? already?

[01:18] <+Introspection> quick

[01:18] <+Introspection> too quick?

[01:18] <@gravufo> dunno, maybe, maybe not lol, he does have no data to back up

[01:18] <@efrant> No data, thats prob why

[01:18] <@vividboarder> Boom. Ok, let's reboot to Android

[01:18] <@gravufo> okay then Jeffro_ reboot to android

[01:18] <@gravufo> then we will copy the files to your computer

[01:18] <+Introspection> hm

[01:19] <@Jeffro_> select "yes - disable recovery flash" ?

[01:19] <@gravufo> where do you see that exactly? Still in the recovery?

[01:19] <@Jeffro_> yes, when i select reboot

[01:20] <+Introspection> oh

[01:20] <@gravufo> okay click yes

[01:20] <+Introspection> yeah, just hit yeah

[01:20] <@Jeffro_> top says flash stock recovery on on boot?

[01:20] <@gravufo> select "yes - disable recovery flash"

[01:20] <@efrant> Doesn't matter

[01:20] <@gravufo> ^

[01:21] <@Jeffro_> ok rebooting

[01:21] <@Jeffro_> ok

[01:21] <@gravufo> Almost done, keep it up!

[01:21] <@gravufo> thanks for your time by the way

[01:21] <@Jeffro_> rebooted

[01:21] <@gravufo> on behalf of all the community ;)

[01:21] <+Introspection> skip setup again

[01:21] <@Jeffro_> Yeah, my wife is pissed

[01:21] <@Jeffro_> oh well

[01:21] <@gravufo> lol sorry!

[01:22] <@gravufo> okay well almost done

[01:22] <@Jeffro_> didn't ask for setup

[01:22] <@gravufo> so just open up the phone as if u want to transfer files

[01:22] <@gravufo> from your computer

[01:22] <@gravufo> and find the folder called clockworkmod

[01:22] <@gravufo> copy it to your computer

[01:22] <+Introspection> It's in

[01:22] <+Introspection> It is in /data/media/clockworkmod/backups

[01:23] <@gravufo> oh wow they moved it? meh

[01:23] <@vividboarder> Jeffro_ my wife is about to be too, haha. We're at the final stretch.

[01:23] <@gravufo> nvm they didnt move it lel

[01:23] <@vividboarder> When plugged in, Android File Transfer should only show contents of /data/media

[01:23] <+Introspection> gravufo: I thought it was always there? ;P

[01:23] <@Jeffro_> OK

[01:23] <@gravufo> Introspection: yeah i just assumed we're already in /data/media

[01:23] <@Jeffro_> I see .recovery_version

[01:24] <+Introspection> anything else?

[01:24] <@gravufo> nothing else?

[01:24] <@vividboarder> You find the any folders in the clockworkmod directory?

[01:24] <@vividboarder> One should be nandroid or backup.

[01:24] <+Introspection> gravufo: Sorry yeah :P

[01:24] <@Jeffro_> there's .nomedia

[01:24] <@Jeffro_> under datea

[01:25] <@gravufo> nono

[01:25] <@gravufo> just open up your phone

[01:25] <@gravufo> from your computer

[01:25] <@gravufo> and then go into clockwormod

[01:25] <+Introspection> go into media

[01:25] <@efrant> It should be in:

[01:25] <+Introspection> and then clockworkmod

[01:25] <+Introspection> and then backups

[01:25] <+Introspection> they are each folders within /data

[01:26] <@efrant> Nexus 4, internal storage, clockworkmod, backup

[01:26] <@Jeffro_> through android file transfer ? Cause that's what I'm doing

[01:26] <@gravufo> okay Jeffro_ did you find the clockworkmod folder?

[01:27] <@vividboarder> So there is no backup folder in there?

[01:27] *gravufo* It might be easier to just upload the file to dropbox instead of fishing around in AndroidFileTransfer

[01:27] <@Jeffro_> yes, and it has the .recovery_version

[01:27] <@Jeffro_> that's it

[01:27] <@vividboarder> Just .nomedia and .recovery_version?

[01:27] <@gravufo> then the backup failed.

[01:27] <@Jeffro_> yup

[01:27] <@vividboarder> Shitballs

[01:27] <+Introspection> uh

[01:27] <+Introspection> efrant, maybe see if you could get a teamviewer session up

[01:27] <@vividboarder> Won't help.

[01:27] <@vividboarder> What we need is on the device, hah.

[01:28] <@vividboarder> So.

[01:28] <@vividboarder> Let's do this once and for all.

[01:28] <@gravufo> twrp time.

[01:28] <@vividboarder> Reboot to fastboot.

[01:28] <@vividboarder> fastboot flash recovery path_to_twrp

[01:28] <@vividboarder> From there we can try to backup just system and then flash SuperSu.

[01:28] <@vividboarder> Worst case, we end up rooted in the rom and can do a dump from Android.

[01:28] <@vividboarder> Everyone with me? If so we can walk him through.

[01:29] <@gravufo> yes

[01:29] <@Jeffro_> ok, back to fastboot

[01:29] <@efrant> Ok guys, i need to sign off and go to sleep. Need to be awake in 5 hours for work. Good luck

[01:29] <@gravufo> fastboot flash PATH_TO_RECOVERY_FILE

[01:29] <+Introspection> These google guys are crafty :P

[01:29] <@Jeffro_> which version of twrp

[01:29] <@gravufo> cya efrant

[01:29] <@gravufo> uhhh

[01:29] <@gravufo> guys which one do we use?

[01:30] <@gravufo> 2.6? 2.3?

[01:30] <@vividboarder> So did you say you could click cancel on the password thing?

[01:30] <@Jeffro_> yes

[01:30] <@vividboarder> Ok. So we can do 2.6 then.

[01:30] <@gravufo> ok Jeffro_ let's go with 2.5 if u have it

[01:30] <@gravufo> else 2.6

[01:30] <@gravufo> since we need the su

[01:30] <@vividboarder> ^^

[01:31] <@Jeffro_> ok

[01:31] <@Jeffro_> 2.5

[01:31] <@Jeffro_> flashed

[01:32] <@gravufo> great, go into recovery

[01:32] <@vividboarder> Ok.

[01:32] <@vividboarder> Let us know when in recovery.

[01:32] <@Jeffro_> It didn't ask for a password this time

[01:32] <@gravufo> GREAT

[01:32] <@gravufo> now go into backup

[01:32] <@Jeffro_> ok

[01:32] <@gravufo> select ONLY system and boot

[01:32] <@gravufo> and swipe to back up!

[01:33] <@vividboarder> Perfect.

[01:33] <@vividboarder> Yea.

[01:33] <@vividboarder> Uncheck all but system.

[01:33] <@Jeffro_> It's seems to be going

[01:33] <@gravufo> good

[01:33] <@vividboarder> Ok, what does the message say?

[01:33] <@vividboarder> Does it show the size?

[01:34] <@Jeffro_> backup completed

[01:34] <@vividboarder> What does the log say there?

[01:34] <@Jeffro_> 562mb

[01:34] <@vividboarder> Nice.

[01:34] <@vividboarder> Wow.

[01:34] <+Introspection> That was still very, very quick

[01:34] <@vividboarder> Cool.

[01:34] <+Introspection> ah, good size though

[01:34] <@vividboarder> Let's make sure though.

[01:34] <@vividboarder> And...

[01:34] <@vividboarder> thats what she said

[01:34] <@vividboarder> ...

[01:34] <@gravufo> alright, let's try transfering directly from the recovery

[01:34] <@vividboarder> So, in twrp, go home.

[01:34] <@vividboarder> Hang on.

[01:34] <@vividboarder> Can't transfer from twrp.

[01:34] <@Jeffro_> ok

[01:35] <@vividboarder> MTP doesn't work in any recovery.

[01:35] <@gravufo> okay

[01:35] <@gravufo> go on

[01:35] <@vividboarder> From home go to advanced.

[01:35] <@vividboarder> Then File Manager.

[01:35] <@vividboarder> We're going to make sure it backed up.

[01:35] <+spaceman860> Adb pull in recovery

[01:35] <@vividboarder> Still no adb.

[01:35] <@Jeffro_> ok

[01:35] <@vividboarder> You in file manager?

[01:35] <@Jeffro_> yes

[01:35] <+Introspection> spaceman860: ADB is dead, both in recovery and in system

[01:35] <@vividboarder> Ok, you see sdcard in there or does it look like you're on the sdcard?

[01:36] <@Jeffro_> yes

[01:36] <@gravufo> so look for the folder TWRP

[01:36] <@Jeffro_> see it

[01:36] <@Jeffro_> has a back up

[01:36] <@vividboarder> Ok, In that folder.

[01:37] <@vividboarder> Is there a folder in there called backup?

[01:37] <+Introspection> good

[01:37] <@gravufo> there should be two files inside the backup

[01:37] <@Jeffro_> backups folder has a file

[01:37] <@Jeffro_> in it

[01:37] <@gravufo> what's the name?

[01:37] <@vividboarder> Called?

[01:37] <@Jeffro_> 00475*******

[01:38] <@Jeffro_> then select that and it has the date

[01:38] <@vividboarder> Ok.

[01:38] <@vividboarder> Go in there.

[01:38] <@Jeffro_> then in that has boot.emmc.win; boot.emmc.win.md5

[01:38] <@vividboarder> Ok.

[01:38] <@vividboarder> Just boot?

[01:38] <@vividboarder> No System?

[01:38] <@Jeffro_> system.et4.win

[01:38] <@Jeffro_> recovery.log

[01:38] <@vividboarder> Ok.

[01:38] <+Introspection> Guys, stop with the nick changes. If you have something to tell us PM one of the +v/o's

[01:38] <@vividboarder> Great.

[01:38] <@Jeffro_> system.ext.win.md5

[01:39] <@vividboarder> Pefect.

[01:39] <@vividboarder> Ok.

[01:39] <@vividboarder> So now press home to go to twrp home.

[01:39] <+Introspection> Good

[01:39] <@vividboarder> Then Reboot

[01:39] <+Introspection> Home run

[01:39] <@vividboarder> Then System.

[01:39] <@vividboarder> It should ask if you want to root. Say yes.

[01:39] <@vividboarder> Just in case.

[01:40] <@Jeffro_> ok rebooting now

[01:40] <@Jeffro_> says android is upgrading

[01:40] <+Introspection> That is the root

[01:40] <@Jeffro_> ok rebooted

[01:40] <+Introspection> well, a system change (root installed)

[01:40] <@gravufo> okay

[01:40] <@gravufo> now.

[01:40] <@gravufo> open the mac file transfer thing

[01:40] <@gravufo> and find the TWRP folder

[01:40] <@gravufo> copy it over to your computer

[01:40] <@Jeffro_> there

[01:41] <@Jason__> whats up guys?

[01:41] <@vividboarder> Yea, So Android FIle Transfer agian. See if it works.

[01:41] <+Introspection> jasq

[01:41] <+Introspection> Jason__: CWM failed, we have made a twrp backup and are trying to use mtp to get it on jeff's mac

[01:41] <@Jeffro_> transferring now

[01:41] <@Jason__> what was the error with cwm?

[01:41] <@Jeffro_> done

[01:41] <@gravufo> okay now

[01:42] <@gravufo> it would be cool if you could simply zip that folder and upload it to dropbox or something

[01:42] <+Introspection> Jason__: Backup was near instant, and nothing saved (nothing in dir in the backups folder)

[01:42] <@vividboarder> Ok. Transfer system and boot files.

[01:42] <@vividboarder> You get them all?

[01:42] <@Jeffro_> yup

[01:42] <@gravufo> nice

[01:42] <@vividboarder> Pefect.

[01:42] <+Introspection> excellent

[01:43] <@Jason__> it seems like vivid is on to something

[01:43] <@vividboarder> Zip a folder up with the 5 files then. 2 boot, 2 system and recovery.log

[01:43] <@Jeffro_> yes

[01:43] <@vividboarder> Then do you have dropbox or google drive?

[01:43] <@Jeffro_> it's in dropbox

[01:43] <@vividboarder> Sweet.

[01:44] <+Introspection> awesome, any progress log for the upload?

[01:44] <@vividboarder> So in dropbox you can do share and get a link when it's uploaded

[01:44] <@Jeffro_> it's there

[01:44] <+Introspection> ..eh

[01:44] <@vividboarder> Then I can try to put it up on Goo.im or techerrata. If I can remember my logins.

[01:44] <@gravufo> yeah so just copy paste the public link

[01:44] <+Introspection> that was … a bit fast for a 500mb file, even compressed

[01:44] <@gravufo> it's probably syncing as we speak

[01:44] <@vividboarder> Introspection agreed. What is the file size of the 4 files unzipped?

[01:44] <@Jeffro_> https://www.dropbox.com/sh/c8ddc9ch24mvmct/qVYzlwu6TM

[01:44] <@vividboarder> Jeffro_ ^

[01:45] <@vividboarder> Ok, we got system.md5

[01:45] <+Introspection> Are you like sitting on the upload server? lol

[01:45] <@vividboarder> not system.win yet

[01:45] <@gravufo> it's syncing guys

[01:45] <@gravufo> wait it out

[01:45] <@vividboarder> ^

[01:45] <+Introspection> yep

[01:45] <+Introspection> home run!

[01:45] <@vividboarder> Kernel lookedl ike it dumped though

[01:45] <@Jeffro_> I hope this gets you guys what you want.

[01:45] <@gravufo> yeah hopefully!

[01:45] <@gravufo> THANKS A LOT

[01:45] <@gravufo> really.

[01:46] <+Introspection> Next step for us: Download, proceed to party hard.

[01:46] <@gravufo> it's super appreciated

[01:46] <+Introspection> Jeffro_: This is perfect, thank you incredibly much.

[01:46] <@Jeffro_> Let me know on google + if this works or not. I'm going to bed

[01:46] <@Jason__> I got the download, now, lets have a look at this zip

[01:46] <@Jason__> Jeff, you sir, are a hero

[01:46] <@gravufo> _defcon: radio will come another time, everyone is exhausted

[01:47] <@vividboarder> recovery.log looks like it backed up system just fine.

[01:47] <@vividboarder> 520MB

[01:47] <@vividboarder> Thanks Jeffro_

[01:47] <@vividboarder> Don't flash anything crazy tonight or tomorrow.

[01:47] <@vividboarder> We can try to pull the baseband too then.

[01:47] <@gravufo> hey Jeffro_

[01:47] <@Jeffro_> yea

[01:47] <@gravufo> can you wait before shutting your computer off?

[01:47] <@Jason__> yea, looks like we still need some stuff

[01:47] <@Jeffro_> I will, I see it's still uploading

[01:47] <@gravufo> great

[01:47] <@gravufo> thanks :P

[01:48] <@Jason__> hey jeff, how much of it is up?

[01:48] <+Introspection> Jeff, would you mind going over the story of how you got the device?

[01:49] <@vividboarder> Introspection he said (on G+) he got it on craigslist from someone who worked there.

[01:49] <+Introspection> Yeah, I read that, just wondering how that transaction went heh

[01:50] <@Jason__> vivid, what did you end up doing to pull the system?

[01:50] <@gravufo> nandroid backup

[01:50] <@gravufo> through twrp

[01:50] <@gravufo> after having manually formatted cache and userdata through fastboot

[01:50] <+Introspection> Jason__: TWRP to get the system, used MTP to get it to Jeff's pc

[01:50] <@vividboarder> Jason__ twrp

[01:50] <@Jason__> how did you get through the password on twrp?

[01:51] <@vividboarder> Just rebooted to android first

[01:51] <@gravufo> it was just corruption

[01:51] <@vividboarder> Then tried again.

[01:51] <+Introspection> (android file transfer on mac)

[01:51] <@gravufo> there was no password needed

[01:51] <@Jason__> nice!

[01:51] <@vividboarder> I think adb unlock wipes it

[01:51] <@vividboarder> Reboot probably cleans up the partition

[01:51] <@vividboarder> Creates /data/media and so on.

[01:51] <@Jason__> so whats left? Radio and baseband

[01:51] <@vividboarder> Not certain, but sounds plausible.

[01:51] <@vividboarder> Yea

[01:51] <@vividboarder> But he's gone to bed.

[01:51] <@vividboarder> We can try that tomorrow I suppose.

[01:51] <@vividboarder> LTE doesn't work on new basebands anyway.

[01:52] <@Jason__> He's been a hell of a guy to work at it this long to help us all out

[01:52] <@gravufo> agreed

[01:52] <@vividboarder> So who cares!? ;)

[01:52] <@gravufo> yeah

[01:52] <@vividboarder> Yea. Thanks Jeffro_!!!!

[01:52] <@vividboarder> Should I open the floodgates? I guess he's gone.

[01:52] <@gravufo> uhhhhhhh

[01:52] <@Jason__> lol

[01:52] <@gravufo> wait a second

[01:52] <@gravufo> til the upload is over?

[01:52] <@Jason__> nah, let em cringe

[01:52] <+Introspection> pulled from recovery.log

[01:52] <@Jason__> lo

l

[01:52] <@vividboarder> It looks like it backed up fine in the log

[01:53] <+Introspection> ro.build.id=JZO54K ro.build.display.id=cm_mako-eng 4.1.2 JZO54K eng.dees_troy.20130408.210013 test-keys ro.build.version.incremental=eng.dees_troy.20130408.210013 ro.build.version.sdk=16 ro.build.version.codename=REL ro.build.version.release=4.1.2 ro.build.date=Mon Apr 8 21:00:28 UTC 2013

[01:53] <+Introspection> credit to irc user "adb", thanks

[01:53] <@gravufo> okay haha

[01:53] <@gravufo> question for you guys