https://badge.emfcamp.org/w/index.php?title=TiLDA_MK4/sim800/Reverse_engineering&feed=atom&action=historyTiLDA MK4/sim800/Reverse engineering - Revision history2024-03-28T13:49:17ZRevision history for this page on the wikiMediaWiki 1.35.5https://badge.emfcamp.org/w/index.php?title=TiLDA_MK4/sim800/Reverse_engineering&diff=354&oldid=prevRenze: Add page about reverse engineering efforts2018-08-30T21:14:42Z<p>Add page about reverse engineering efforts</p>
<p><b>New page</b></p><div>This page represents an effort to find out more about the inner workings of the SIM800 module found on the TiLDA MK4 badge.<br />
<br />
Feel free to add your own research, but please do not remove content added by other people, even if you determined the information to be false.<br />
Instead you could add text explaining why the existing content was wrong.<br />
<br />
== Usefull links ==<br />
Page with firmware, update tool and instructions: https://www.raviyp.com/embedded/214-learn-how-to-update-the-firmware-of-your-sim800-modules<br />
Information about Mediatek chipsets: https://www.bunniestudios.com/blog/?p=4297<br />
Information on Mediatek file formats: https://wiki.postmarketos.org/wiki/Mediatek#Image_format<br />
<br />
== Current state of research ==<br />
Based on the flashing utility and firmware file provided on the raviyp website the SIM800 module probably contains a Mediatek dumb-phone chipset. Bunny did some research on those already, which can be found on his [[https://www.bunniestudios.com/blog/?p=4297|blog]].<br />
<br />
== To-do list ==<br />
- Removing the lid from a SIM800 module and taking photos of the insides<br />
- Figuring out exactly which (Mediatek) chip is inside the SIM800<br />
- Find a way to replace the built-in ringtones<br />
- ???<br />
- Profit!</div>Renze