This is an unofficial port of the Team Win Recovery Project's v3.0.2-1 release to the Chinese UHANS S1 Android device.
Just get me the latest build:
Note: these builds do and will NOT contain a scatter file. Please refer to the flashing instructions if you are unsure how to proceed.
The main purpose of the repository is to publicly release a version of the TWRP open source recovery that is suitable for and functional on the UHANS S1 model and to provide the source of the built recovery image, therefore enabling users to gain greater control of their handsets, and among others, allowing them to modify the official Freeme OS build running on their device and gain root privileges.
As to our understanding there does not exist a safe and functional way of rooting the S1 device that does not involve the installation of a custom recovery image. This TWRP recovery is essential to those users affected by the malicious system applications present on some of the S1 models and would wish to remove those from their devices.
Many UHANS handsets running Freeme OS v2.39+ out of the box came preinstalled with a Trojan disguised as the Official YouTube application. The fake YouTube application was functional, detached from the Play Store and had high level device permissions, was installed as a priv-app, and ultimately had access to information about the user's Google Account. The application has been detected as malicious by the Google Play Store since March 2018, therefore also warning users unaware of the fake video player. The YouTube apk could be disabled via the settings app, the Play Store's prompt, or third party tools, however, could also re-enable itself after a reboot, and can only be removed with root privileges. The European sales of the devices got terminated after the discovery of the malicious intent, and the company went out of business in 2019 allowing the release of certain previously confidential device sources excluding kernel sources. The other releases, such as the stock ramdisk can be found on my profile.
As per our agreement with my former superior at the European Development Department of UHANS Mobile affiliated with UHANS Mobile Inc, from the 1st August 2019, this recovery is released publicly to the open source community licensed under GPL v3. Therefore, you are very welcome to, first and foremost, freely use it, as well as, modify and rebuild this recovery to your liking and share modified versions of it publicly.
Many thanks to the developers of the open source Team Win Recovery Project for making this possible. Please kindly consider supporting them for their precious hard work: https://twrp.me/
Team Win and I take no responsibility for any damage that may occur from installing or using TWRP on your device.
Since this repository's primary aim is to provide users a way of gaining greater control over their devices, most importantly to those users affected by malicious system applications, my aim is to provide the simplest solution possible, as to most average users, flashing a built recovery image is already complex enough of a daily task.
Contrary to common belief this device does not require a pre-written scatter file in order to flash a custom recovery image, and due to its simplicity when flashing via the Fastboot interface, I decided not to include a scatter.txt or scatter writing instruction in our builds. Moreover, this way users don't have to use third party tools, such as the SP Flash Tool, which is not only confusing, but is also often distributed over the internet with bundled malware. Aiming simplicity is also the reason that there are no build instructions here, but as per the license, you are obviously welcome to use the source to your liking and to use different flashing mechanisms.
Simply flash the recovery via the bootloader and reboot into it to secure the partition. If it is still overridden by the next boot, flash the image again in TWRP.
Is your bootloader unlocked? If yes, feel free to skip to step #2 Otherwise, just follow along:
This process will unlock the bootloader of your device allowing modifications to it's operating system partitions.
Warning: this process will wipe the information on your smartphone similarly to a factory reset, so make sure to create a full backup of your data before starting the process.
1.0 Prerequisites
Make sure the Android SDK Command Line Platform Tools, hence the adb and fastboot interfaces and drivers are properly installed on your system. There are countless guides and tools on the internet to help you with this, please start with the official documentation if you are new to this topic. Make sure to double check that adb and fastboot commands are properly working on your system before proceeding to the next steps. You can easily check this by typing 'adb' and 'fastboot' in a terminal.
1.1 Enable developer options
Go to Settings/About phone and tap build number 7 times quickly. It should prompt you You are now a developer
😊
1.2 Enable OEM unlocking
Go to Settings/Developer options (this should show up after the previous step) and enable OEM unlocking
. You may get a warning that device protection features will no longer work, you may disregard this warning, or read up on it here.
Make sure to double check that the flag is turned on before proceeding to the next step.
1.3 Reboot to bootloader
1.3.1 Turn off your device
1.3.2 Press and hold the Volume Up
+ Power
keys until a little textual menu appears
1.3.3 Navigate to the Fastboot Mode
option with the Volume Up
key (keep pressing it until the right item is selected), then enter Fastboot Mode
by pressing the Volume Down
key.
1.3.4 You should now see a little text stating that your device is in Fastboot mode
. If this did not come up, or a different window appears, don't worry, you should be able to restart your device by long pressing the power button, and you should re-attempt the steps at 1.3.
1.3.5 Plug your device into your computer with a Micro USB cable. Depending on your operating system a sound and/or prompt may notify you upon detection of the device. To make sure your phone has been detected, open a terminal window and type the fastboot devices
command. If you correctly installed the required drivers executing this command should show your device's serial number as well as the fastboot text in line with it:
PS C:\Users\UHANSd> fastboot devices
EEZPBMNZ9LKLKAHE fastboot
If the command executed without any result, you should reattempt the installation of the fastboot drivers.
1.4 OEM Unlock
Now we are ready to unlock the bootloader of the device. You should check the status of your device by typing fastboot getvar unlocked
which should say:
PS C:\Users\UHANSd> fastboot getvar unlocked
unlocked: no
If it says otherwise, there is a good chance, your device already has an unlocked bootloader. In this case you should attempt steps from #2 to check if you are able to flash a custom recovery.
If it is confirmed that your device is not unlocked you are ready to start the unlocking process.
Warning: this will wipe all data from your device, so make sure you have backed up everything, including files on your internal storage, sms messages, important application data, etc.
To unlock, type the following command: fastboot oem unlock
This should result in your terminal awaiting a response from your device, and on the device you should see a new prompt asking you to confirm the unlock. Please read the information carefully and proceed with the unlocking via pressing the appropriate volume key.
Upon a successful unlock your terminal should confirm that the process has finished and your device may reboot. If your device does not reboot automatically you can reboot it by typing fastboot reboot
.
This reboot may take longer than usual and it will likely ask you to set up your operating system similarly to a factory reset.
This process will install, in order words, flash, the desired TWRP Recovery image onto your device.
2.0 Prerequisites
- Make sure that
OEM Unlocking
is (still) enabled in Settings/Developer options. You may need to re-enable Developer options to view this. - Reboot to Fastboot and connect your device to your computer (just like before)
- Make sure that your device is successfully unlocked by typing
fastboot getvar unlocked
- Download the latest recovery image from the Releases section of this repository if you haven't yet
2.1 Flashing the recovery
2.1.1 Navigate to the directory where the downloaded recovery image is stored and open a terminal window from this folder. If you need help with this step, just do a quick google search quoting your operating system.
If the recovery image is in your Downloads folder, the path should look similar to this:
PS C:\Users\UHANSd\Downloads>
2.1.2 Type fastboot devices
to make sure your device is recognised
2.1.3 Flash the recovery by executing the following command: fastboot flash recovery twrp-3.0.2-1-uhans-S1.img
The flashing process should look something like this:
PS C:\Users\UHANSd\Downloads> fastboot flash recovery twrp-3.0.2-1-uhans-S1.img
target reported max download size of 134217728 bytes
sending 'recovery' (11788 KB)...
OKAY [ 0.950s]
writing 'recovery'...
OKAY [ 0.281s]
finished. total time: 1.247s
2.2 Reboot to recovery
Now reboot to the recovery by first typing the fastboot reboot
command, then quickly pressing the Volume Up
+ Power
keys. You should see the familiar boot menu show up, from which, you should select the Recovery Mode
option this time.
2.3 On a successful installation you should see the TWRP logo show up and a prompt related to unlocking the device.
2.4 Enjoy your powerful recovery
Feel free to drop me a message should you require help or have any questions regarding this project.