EFT Post All Successfully Repaired Phones by EFT Dongle

EFT Dongle

GsmToto

Super Moderator
Jan 1, 2021
5,686
22,392
UK
Skype
gsmtoto
Sonork ID
100.1684601
Preparing Environment : OK
Check Apple drivers..... ✓..
Checking iDevices.....OK
Checking SSH......Checking SSH......P:14..OK
Reading iDevice info.....OK
Activation Status: Unactivated
BuildVersion: 19H394
CPU Arch: arm64
Device Class: iPhone
Device Name: iPhone
Firmware Version: pongoOS-2.6.3-3ce56339
Device IMEI: 359204074236048
Product Name: iPhone OS
Product Type: iPhone 7
IOS Version: 15.8.5
SIM Status: kCTSIMSupportSIMStatusNotInserted
Device Serial Number: F17SF3SZHG7F
DeviceID: 9190ddf105cf77a1758d9cb80cf5b5cce7234b84
MEID Status: Not Supported
Preparing Hello....OK
Generating Activation Files....OK
Uploading recache buffer - Success
Uploading getkey buffer - Success
Uploading kernel buffer - Success
Setting permissions...
Executing recache and kernel...
Kernel execution failed. Cleaning up...
Error Activate
Operation {Hello Screen ios 11.x/18.x} ID: 0B892200AA46FD3D
Elapsed time 00:16 -- Version 5.3.3 Release 0001 Build 582
 

halees

Junior Member
Nov 3, 2020
1
0
hebron
iphone 13 pro max bypass

Preparing Environment : OK

Monitoring for device...

✓ Device Connected

Model: A15 | 13 Pro Max Bypass (iPhone14,3)

iOS Version: 26.1

Serial Number: FVMC9YMX2T

UDID: 00008110-000E6888012A801E

Activation State: Unactivated

Unsupported iOS version: 26.1

User chose to proceed although the version is under testing.

Starting activation process...

Starting attempt 1/6

Activation attempt 1 in progress...

Rebooting device via IosClass_ method...

Device rebooted successfully

Waiting for device to reconnect...

Device reconnected successfully

Collecting system logs...

System logs collected successfully via IosClass_ method

Extracting log archive: 00008110-000E6888012A801E.logarchive

Log archive extracted successfully to: C:/eft pro/./00008110-000E6888012A801E.logarchive

Analyzing device data...

Contacting activation server...

Server response received successfully

Downloading activation data...

Activation data downloaded successfully

Removing file from device

File removed successfully from device

Removing file from device

File removed successfully from device

Removing file from device

File removed successfully from device

Applying activation data to device via IosClass_ method...

Activation data applied successfully via exe method

Rebooting device via IosClass_ method...

Device rebooted successfully

Waiting for device to reconnect...

Device reconnected successfully

Attempt 1 failed

Preparing next attempt...

Starting attempt 2/6

Activation attempt 2 in progress...

Rebooting device via IosClass_ method...

Device rebooted successfully

Waiting for device to reconnect...

Device reconnected successfully

Collecting system logs...

System logs collected successfully via IosClass_ method

Extracting log archive: 00008110-000E6888012A801E.logarchive

Log archive extracted successfully to: C:/eft pro/./00008110-000E6888012A801E.logarchive

Analyzing device data...

Contacting activation server...

Server response received successfully

Downloading activation data...

Activation data downloaded successfully

Removing file from device

File removed successfully from device

Removing file from device

File removed successfully from device

Removing file from device

File removed successfully from device

Applying activation data to device via IosClass_ method...

Activation data applied successfully via exe method

Rebooting device via IosClass_ method...

Device rebooted successfully

Waiting for device to reconnect...

Device activated during reconnection

=== ACTIVATION SUCCESSFUL ===

Device has been successfully activated!

Operation {Bypass A12} ID: D21A790C1965DF08

Elapsed time 04:20 -- Version 5.3.3 Release 0001 Build 582
 
Top