kopia lustrzana https://github.com/RootMyTV/RootMyTV.github.io
Update README.md
rodzic
d2ffff304c
commit
482fbf56ed
|
@ -27,10 +27,11 @@ we cannot make any guarantees. This may void your warranty.
|
|||
|
||||
1. Make sure the "LG Connect Apps" feature is enabled. It seems to be enabled by default on
|
||||
webOS 4.0+. For older models, follow [LG's instructions](https://www.lg.com/in/support/help-library/lg-webos-tv-how-to-use-lg-connect-apps-CT20150005-1437127057046).
|
||||
2. Open the TV's web browser app and navigate to [https://rootmy.tv](https://rootmy.tv)
|
||||
3. "Slide to root" using a Magic Remote or press button "5" on your remote.
|
||||
4. Accept the security prompt.
|
||||
5. The exploit will proceed automatically. The TV will reboot itself once
|
||||
2. (Optional but recommended) If you have LG's Developer Mode app installed, uninstall it. You won't be able to use it after running the exploit, and its functionality is replaced by the Homebrew Channel.
|
||||
3. Open the TV's web browser app and navigate to [https://rootmy.tv](https://rootmy.tv)
|
||||
4. "Slide to root" using a Magic Remote or press button "5" on your remote.
|
||||
5. Accept the security prompt.
|
||||
6. The exploit will proceed automatically. The TV will reboot itself once
|
||||
during this process, and optionally a second time to finalize the installation
|
||||
of the Homebrew Channel. On-screen notifications will indicate the exploit's
|
||||
progress.
|
||||
|
|
Ładowanie…
Reference in New Issue