From 482fbf56edbda13bf0d98ec7459105689b8f3cfc Mon Sep 17 00:00:00 2001 From: David Buchanan Date: Sun, 13 Jun 2021 15:32:12 +0100 Subject: [PATCH] Update README.md --- README.md | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index f04c16b..e8bbceb 100644 --- a/README.md +++ b/README.md @@ -27,10 +27,11 @@ we cannot make any guarantees. This may void your warranty. 1. Make sure the "LG Connect Apps" feature is enabled. It seems to be enabled by default on webOS 4.0+. For older models, follow [LG's instructions](https://www.lg.com/in/support/help-library/lg-webos-tv-how-to-use-lg-connect-apps-CT20150005-1437127057046). -2. Open the TV's web browser app and navigate to [https://rootmy.tv](https://rootmy.tv) -3. "Slide to root" using a Magic Remote or press button "5" on your remote. -4. Accept the security prompt. -5. The exploit will proceed automatically. The TV will reboot itself once +2. (Optional but recommended) If you have LG's Developer Mode app installed, uninstall it. You won't be able to use it after running the exploit, and its functionality is replaced by the Homebrew Channel. +3. Open the TV's web browser app and navigate to [https://rootmy.tv](https://rootmy.tv) +4. "Slide to root" using a Magic Remote or press button "5" on your remote. +5. Accept the security prompt. +6. The exploit will proceed automatically. The TV will reboot itself once during this process, and optionally a second time to finalize the installation of the Homebrew Channel. On-screen notifications will indicate the exploit's progress.