Update README.md

pull/4/head
David Buchanan 2021-06-13 15:32:12 +01:00 zatwierdzone przez GitHub
rodzic d2ffff304c
commit 482fbf56ed
Nie znaleziono w bazie danych klucza dla tego podpisu
ID klucza GPG: 4AEE18F83AFDEB23
1 zmienionych plików z 5 dodań i 4 usunięć

Wyświetl plik

@ -27,10 +27,11 @@ we cannot make any guarantees. This may void your warranty.
1. Make sure the "LG Connect Apps" feature is enabled. It seems to be enabled by default on 1. Make sure the "LG Connect Apps" feature is enabled. It seems to be enabled by default on
webOS 4.0+. For older models, follow [LG's instructions](https://www.lg.com/in/support/help-library/lg-webos-tv-how-to-use-lg-connect-apps-CT20150005-1437127057046). webOS 4.0+. For older models, follow [LG's instructions](https://www.lg.com/in/support/help-library/lg-webos-tv-how-to-use-lg-connect-apps-CT20150005-1437127057046).
2. Open the TV's web browser app and navigate to [https://rootmy.tv](https://rootmy.tv) 2. (Optional but recommended) If you have LG's Developer Mode app installed, uninstall it. You won't be able to use it after running the exploit, and its functionality is replaced by the Homebrew Channel.
3. "Slide to root" using a Magic Remote or press button "5" on your remote. 3. Open the TV's web browser app and navigate to [https://rootmy.tv](https://rootmy.tv)
4. Accept the security prompt. 4. "Slide to root" using a Magic Remote or press button "5" on your remote.
5. The exploit will proceed automatically. The TV will reboot itself once 5. Accept the security prompt.
6. The exploit will proceed automatically. The TV will reboot itself once
during this process, and optionally a second time to finalize the installation during this process, and optionally a second time to finalize the installation
of the Homebrew Channel. On-screen notifications will indicate the exploit's of the Homebrew Channel. On-screen notifications will indicate the exploit's
progress. progress.