From bc47be16f450ae4cc1ccdf53e0f7c32714d1bcc7 Mon Sep 17 00:00:00 2001 From: David Buchanan Date: Fri, 21 May 2021 16:10:23 +0100 Subject: [PATCH] Update README --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index f4d547f..e121004 100644 --- a/README.md +++ b/README.md @@ -21,7 +21,7 @@ we cannot make any guarantees. This may void your warranty. 1. Make sure the "LG Connect Apps" feature is enabled. It seems to be enabled by default on webOS 4.0+. For older models, follow [LG's instructions.](https://www.lg.com/in/support/help-library/lg-webos-tv-how-to-use-lg-connect-apps-CT20150005-1437127057046) -2. Open the web browser app and navigate to [https://rootmy.tv](https://rootmy.tv) +2. Open the TV's web browser app and navigate to [https://rootmy.tv](https://rootmy.tv) 3. "Slide to root" using a Magic Remote or press button "5" on your remote. 4. Accept the security prompt. 5. The exploit will proceed automatically. The TV will reboot itself once