![]() ![]() That gives access to the hijacked app's capabilities.Ī full tutorial for the SD-based approach is here. The SD-based interop unlock worked by moving some OEM app from the store (one that had ID_CAP_INTEROPSERVICES) to the SD card, then using a sideloaded app to hijack the app on the SD card (there's a process there, but it was mostly automated by the end, just install and run the relevant apps). There are variations on the instructions that might work if the app is on the SD card, though that's actually harder to recover in some cases (the app data on the SD card is encrypted not hard to defeat the encryption but it can complicate recovery). Neither of these approaches will give you the ability to magically "undelete" files (you can try using a file recovery tool if you do the USB Mass Storage route, but if the files were deleted some time ago they've almost certainly been overwritten).įinally, note that these instructions assume the app in question was installed to the phone's internal storage, not to the SD card. However, I'll do my best.Īlso, be aware that it's entirely possible that the data you seek is gone forever. Please bear in mind that it has been many years since I worked with WP8.1 and I have forgotten some details.
0 Comments
Leave a Reply. |