The LDI file is generated by the web service, so theoretically there's nothing to hack on the client, but the system app is easy to locate and download, so that didn't really stop anything.
The LDI file is generated by the web service, so theoretically there's nothing to hack on the client, but the system app is easy to locate and download, so that didn't really stop anything.
5. The firmware layout consists of the bootloader, then apps System, MfgTest, Surgeon,
5. The firmware layout consists of the bootloader, then apps System, MfgTest, Surgeon,
4. The device itself shows up as a USB drive that's is all zeroes by default, so doesn't show in Explorer.
4. The device itself shows up as a USB drive that's is all zeroes by default, so doesn't show in Explorer.
3. .lfp files are ZIPs, .lf2 files are .tar.bz2, and .lf3 files are encrypted .lf2 files.
3. .lfp files are ZIPs, .lf2 files are .tar.bz2, and .lf3 files are encrypted .lf2 files.
1. Tried out LeapFrog Connect, it's basically a Qt webview wrapper with a websocket interconnect and some other messaging stuff. Surprising amount of the backend service calls are from the web app. It does way too much logging.
1. Tried out LeapFrog Connect, it's basically a Qt webview wrapper with a websocket interconnect and some other messaging stuff. Surprising amount of the backend service calls are from the web app. It does way too much logging.