ChimeraTool

39.83.1257

٢٠‏/٠٦‏/٢٠٢٤

Generic Qualcomm Fixes and New Features

  • fixed a bug, which could cause the application to crash during the identify procedure
  • added a new feature, which continuously sends keep-alive messages to the Firehose port to avoid unexpected reboot of the device
  • added a new feature, which keeps track of the supported flash type for a given programmer: it will speed up the Identify procedure
  • speed of the Xiaomi authentication mechanism was improved
  • Chimera will hide Unlock Bootloader procedure for ZTE devices if they're not supported
  • fixed a bug, which prevented many users from accessing programmers for Oppo Dynamic FRP Remove (more info)

New programmers have arrived!

  • added new Samsung Qualcomm programmer for Samsung Galaxy A23 (SM-A235F BIT6)
  • Added new Oppo Qualcomm programmers. The following models are supported:
    • OPPO A3s
    • OPPO A7
    • OPPO A5
    • OPPO A12e
    • OPPO R15 Neo
    • Realme 2
    • Realme C1
الی الخلف

Dear Guest,

We would like to inform you that as from 25 May 2018, our company acts according to the General Data Protection Regulation (GDPR) of the European Union.

Please note some of our main aspirations to protect our customers’ security and personal data. We have always paid special attention to user data and the way we process them, but let us show you some examples:

We provide the option to delete your profile
You can initiate this on the https://chimeratool.com/#user-settings page.

You can always check where else you are signed in from to the site, and if that is not you, you can sign out that browser. https://chimeratool.com/#user-sessions

As a first line of defense, your data is protected by security systems specialized in preventing hacking attacks, but our other self-developed security solutions and our ever-running monitoring systems enable us to declare with great certainty that we do everything to prevent unauthorized users from acquiring any sensitive data.

In case of a potential unauthorized physical access to any of our servers, the data stored there is useless, as our storage media are protected by sector-level AES encryption.

All passwords we store are unknown to us as well, since only the passwords’ hash values are stored, randomized with “salt”. This minimizes the risk of any leakage of actual user passwords in case of a potential database leak.

 Got it