ChimeraTool

NotificationsTurn on notifications to get up-to-date application version information!Subscribe!  No thanks

31.54.1208

Mar 18, 2022

Patch IMEI procedure supports all Xiaomi devices with MTK SoCs from now, including MT68XX devices.

List of supported phones:

  • Redmi Note 10 5G/Redmi Note 10T 5G/POCO M3 Pro 5G (camellia)
  • Redmi Note 10 5G/Redmi Note 10T/POCO M3 Pro (camellian)
  • Redmi Note 11 5G/Redmi Note 11T 5G (evergo)
  • POCO M4 Pro 5G (evergreen)
  • Redmi Note 9 5G (cannon)
  • Redmi Note 9T (cannong)
  • Redmi 10X 5G (atom)
  • Redmi 10X Pro (bomb)
  • Redmi Note 11 Pro/Pro+/Redmi Note 11 Pro+ 5G/Xiaomi 11i 5G/Hypercharge (pissarro)
  • Redmi K30 Ultra (cezanne)
  • Xiaomi 11T (agate)
  • Redmi K40 Gaming/POCO F3 GT (ares)
  • Redmi Note 10 Pro 5G/POCO X3 GT (chopin)

The phone goes back to its original state after a firmware update or an OTA update, so it’s mandatory to disable automatic OTA updates of the phone.

For further information please visit the following link: https://chimeratool.com/en/docs/mtk-xiaomi-patch-imei .

Back

Dear Guest,

We would like to inform you that as from 25 May 2018, our company acts according to the General Data Protection Regulation (GDPR) of the European Union.

Please note some of our main aspirations to protect our customers’ security and personal data. We have always paid special attention to user data and the way we process them, but let us show you some examples:

We provide the option to delete your profile
You can initiate this on the https://chimeratool.com/#user-settings page.

You can always check where else you are signed in from to the site, and if that is not you, you can sign out that browser. https://chimeratool.com/#user-sessions

As a first line of defense, your data is protected by security systems specialized in preventing hacking attacks, but our other self-developed security solutions and our ever-running monitoring systems enable us to declare with great certainty that we do everything to prevent unauthorized users from acquiring any sensitive data.

In case of a potential unauthorized physical access to any of our servers, the data stored there is useless, as our storage media are protected by sector-level AES encryption.

All passwords we store are unknown to us as well, since only the passwords’ hash values are stored, randomized with “salt”. This minimizes the risk of any leakage of actual user passwords in case of a potential database leak.

 Got it