Thanks for your response. Output is:
Code:
$ adb shell getprop | grep finger
[init.svc.fptoolfingerprint]: [running]
[ro.bootimage.build.fingerprint]: [ONYX/BOOX/BOOX:11/RKQ1.210614.002/200:userdebug/release-keys]
[ro.build.fingerprint]: [ONYX/BOOX/BOOX:11/RKQ1.210614.002/200:userdebug/release-keys]
[ro.build.version.preview_sdk_fingerprint]: [REL]
[ro.odm.build.fingerprint]: [ONYX/BOOX/BOOX:11/RKQ1.210614.002/200:userdebug/release-keys]
[ro.product.build.fingerprint]: [ONYX/BOOX/BOOX:11/RKQ1.210614.002/200:userdebug/release-keys]
[ro.system.build.fingerprint]: [ONYX/BOOX/BOOX:11/RKQ1.210614.002/200:userdebug/release-keys]
[ro.system_ext.build.fingerprint]: [ONYX/BOOX/BOOX:11/RKQ1.210614.002/200:userdebug/release-keys]
[ro.vendor.build.fingerprint]: [ONYX/BOOX/BOOX:11/RKQ1.210614.002/200:userdebug/release-keys]
Using the tool linked from the decryptBoox update github page, I got the following strings:
Code:
"MODEL" = "TabUltra",
"STRING_SETTINGS" = "zsb+9c4SzqrAnPkdtIaoKcw4r5gjLr+anKJDYlypaMR+",
"STRING_UPGRADE" = "yrX2h8weyduHDTK+oWbibAXbqBjGbDyEjeDb1pRRmkIl"
# fingerprint: ONYX/BOOX/BOOX:11/RKQ1.210614.002/200:userdebug/release-keys