Confirmed (see screenshot), last firmware update was October 17th, version 1.18.7. There might have been some 'emergency' firmware quickly installed on the previous poster's friend's E4 to counteract this hack, but it seems the most current 'official' version is still hackable. I should be receiving my camera tomorrow, will report back.
And let's not discount the possibility of
user error. This is only one report, and not first hand, right? Anyways, we'll find out soon enough when more people get their E4. Especially the ones currently on backorder.
Should the newer firmwares really be fixed for the current hack, there's still loads of options. If this really is a "fix the hack" update, then the obvious choice is just downgrade to a known to work version. Either through the standard FlirInstallNet, or absolute worst case it's jtag time.
Incidentally, I was reversing the usb protocol used by FlirInstallNet ... but I got a bit sidetracked.
Currently busy with a python script for unlocking some features + generic data logging.
At any rate, if the 1.20.3 firmware really is a Flir fix in response to the E4 hack then it would be useful if we could get the versions + build dates. And obviously a dump of the new firmware.
Did I understand correctly that the USB mode menu is no longer working on 1.20.3? Or maybe they just bound it to a new key combo.