If I were looking at it, I think the first approach would be to figure out how an old unit that was upgraded during repair was still able to be hacked ( see a few pages back) if you can convince the SW it's running on an older unit, that may be a potential way forward.
Hi there -
I've been lurking around this forum for some time and also own a "pimped" E4 (originally with a 1.19.8 on a 1.1 H/W) but this topic now convinced me to sign in and report my findings. Being the type of guy who loves to play around and experiment with these things on one side and somewhat a perfectionist on the other, I always got a little annoyed about the fact the flirtools still recognized my "E4++" as an E4 and also tagged the downloaded images as such.
This made me experiment with the service menu and the eeprom settings where I finally was able to change the camera into a "real" E8. Now I couldn't resist to use the software update function of flirtools to update the code to 2.3.0 (we've got a -pimped- 1.22.0 at work which seems to utilize the calibrating shutter much less frequently than mine which goes through this procedure annoyingly often, so I expected a F/W update to change this) and the worst thing that could happen (in my opinion) would be that I cannot take the way back anymore. Having bought the camera inexpensively (well, sort of...) second hand, I wouldn't have to bother about losing its warranty anyway.
Well, to cut a long story short, the update procedure went through but upon the final reboot, I got an error message that the update was unsuccessful. Strange thing, since the Camera is running okay (with the menus of a stock E8) and reports a F/W 2.3.0 in the on-screen sysinfo. In the config files, it's tagged as a "2.3.0*". It still reported errors in the FlirInstallNet's "check installation" function but I got that sorted by manually copying the appkit.rev and prodkit.rev files from the update container to the installation directories.
The files are not encrypted or in any other way scrambled compared to the 1.19.8 original configuration. So I assume that the encryption mechanism is either related to a hardware change or it lies burried deeply in the operating system files (maybe in the bootloader??) that cannot be replaced easily by a firmware update.
I don't know if this information helps getting closer to the point but having benefitted so much from all your work here, I think it's only fair to try to contribute something in return.
Cheers,
Thomas