Disable or Bypass DAA and SLA Authentication on Xiaomi, Poco or Redmi devices

17 Likes Comment

In this guide, we will show you how to disable or bypass DAA and SLA authentication on Xiaomi, Poco and Redmi devices. Recently, the Poco and Redmi sub brands separated from their parent company Xiaomi and now are independent brands, but they still use many resources from the Xiaomi brand, such as the MIUI software. The Redmi devices belong more to the budget category, while Poco devices offer some high performing devices. The flagship devices are offered by Xiaomi itself with the Mi lineup. Even though the devices lie in different categories, they all are impressive in their area and are known for the custom development options.

As soon as the Kernel source code of a device is out, the options for custom binaries for the device and modifications are endless. These include installing custom ROMs, installing a custom recovery such as TWRP and even rooting your device using Magisk. But all of these tweaks and modifications also pose risks. If you do not perform any of these tweaks or flashing process correctly, you could end up with a bricked device. But if you use a device from Xiaomi, Redmi or Poco running on a Mediatek chipset, you should not worry because there is a way out for you.

If you ever end up getting your device bricked, you can always flash stock firmware back on to your device and bring it back to normal working condition. But the introduction of DAA and SLA authentication has made this task very difficult. You can not flash custom ROM back on to your device without bypassing the authentication. But there is useful way in which you can work around this issue. So in this guide, we will be showing you how to disable or bypass DAA and SLA authentication on Xiaomi, Poco and Redmi devices. Read on!

bypass DAA and SLA authentication on Xiaomi

What are DAA and SLA Authentications

Many devices from various brands ship their devices with a locked bootloader in order to prevent users from flashing unofficial ROMs and removing the stock firmware. But still, users have the option to deviate from the stock ROM by unlocking the bootloader of the device. But when you end up with a bricked device, you do not get such options to flash firmware on your device. Coupled with that, the introduction of Download Agent Authentication and Serial Link Authentication make it even more difficult for users to unbrick their device. Why do these authentications make it harder for them?

The function of these two authentications is to only allow authorized users to flash or install any firmware on to bricked devices. These security protocols perform an authentication check by matching the decrypted string with the user account. If the users account does not match with the authorized Mi account, then the user would not be able to carry out the flashing process. But now you do not need to sweat over it as it is now possible to disable or bypass DAA and SLA authentication on Xiaomi, Poco and Redmi devices. Read on further for instructions regarding the same.

Disable or Bypass DAA and SLA Authentication on Xiaomi, Poco, or Redmi devices

STEP 1: First of all, you to download and configure Mediatek drivers on your PC.

STEP 2: After that, you are required to download the latest version of Python on your PC.

Disable or Bypass DAA and SLA Authentication on Xiaomi, Poco or Redmi devices 1

STEP 3: Open the directory where Python is installed and then type in cmd in the search bar and follow by pressing Enter. The Command Prompt will automatically pick up Python’s installation directory.

Disable or Bypass DAA and SLA Authentication on Xiaomi, Poco or Redmi devices 2

STEP 4: After that, type in the following command in the command window:

python -m pip install pyusb pyserial json5

STEP 5: Once done, you have to download the libusb-win32-devel-filter file. Once it is downloaded, launch the setup file and then follow the instructions provided on screen to completely install it on your computer. These drivers are important because they will help your computer identify your Xiaomi, Redmi or Poco device that is connected and work properly with it, eventually allowing you to bypass DAA and SLA authentication on your Xiaomi Poco or Redmi device.

STEP 6: After the LIB Win32 tool has been installed, open it up. After that, head over to the driver section and then select MediaTek USB Port from the list that appears and then press on install.

STEP 7: Once the driver has been installed connect your device to your PC using a USB cable, while holding the Volume Up key of your device as well.

STEP 8: Then you are required to download the Xiaomi Bypass tool. Once done, extract the file to any convenient location on your PC and then proceed to the bypass folder. Now you will see the brom.bat file inside it. Double click on it in order to launch it.

STEP 9: After that, you are required to download and install the SP Flash Tool on your PC. As soon as the installation is complete, you can launch it by running the flash_tool.exe file.

Disable or Bypass DAA and SLA Authentication on Xiaomi, Poco or Redmi devices 3

STEP 10: When the tool has been launched, go to options. You can use the Ctrl+Shift+O shortcut key to go immediately.

STEP 11: Now you are required to select the Connections tab from the menu you see on your left and then you have to select UART under Connection Settings.

Disable or Bypass DAA and SLA Authentication on Xiaomi, Poco or Redmi devices 4

STEP 12: So that is it! With this, you can bypass DAA and SLA authentication on Xiaomi, Redmi and Poco devices.

So that was it from our side on how to disable or bypass DAA and SLA authentication on Xiaomi, Redmi and Poco devices. We hope that you found this guide helpful. Let us know what you think in the comment section below.

You might like

About the Author: Uzair Hussain

Uzair Hussain is a dedicated writer who loves to read and research about android phones and technology. Has always enjoyed exploring further into tech and likes to share his knowledge through publishing writings.

Leave a Reply

Your email address will not be published. Required fields are marked *