I also looked into the Russian firmware that allows for an equalizer file. These hackers (Xvortex is apparently well known for a Playstation4 exploit) have used a modified "mplayer" binary (it's in /usr/bin/hciplayer) that they probably recompiled using the Ingenic X1000E toolchain (see eg. http://www.ingenic.com.cn/en/?news/tp/228.html and ftp://94.23.144.183/mirror/ftp.ingenic.cn/3sw/01linux/06docs/20100304/mips_toolchain_guide_EN.pdf). This new mplayer binary apparently looks for the proper file in /mnt/mmc (where the SD card is mounted) and uses this for mplayer equalization (see -af equalizer flag, e.g. see http://bird1110.blogspot.com/2011/03/reduce-bass-in-mplayer-using-af.html). A nice change really, something that Shanling should also be able to do with little effort in addition to the on-screen editing tool.
Overall, I'm no expert, but it looks like the update.bin archive is essentially the result of using "signapk" (an Android archive signing tool) on split zip files. It's likely that the original Android certificates were used for signing. If XVortex or Alex_nsk read this post, I hope they will post an open source M0 firmware "repacking script" for others to play with the firmware
Overall, I'm no expert, but it looks like the update.bin archive is essentially the result of using "signapk" (an Android archive signing tool) on split zip files. It's likely that the original Android certificates were used for signing. If XVortex or Alex_nsk read this post, I hope they will post an open source M0 firmware "repacking script" for others to play with the firmware