diff --git a/README.md b/README.md
index 0f9211d..1d3cc0f 100644
--- a/README.md
+++ b/README.md
@@ -6,9 +6,6 @@ An exploit for Chrome devices which allows people to unenroll devices with devic
> ANYTHING GOOGLE CAN REMOTELY PERFORM ON YOUR DEVICE, ICARUS CAN BE USED TO DO. AN EXAMPLE OF THIS IS INSTALL EXTENSIONS, SPY, USE YOUR CAMERA, REMOTE INTO YOUR DEVICE, GET YOUR PASSWORDS, AND MORE.
> ONLY SELF HOST ICARUS, NEVER USE A PUBLIC SERVER!
-## New configs?
-"New configs" have rolled keys. We are testing the compatibility of these new keys for interception.
-
## Setup and installation instructions
Clone the repo with ``git clone --recursive https://git.kxtz.dev/kxtzownsu/icarus/` and change directory to it.
@@ -60,6 +57,12 @@ Reboot the device. You'll boot into verified mode. Once you have your server run
- If that didn't work, powerwash your device and re-run the modified shim, and keep the server running.
+
+ make_out.sh is prompting me for a password!
+
+ The password is 'icarus' without quotes.
+
+
## Credits
- [MunyDev](https://github.com/MunyDev) - Creating this exploit
- [Archimax](https://github.com/EnterTheVoid-x86) - Cleaning up get_original_data.sh and inshim.sh + README changes