If you're going to do any serious modding on your Android smartphone, your first step is going to be unlocking the bootloader. This is a simple procedure on Nexus devices and a few other handsets, but many of the top OEMs have added security measures to prevent regular users from mucking about with their stock software. For these devices, there's a tool called Sunshine by recognized developers Justin Case (jcase), beaups, and friends.
Much to the chagrin of cell carriers and hardware manufacturers, there are still many in the Android community that choose to delve into the world of hacking and modding their phones. Owners of the Verizon Moto G are certainly in this crowd, and they've been eagerly awaiting a reliable method for unlocking their bootloaders. It turns out that their wait ends today. Sunshine, a tool built by Justin Case, Beaups, and others to unlock HTC and Motorola phones, just gained support for the Moto G on Verizon.
You saw Android Wear a couple of months ago when Google unveiled the SDK and both LG and Motorola presented the first promotional pictures. Then you watched the Google I/O keynote that officially launched the LG G Watch and Samsung's surprise addition of the Gear Live. And now you've got a shiny, brand new Android Wear watch before you... but all you can think about is ripping into the digital guts of that thing and doing all of the awful things that Google never intended.
There are a few ways to get root access on HTC's new lineup of smartphones, but root only gets you so far. If you really want to hack around, you'll want an unlocked bootloader and s-off. That's what you get with the new SunShine tool from Justin Case, Beaups, and associates. This time, however, the free lunch is over.
The new Xperia Z1s on T-Mobile is almost identical to the international Z1, except for the radio bands and some software tweaks. One thing that definitely isn't the same is the bootloader – it appears that T-Mobile has requested Sony not allow bootloader unlocks on this device. For a company trying to upend the traditional carrier model, this is awfully old-fashioned carrier behavior.
If you like to mod your Nexus devices but you're also a fan of tight security, you probably already know BootUnlocker. It's a simple app that allows rooted devices to lock and unlock the bootloader without wiping user data. The developer, segv11, is back with v1.5.1 of this handy little utility. The latest update adds support for the WiFi (flo) and LTE (deb) variants of the 2013 Nexus 7 and the ability to set the tamper flag on the Nexus 4 (mako) and Nexus 5 (hammerhead).
As a follow up to our recent PSA on bootloader quirks with GPE devices, we thought it would be a good idea to shed some light on a bootloader anomaly which affects both Nexus and GPE devices. Recently, there have been changes to the way unlocking happens behind the scenes. These changes can result in a device that infinitely boots into recovery.
Traditionally, when you decide to unlock and flash a custom recovery, the procedure goes something like this:
You type "fastboot oem unlock" from the command line.
In addition to things like stock Android and being carrier-unlocked, one of the big features of Nexus and Google Play Edition devices that Android power users love is an easily unlockable bootloader. While OEMs and carriers often make a policy of locking their devices' bootloaders to prevent installation of unauthorized software, Google makes it very easy for us to tinker with devices bearing its brand. All you really need to unlock a Google device is a tool called "fastboot," which is made available through the Android SDK.
Did you know it's possible to unlock your Nexus 5 bootloader without wiping user data? If your device has already been rooted and relocked for optimal security, then unlocking is just a button tap away thanks to the latest update to BootUnlocker. Support for Google's latest flagship phone was just added with an update to version 1.4 of the app from XDA member segv11. Sadly, both generations of the Nexus 7 from ASUS remain unsupported.