When Android runs on a TV, it's still Android, there are just a few checks in place to make sure users aren't installing unprepared phone apps to their big screens all willy-nilly, creating the kind of awful UI experience that could make a techie cry and any one else scrunch their face in confusion. In a way, Google's only trying to protect us from ourselves. Most TV viewers will want nothing to do with such shenanigans, so only apps that have been updated and declared compatible with Android TV work with the platform out of the box.
The final round of Developer Preview images released on Friday left a number of users without root access on their devices, but a lightning fast quick-fix by Chainfire had them back in business the following day. Yesterday, he took to Google+ with a follow-up of how it works and the issues that are making it more difficult to acquire root on the latest version of Android.
Due to increasingly effective security measures and stricter enforcement of SELinux, it seems that many, or possibly all of the available methods for initializing the SuperSU daemon at startup have been rendered ineffective.
Technically the Developer Preview builds of Android L that Google issued are meant only for, well, developers. But of course a ton of regular users have downloaded them to try out Lollipop, and those users tend to be the same ones that like to use root apps. The updated Android 5.0 preview builds for the Nexus 5 and Nexus 7 2013 issued yesterday broke the existing root functions, so SuperSU developer Chainfire issued a quick fix.
Yesterday, Google's Camera app was updated to add a pretty handy remote shutter feature that can be used on a paired Android Wear wristwatch. But what if you're packing some serious camera equipment –let's say, something in the Canon EOS family– and you'd like to appear in some of your own shots from time to time? Chainfire has you covered with the latest update to his incredibly powerful DSLR Controller. Not only does the new version offer a remote shutter button on Android Wear, but it's also sporting some big improvements to the Timelapse feature, new white icons and faster wi-fi transfer speeds on KitKat, and fixes for the way SD cards are handled on KitKat and above.
Over the years, Google has been shoring up security on Android in a bid to make the operating system more attractive to governments and businesses, and to reduce the threat of malware for regular users. Unfortunately, these changes often come at the expense of flexibility in our beloved platform. As we close in on the next major release of Android, due to be announced next month, SuperSU developer Chainfire has discovered a set of commits to the Android Open Source Project (AOSP) that may seriously impact some of the functionality currently enjoyed by many root users.
Two weeks ago developer Chainfire rooted the international GSM-LTE version of the Galaxy S5. These things take time, but apparently not much of it. Barely two weeks later, the modder is back after having rooted six additional variants just in time for the official commercial launch. These include the T-Mobile, US Cellular, and MetroPCS models, the International Exynos option, and some shipped to various other parts of the Western Hemisphere.
According to Chainfire, the night mode and color adjustment features from Chainfire3D and the original CF.lumen Gingerbread apps are frequently requested. So frequent, in fact, that they're back for KitKat+ devices as CF.lumen on the Play Store.
If you've ever used f.lux for your PC, you know basically what to expect here - color temperature adjustments based on the time of day, bringing tones more in line with your eyes' expectations when the sun goes down.
That was fast. Despite the fact that the Galaxy S5 won't be released for another two weeks, well-known developer and modder Chainfire has already rooted the phone. Well, at least one of the Galaxy S5s (S Fives? Galaxies S5? whatever), specifically the SM-G900F model, which seems to be the international GSM-LTE version. The root method will probably work with at least some regional and carrier variants.
To get root privileges, check out this XDA-Developers post for Chainfire's latest version of the CF-Auto-Root tool, flashable via a PC with Samsung's ODIN tool.
Privacy and technology maintain a tenuous relationship, and the balance between convenient features and personal security is always one worth keeping in mind as users make the most of their devices' capabilities. To that end, Chainfire has released a new proof of concept app that aims to give users at least some peace of mind when it comes to the - for lack of a better term - trackability of their devices, specifically related to Wi-Fi.