Android Police

Articles Tagged:



Some Nexus 6P Owners Are Reporting Spontaneously Broken Rear Glass Panels

The early reaction to the Nexus 6P from both critics and owners has been mostly positive, but a few new owners seem to be encountering serious problems. Specifically, the glass panel on the rear of the phone, which covers the camera, LED flash, and laser autofocus module, is reportedly cracking and breaking on its own. A user on the Android subreddit reported the rear panel cracking, and at least two others have corroborated with similar stories, with the panel splitting into multiple cracks with no particular rough handling or impact.

Read More

Cracking Glass – Saurik Posts Account Of Google Glass Root, Controversy, Exploits, And How To Crack Your Own Glass

Several days ago, something happened that sent a not insignificant ripple through coverage of Google Glass: someone "jailbroke" the device.


Saurik, who posted the above photo to Twitter, had modified Glass' software "while in the Bay Area after picking it up from Google's headquarters in Mountain View."

Understandably, this idea was a bit bedeviling to the press – ostensibly, Glass is a relatively limited platform for developers, who can only write apps using a web-based API, allowing software to be integrated with the device over the internet. Eric Schmidt's words regarding the relative closed-ness (or at least, less-than-total openness) of Glass' platform to start were still wet on the page.

Read More

Google Wallet's PIN Verification Cracked (Again), No Root Access Required

Yesterday, a security firm called zvelo demonstrated a vulnerability within Google Wallet, cracking its PIN verification system using brute force, giving Wallet access to anyone who had the exploit. It was also revealed that the hack only worked on rooted devices, and Google swiftly reported that a fix for the bug was already being worked on.

Adding to Google Wallet's security worries, a new hack was posted online today, claiming to give access to Google Wallet (sans PIN) on non-rooted devices, requiring just a few steps to gain user information (and funds).

The Smartphone Champ reported on the newly-discovered flaw, explaining just how the exploit works:

The security flaw is painfully easy to do and requires no extra software nor does it require root.  All a person who wants to access your Google Wallet has to do is go into the application settings menu and clear the data for the Google Wallet app.  After doing that your Google Wallet app will be reset and will prompt for you to set a new pin the next time you open it.  The problem here is that since Google Wallet is tied to the device itself and not tied to your Google account, that once they set the new pin and log into the app, when they add the Google prepaid card it will add the card that is tied to that device.  In other words, they’d be able to add your card and have full access to your funds.

Read More

Logitech Revue Rooted Using Soldering Iron, USB Drives, And Un-Updated Firmware

It's taken months of blood, sweat, and tears, but the Logitech Revue has finally been rooted!

Before you get too excited, I must warn you that the process isn't for the faint of heart (you'll have to physically crack open the Revue's box and solder some wires in), and you'll need a brand new device that hasn't received any firmware updates.

That said, there will undoubtedly be those of you eager to give it a shot, so if your device qualifies, go ahead - instructions lie below.

Hardware Portion

In order to complete the root you will need an un-updated box, it seems as if the first or second update to the box closed the serial access hole.

Read More