If you're eager to test out Google's shiny new Maps interface on the web, but aren't so eager to wait for Google to invite you into their tender fullscreen embrace, then Android Police reader William Pickering has a trick to show you. All you need is Chrome (or another browser with the ability to manually set cookies), a free extension, and about a minute of time.
Step one: install a web cookie editor extension (like this one) from the Chrome Web Store.
Step two: head to maps.google.com. Ignore the "get the new Google Maps" message, and click the button for your new extension instead.
Several days ago, something happened that sent a not insignificant ripple through coverage of Google Glass: someone "jailbroke" the device.
Saurik, who posted the above photo to Twitter, had modified Glass' software "while in the Bay Area after picking it up from Google's headquarters in Mountain View."
Understandably, this idea was a bit bedeviling to the press – ostensibly, Glass is a relatively limited platform for developers, who can only write apps using a web-based API, allowing software to be integrated with the device over the internet. Eric Schmidt's words regarding the relative closed-ness (or at least, less-than-total openness) of Glass' platform to start were still wet on the page.
The rumor mill is hot today after a comment on XDA caused some to worry that CyanogenMod would not arrive for the new Galaxy S4. XpLoDWilD took to the forums to respond to questions about the difficulty of developing for the handset. The comment appeared to be speaking on behalf of TeamHacksung (the sub-group within CM that deals with devices like the SII, Note, SIII, Note II, etc.), other CM members were quick to point out that no one person has the authority to speak for the entire team.
Here's the initial comment:
Nobody at team hacksung (the team behind galaxy s2, note, s3, note2, gtabs...
When the Droid DNA was first announced, we were all surprised to find that the bootloader was unlockable at HTCdev.com. Because of this, the device actually got root, recovery, and custom kernel days before the official release. Unfortunately, by the time the device became available in retail channels, Verizon pulled the plug and it was no longer unlocked through official means.
Thankfully, there's another way (isn't there always?). The softmod below will effectively change the carrier information, allowing it to once again be unlocked via HTC's official tool.
Before we get started, special thanks to Sean Beaupre, who stepped in at the last minute and made this release possible.
In a feat that, according to the CyanogenMod team, serves "as an indication of potential," Jason Parker (aka kornyone) has managed to boot CyanogenMod 9 on the Nexus Q.
Starting with fastboot, adb pushing, and running "just about any sideloaded APK" (including XBMC), Parker has been pushing the Q's potential over the past week in an effort that has culminated in getting a CM9 build (based on the Tuna/Maguro repositories and prebuilt kernel) to run on the device. Not only does Parker have CM9 running on the Q, but he says that "overall it's functioning better than many devices I have ported on first boot."
Parker also notes, however, that the build is "very much a work in progress." While Wi-Fi, Bluetooth, and "much else" works, sound is not yet functional and SystemUI experiences frequent crashes.
Earlier this week, we mentioned that the amazing folks behind the XBMC project are bringing the app to Android. Well, it's still very early, but would you like to see what it's gonna be like? Of course you do. If you've got a Nexus Q or an Android-compatible set top box, you can download the apk from our mirrors below. For the rest of you, here's what it looks like running on a lovingly hacked Nexus Q, courtesy of Cyanogenmod developer Jason Parker:
The interface is still very much centered around arrow keys/a d-pad. Touch input does work, but text is very small on a phone and not much better on a tablet.
Giving us perhaps one of the most unique games I've ever played, 4gency released Node.Hack to the Play Store today. The game poses the player as "a digital warrior on the front lines, cracking the world's toughest computer systems for profit." Indeed, the object of the game is to hack through individual nodes to accrue thousands upon thousands of dollars and escape before being destroyed by enemy AI.
The first thing I noticed about Node.Hack was of course its visual style. The graphics in this game are obviously very simple, but that simplistic art style is extremely well-suited to the gameplay.
Yesterday, a security firm called zvelo demonstrated a vulnerability within Google Wallet, cracking its PIN verification system using brute force, giving Wallet access to anyone who had the exploit. It was also revealed that the hack only worked on rooted devices, and Google swiftly reported that a fix for the bug was already being worked on.
Adding to Google Wallet's security worries, a new hack was posted online today, claiming to give access to Google Wallet (sans PIN) on non-rooted devices, requiring just a few steps to gain user information (and funds).
The Smartphone Champ reported on the newly-discovered flaw, explaining just how the exploit works:
The security flaw is painfully easy to do and requires no extra software nor does it require root. All a person who wants to access your Google Wallet has to do is go into the application settings menu and clear the data for the Google Wallet app. After doing that your Google Wallet app will be reset and will prompt for you to set a new pin the next time you open it. The problem here is that since Google Wallet is tied to the device itself and not tied to your Google account, that once they set the new pin and log into the app, when they add the Google prepaid card it will add the card that is tied to that device. In other words, they’d be able to add your card and have full access to your funds.
Quite a few of us were overly excited when Hulu Plus landed in the Android Market last year, only to be crushed when we realized only a few select devices were compatible. While Hulu has been bringing support to more devices since the release, it's just moving entirely too slow. Many of us are blue in the face from holding our breath while waiting for support, and frankly, I gave up the wait a long time ago. In addition, we have yet to see much tablet support, which would be the logical device type to utilize for viewing video content.
Update: BurritoRoot may not work on version 6.0 firmware. If you're having trouble, update your firmware and try again.
On the historic date of December 20th, 2011, Amazon pushed out software version 6.2.1 to its Kindle Fire. The update was fairly minor -- its main additions had to do with improved scrolling and WiFi passwords -- but it brought about one devastating change: it broke all previous methods of root.
Seeing the issue, our own Justin Case got right to work; and after a night's worth of coding, with a group of fellow devs helping him through the testing process (namely, Vashypooh, Trevor Eckhart, and IOMoster), he developed a new method to root the Kindle Fire -- a method that works not only on software 6.2.1, but on all currently known versions of the Fire's OS (future updates make break this).