Love it or hate it, the LG G3 is one of the top flagship devices of 2014. With a set of specs that will make even the most jaded Nexus warrior a bit jealous, it's no wonder that the handset has gained a few fans. Unfortunately, LG's software customizations still leave a lot to be desired, and many users have turned to rooting their phone to take back some level of control over the experience.
Ask anybody that spends time in the security circles and they'll tell you that every large software project is bound to have a few long-standing vulnerabilities in the code. Fortunately, there are usually a few people who are paid to close up those holes so you, the customer, don't find yourself the victim of nefarious evildoers someday. Like so many before it, the latest update to Android came with a boatload of changes, at least one of which fixes a potentially dangerous vulnerability that can be used for numerous attacks, including a way to acquire root.
You've taken the plunge and thrown down some cold hard cash on a brand new HTC One M8, but you're feeling stifled because Verizon doesn't want to allow the bootloader to be unlocked? You might want to check out WeakSauce, a handy new root exploit by XDA recognized developers Justin Case (jcase) and beaups. It's a simple tool that can set up root on both the HTC One M8 and last year's model, the HTC One (codenamed M7).
This contest is now over.
The final results are listed below. If you've won, you will be contacted in the near future. Congratulations!
Any decent bank heist movie always has one common hurdle for the would-be thieves: a regularly changing access code to the vault, and only one person knows what it is.
Some Moto X owners weren't particularly happy to learn that a recent OTA with improvements to the camera also had the undesirable consequence of breaking root acquired through PwnMyMoto. Fortunately, the creator of PwnMyMoto, Justin Case, is back with an updated root method that works on the latest Moto X update and should be compatible with all recent Motorola firmwares.
Update: RockMyMoto is confirmed to also work on the latest firmwares for the Droid Maxx, Ultra, and Mini.
That didn't take long. Just 2 days after Justin Case released a root method for the Moto X, Droid Ultra, Droid Mini, and Droid Maxx, he's already back with a hack that bypasses write protection. By disabling the write protection afforded by the bootloader, it becomes possible to flash 3rd-party ROMs, themes, and other mods. In other words, the flood gates are open for the modding community.
Much like MotoRoot, PwnMyMoto is packaged as a single app that must be sideloaded with adb.
When buying used phones off of eBay, Craigslist, or the like, a primary concern of anyone purchasing CDMA devices (Verizon, Sprint, Boost Mobile, Virgin Mobile, etc.) is the status of the phone's ESN (electronic serial number). If a device's ESN is registered as "banned" on its carrier because it has been listed as stolen or is attached to an unpaid account, then that phone cannot be activated on said carrier. Thus, the phone is either useless or has to be activated on a pre-paid carrier, which is generally not all that desirable and drastically decreases a device's worth.
Justin Case has done it again, bringing root access back to users of Amazon's Kindle Fire who accepted the recent firmware update to version 6.2.2. BurritoRoot 2 is an easy-to-use exploit that only requires adb (Android debug bridge) and a few moments of your time. Users looking to root their device after Amazon's latest firmware update can grab BurritoRoot 2 using the download mirrors below.
To use the exploit, just download the file and run the following commands from adb:
adb push BurritoRoot2.bin /data/local/
adb shell chmod 777 /data/local/BurritoRoot2.bin
adb shell /data/local/BurritoRoot2.bin
adb shell id
<if uid = 0 continue, if not start over>
adb push su /system/xbin/su
adb shell chown 0.0 /system/xbin/su
adb shell chmod 06755 /system/xbin/su
adb install Superuser.apk (skip this step if its already installed)
For more information, check out Justin's original thread over at XDA.
UPDATE: The Gingerbread radio is apparently being linked to hard bricks. We have removed the link for the time being, until this issue is resolved, or a new radio version is leaked.
This morning 911Sniper dropped a leaked Gingerbread test build for the HTC Thunderbolt, but there was one issue: it wasn't flashable. Our buddy Justin Case from TeamAndIRC immediately took it to the lab and started dissecting its parts to see what needed to be done.