Over the years, Google has been shoring up security on Android in a bid to make the operating system more attractive to governments and businesses, and to reduce the threat of malware for regular users. Unfortunately, these changes often come at the expense of flexibility in our beloved platform. As we close in on the next major release of Android, due to be announced next month, SuperSU developer Chainfire has discovered a set of commits to the Android Open Source Project (AOSP) that may seriously impact some of the functionality currently enjoyed by many root users.
Much of Android's development is done out in the open, which is how several Android developers noticed that a recent commit to the Android Open Source Project master tree would break many of your favorite root apps. This is the result of a newly implemented security feature, rather than an active effort to lock things down on Google's part. Nevertheless, it could result in some inconvenience, so developer Chainfire has taken to his Google+ page to detail what will happen if the change is not reverted before the release of a future version of Android.
What timing. Just over a week ago I transitioned my HTC One over from Sense 5 to CyanogenMod, accepting the fact that I was sacrificing IR functionality in the process (and yes, that was something I used somewhat regularly). Now an update for Smart IR Remote has landed that adds IR functionality back to HTC Ones and Samsung Galaxy devices with custom ROMs installed, even if the ROM lacks IR drivers.
It's no surprise that Google's latest update to our favorite operating system is in instant demand amongst power users and enthusiasts. Without fail, the people eagerly installing 4.3 are frequently the same ones who consider root privileges a necessity for a good Android experience. Unfortunately, it seems a wrench has been thrown into the works when it comes to exposing ultimate access, and people are experiencing more than a few hiccups because of it.
Back when Google unveiled multi-user support with Android 4.2, one of the first question on many users' minds was how will root access be handled on secondary user accounts? It was a short answer, actually: it wouldn't. Superuser managers like SuperSU simply wouldn't run on anything aside from the primary user.
However, Android developer Chainfire – the mastermind behind SuperSU – knew that it could be done. It's been clear that he has kept this venture on the forefront of his mind, and he's finally broken the barrier.
If you were thinking about picking up one of Motorola's newest Android handset, maybe this will push you over the edge. Android tinkerer Dan Rosenberg has published a root exploit that should work on almost all of Motorola's recent devices including the RAZR M, Atrix HD, Photon Q, RAZR i, and the upcoming RAZR HD.
The exploit is exceptionally easy to run. All you have to do is get your device plugged in with USB debugging on.
It has been a few months since we last took a look in the Android Market for a new set of must-have root apps, and a lot of worthy entries have since entered the arena.
They battled it out in fight to the death, and the eight victors now stand before you, offering their unparalleled services at your disposal.
Okay, so maybe it didn't play out quite so dramatically, but the point remains the same: we have eight new apps that every rooted user should know about.
So, you recently picked up the Samsung Stratosphere on Verizon and want to get the most out of your new toy. It's no secret that when it comes to getting the most out of any Android device, root access it the key. Fortunately, KnightCrusader over at RootzWiki just dropped the info on how to gain root on the Stratosphere.
The process seems to be pretty straightforward: a little ODIN action, some adb commands, and a kernel flash -- that's pretty much it.
The Droid 3 is the most powerful Droid to date -- its 1Ghz dual-core OMAP processor and Android 2.3.4 make it a speedy and capable device. As with most devices, D3 owners wanted root access in order to take full advantage of all that it had to offer. That day has finally arrived, as the D3 has been rooted by developer drjbliss from the XDA forums.
The rooting process seems to be rather easy, granted you have ADB set up and know how to use it.