There's some disturbing news today on the Android security front: an vulnerability has been discovered for Samsung's Exynos 4-powered devices. While the related exploit is useful for the mod scene in that it can be harnessed to gain superuser permissions and root pretty much any device running on an Exynos 4 chip, it's also got some rather disturbing implications. According to an XDA member with the handle "alephzain", who developed the exploit, using this security hole can also grant an app access to all physical memory on a given device - basically, anything stored in RAM is fair game.
When the Droid DNA was first announced, we were all surprised to find that the bootloader was unlockable at HTCdev.com. Because of this, the device actually got root, recovery, and custom kernel days before the official release. Unfortunately, by the time the device became available in retail channels, Verizon pulled the plug and it was no longer unlocked through official means.
Thankfully, there's another way (isn't there always?). The softmod below will effectively change the carrier information, allowing it to once again be unlocked via HTC's official tool.
A few days ago, developer mskip released the Nexus 4 toolkit, which simplifies the unlock/root/recovery/etc. process on the device. The same dev has now released the Nexus 10 toolkit, which does essentially the same thing, only for Google's first 10" slate. These toolkits really take the work out of doing a number of otherwise potentially tedious tasks:
FUNCTIONS OF GOOGLE NEXUS 10 TOOLKIT V1.0.0 [20TH NOVEMBER 2012] * Install correct adb/fastboot drivers automatically on Windows xp/vista/7/8 32bit+64bit * Backup/Restore a single package or all apps, user data and Internal Storage * Backup your /data/media (virtual SD Card) to your PC for a Full Safe backup of data * Unlock/Re-Lock your Bootloader * Root Stock Jelly Bean builds (upto 4.2.0 JOP40C) * 1-Click For All to Unlock the Bootloader, Root, Rename the Restore File and Flash Custom Recovery * Perform a FULL NANDROID Backup of your system (Boot, Cache, Data, Recovery and System) via adb and save in Custom Recovery format on your PC which can be Restored via CWM Recovery * Pull /data and /system folders, compress to a .tar file and save to your PC * Dump selected Phone Partitions, compress to a .zip file with md5 and save to your PC * Install BusyBox on your phone * Extras, Tips and Tricks section available to all ToolKit Donators * Auto Update ToolKit to latest pushed version at startup (donator feature) * Program up to 10 Quickpic slots and run them very quickly (donator feature) * Mods section to automatically perform certain tasks on your phone * Download Google Stock Image directly to correct ToolKit folder for extracting and flashing (no need to move it manually anymore) * Flash Custom Recovery or Google Stock Image to phone * Rename the Recovery Restore File present on some Stock Roms * Boot into CWM Touch Recovery without Flashing it * Boot or Flash .img Files directly from your PC * Install a single apk or multiple apk's to your phone * Push Files from your PC to your phone * Pull Files from your phone to your PC * Dump selected LogCat buffers to your PC * Dump BugReport to your PC * Set Files Permissions on your phone * Open new Command Prompt for manual input * Reboot Phone to Fastboot Mode or Android from fastboot mode * Reboot Phone to Fastboot Mode, Recovery, Android or Download Mode from adb mode
The ToolKit.exe and ModsSection.exe files may be detected as malicious by some anti-virus software.
Way back in February, a man by the name of Ben Randall demoed an amazing voice control app called "utter!" that he had started developing. The initial video (a whopping 22 minutes long) demonstrated some amazing capabilities - take a look for yourself:
But that was over 9 months ago, and aside from the initial release of the (very limited) alpha, we haven't heard much about the app, though Mr. Randall has kept interested parties updated via his very active XDA thread.
It's pretty disheartening to get an awesome new phone only to realize the bootloader's locked down tight. That's means no custom recovery, no ROMs, no custom kernels, no... anything fun. Until, of course, some dedicated developers get ahold of the device in question and bend it to their will. That's exactly what Project FreeGee has done for both the Sprint and AT&T variants of the LG Optimus G.
The tool essentially unlocks the bootloader of both devices, allowing a custom recovery - and eventually, custom ROMs - to be flashed.
Maybe you already have your Nexus 4. Maybe you have to wait three more weeks to get it. Or maybe you didn't get one before they sold out. Regardless of your particular situation, if a Nexus 4 is in your future (or present), there's a pretty good chance you're going to want to root and ROM it. And, honestly, not everyone is comfortable doing this kind of thing manually. Good news: the Nexus 4 toolkit is here!
We already know that Nexus devices are easy to unlock and root, but the process is still a bit different each time. Thus, XDA member HQRaja posted a handy guide on exactly how to root the Nexus 4.
There are two different ways of rooting the device - using either ADB with an insecure boot image, or directly through ClockworkMod Recovery. While both methods are posted in the source thread at XDA, the CWM method is undoubtedly easier and will probably feel more familiar to most.
That sure didn't take long. Just two days after the official announcement - and still a few days away from retail availability - the Droid DNA has already been rooted and gotten some goodies from famed Android modder/hacker dsb9938. Apparently the DNA is unlockable using HTC's official bootloader unlock tool, which allows a custom kernel to be flashed. The first available kernel has only been slightly modified to allow root in adb connections - a requisite in order to flash the custom recovery and root the device.
Earlier on Wednesday, there was a bit of a scare when CyanogenMod wrote a blog post instructing users to transition to cyanogenmod.org instead of the .com address the group has used up until now. As the story goes, a member of the team donated the domain back in the early days and had managed it ever since. Until recently when control of the domain was in question during a dispute with said user.
It's been quite a while since we've delved into the realm of root apps on Android, so let's get to it. If you're rooted and not taking advantage of it, why even bother? The Android development community is ready and waiting to help you master your device.
The apps on this list have been carefully selected as "must-have" apps for root users. Well, what are you waiting for? Read on for eight more great root apps.