Well, that didn't take long. Not hours after ASUS released a tool to unlock the Transformer Prime's bootloader, we get word that ClockworkMod Recovery is available for the quad-core tablet. According to the source link, the team has been working on CWM for the Prime for a while but without an unlocked bootloader, they couldn't test it. Now that the device is wide open, it's time to get your custom recovery on.
The minds over at GTV Hacker have successfully achieved root on Sony Google TV boxes and TVs running the newest firmware version (Honeycomb 3.2). The exploit also allows for custom kernels to be loaded by hijacking the boot process. These custom kernels can, in turn, bring a number of desirable features to the device.
According to the GTVHacker blog, the following modifications are included in the custom kernel:
Today has been a busy day in the world of rooting – we've already seen root access given to the Xoom Family Edition and the LG Spectrum. The Galaxy Note, slated for official release tomorrow (but already in the hands of some eager pre-order customers) has also been granted root today, thanks to Da_G over at XDA. The method appears to be similar to the Epic 4G Touch's original root procedure, and requires just a couple of quick Odin commands.
Dan Rosenberg, a security researcher and rooting mastermind, has done it again, this time making quick work of the LG Spectrum. In a post to his blog just moments ago, Rosenberg simply states "Yawn. LG loses, users win," and gives instructions on downloading the scripts he provides for Windows, Linux, and OSX.
Considering all that Rosenberg has done (and continues to do) for the community, I'd highly recommend supporting him by hitting the donate button below.
After learning that yesterday's XYBoard root (which was thought to work on all Gingerbread/Honeycomb Moto devices) didn't play nice with Motorola's Xoom Family Edition, highly respected security researcher Dan Rosenberg decided to have a look, hoping to bring root back to the FE.
In a post to his blog earlier today, Rosenberg announced that he has found a working exploit for rooting the Xoom Family Edition. Rosenberg has again beaten others to the punch, namely a developer called Evil_DevNull, who Rosenberg calls out in the post for the alleged plagiarism of a previous FE exploit.
Here's a bit of good news for anyone with an unrooted Motorola device - the root method released earlier today by Dan Rosenberg for the Xyboard/Xoom 2 should actually work on any Moto device that's running Gingerbread or Honeycomb. The direct quote, from Dan himself:
Over the past 2 days, I've been watching a thread over at MDW that showcased a rooted Motorola XYBOARD tablet but instructed us to wait a few days for the root method to be released. Root was achieved by none other than Dan Rosenberg, the ninja from vulnfactory.org, who has been serving multiple root methods for previously unrootable devices left and right.
Good news, everyone [of you five fine gentlemen in the corner who own a XYBOARD] - as of this morning, we have the root files.
Update: You can download a batch script to root your DROID 4 now (you'll need to have USB debugging and Unknown Sources enabled in the Application settings menu). Find the file on this page, and if you can spare it, take the time to donate to Dan Rosenberg for finding the exploit. All proceeds will go directly to charity, in this case, the American Red Cross.
Widely known and respected security researcher Dan Rosenberg has evidently uncovered a root method for the Droid 4, in addition to a universal Motorola root method.
Pay attention to the name Dan Rosenberg, it's one that you're going to want to know for the future. He's the guy who brought us root for the Lenovo Thinkpad Tablet, and now he's back with a root method for the Sony Tablet S. His blog post on how he figured out the exploit is an absolutely fascinating read, albeit quite technical. Even if you don't understand the post in its entirety, you can still appreciate the genius at work to construct such a clever exploit.
If you lost root after updating your Transformer Prime with the latest OTA, we have good news: thanks to a new method found by Android hacker Saurik, you can now root once again.
So, you ready to make this happen? Let's get started.
First things first, you'll need to grab a couple of files.
Once you've downloaded the required files, plug your Prime into your computer, fire up adb, and enter the following commands (one at a time, of course):
adb push mempodroid /data/local
adb push su /data/local
adb shell chmod 777 /data/local/mempodroid
adb shell /data/local/mempodroid 0xd9ec 0xaf47 mount -o remount,rw '' /system
/data/local/mempodroid 0xd9ec 0xaf47 sh
At this point, you should be in a root shell session (indicated with the pound sign).