Here's a bit of good news for anyone with an unrooted Motorola device - the root method released earlier today by Dan Rosenberg for the Xyboard/Xoom 2 should actually work on any Moto device that's running Gingerbread or Honeycomb. The direct quote, from Dan himself:
Over the past 2 days, I've been watching a thread over at MDW that showcased a rooted Motorola XYBOARD tablet but instructed us to wait a few days for the root method to be released. Root was achieved by none other than Dan Rosenberg, the ninja from vulnfactory.org, who has been serving multiple root methods for previously unrootable devices left and right.
Good news, everyone [of you five fine gentlemen in the corner who own a XYBOARD] - as of this morning, we have the root files.
Update: You can download a batch script to root your DROID 4 now (you'll need to have USB debugging and Unknown Sources enabled in the Application settings menu). Find the file on this page, and if you can spare it, take the time to donate to Dan Rosenberg for finding the exploit. All proceeds will go directly to charity, in this case, the American Red Cross.
Widely known and respected security researcher Dan Rosenberg has evidently uncovered a root method for the Droid 4, in addition to a universal Motorola root method.
Pay attention to the name Dan Rosenberg, it's one that you're going to want to know for the future. He's the guy who brought us root for the Lenovo Thinkpad Tablet, and now he's back with a root method for the Sony Tablet S. His blog post on how he figured out the exploit is an absolutely fascinating read, albeit quite technical. Even if you don't understand the post in its entirety, you can still appreciate the genius at work to construct such a clever exploit.
If you lost root after updating your Transformer Prime with the latest OTA, we have good news: thanks to a new method found by Android hacker Saurik, you can now root once again.
So, you ready to make this happen? Let's get started.
First things first, you'll need to grab a couple of files.
Once you've downloaded the required files, plug your Prime into your computer, fire up adb, and enter the following commands (one at a time, of course):
adb push mempodroid /data/local
adb push su /data/local
adb shell chmod 777 /data/local/mempodroid
adb shell /data/local/mempodroid 0xd9ec 0xaf47 mount -o remount,rw '' /system
/data/local/mempodroid 0xd9ec 0xaf47 sh
At this point, you should be in a root shell session (indicated with the pound sign).
Owners of the Lenovo Thinkpad tablet have long been waiting for a way to root their devices... in fact, the situation is so dire that there is a $785 bounty for root. Or was, anyway: Dan Rosenberg has figured out a way to root the device, and Justin Case and utkanos have managed to get ClockworkMod Recovery (CWM) up and running without a hitch. Luckily, both rooting and installing CWM are quite simple (though you do need an SD card to install CWM).
Since launch, the ASUS Transformer Prime's GPS issues have hampered an otherwise stellar tablet. To make matters worse, ASUS confirmed that the problem was due to the Prime's all-aluminium construction, indicating that a software fix was unlikely. Indeed ASUS was forced to release a new version of the Prime (TF700T), with an updated back panel to improve the GPS functionality. However, ASUS has not given up all hope on the original Prime as a new OTA update (V188.8.131.52) is rolling out, which could fix the GPS drivers.
Justin Case has done it again, bringing root access back to users of Amazon's Kindle Fire who accepted the recent firmware update to version 6.2.2. BurritoRoot 2 is an easy-to-use exploit that only requires adb (Android debug bridge) and a few moments of your time. Users looking to root their device after Amazon's latest firmware update can grab BurritoRoot 2 using the download mirrors below.
To use the exploit, just download the file and run the following commands from adb:
adb push BurritoRoot2.bin /data/local/
adb shell chmod 777 /data/local/BurritoRoot2.bin
adb shell /data/local/BurritoRoot2.bin
adb shell id
<if uid = 0 continue, if not start over>
adb push su /system/xbin/su
adb shell chown 0.0 /system/xbin/su
adb shell chmod 06755 /system/xbin/su
adb install Superuser.apk (skip this step if its already installed)
For more information, check out Justin's original thread over at XDA.
In a familiar turn of events, Amazon has pushed out another root-breaking firmware update, bringing the Kindle Fire's firmware up to version 6.2.2.
Shortly after Amazon's last Kindle Fire update, our very own Justin Case made quick work of gaining root access for the Kindle Fire once again, releasing BurritoRoot, a tool that made rooting the Fire quick and (relatively) easy. Unfortunately, Amazon's latest update keeps BurritoRoot from doing its job, but it appears to bring about at least one useful change.
It has been a few months since we last took a look in the Android Market for a new set of must-have root apps, and a lot of worthy entries have since entered the arena.
They battled it out in fight to the death, and the eight victors now stand before you, offering their unparalleled services at your disposal.
Okay, so maybe it didn't play out quite so dramatically, but the point remains the same: we have eight new apps that every rooted user should know about.