Look around the web and it seems like whenever anyone has a "how can I make my <Android device> do ______," the answer is invariably "root it." And to anyone involved in the Android community, you get the impression that most Android users are rooted. Unfortunately, what people tend to forget is that while a few million Android users may be rooted, there are hundreds of millions of active Android devices out there - meaning rooted users represent a small minority of owners.
For months now, users who wanted to root their Logitech Revue GoogleTV unit were either forced to use hardware modifications or do without. Now, though, Android hacker extraordinaire Dan Rosenberghas found a way to do it completely through software. There's only one problem: it's both extremely difficult and risky. Still, if you're up for a challenge, this one's for you.
This hack uses an exploit called nandpwn, which is explained better on GTVhacker than I could ever do:
A local privilege escalation exploit for the Logitech Revue that leverages the ability to map the hardware registers of the NAND flash controller in conjunction with a Linux kernel information leak to clobber kernel memory in a way that allows gaining privileges.
We've all read the horror stories: a new virus is crawling through the third-party stores, aiming to steal your personal information, identity, and first born child. More often than not, this type of malicious app is made possible because of one of the various root vulnerabilities that have been discovered throughout the various versions of Android.
X-Ray is a new app that lets you see exactly how vulnerable your device is by scanning it against several of these exploits, including RageAgainstTheCage, Gingerbreak, Mempodroid, Levitator, and a few more.
Of the four major US carriers to receive the Galaxy S III, Verizon is the only one to lock down the bootloader. This has made a lot of people very angry and been widely regarded as a bad move. Nevertheless, enterprising hackers over at XDA and RootzWiki have successfully managed to circumvent the lock, achieve root, and flash ClockworkMod recovery. If you're on Verizon and anticipating owning a Galaxy S III, congratulations: your phone is yours again.
After upgrading my Galaxy Nexus (GSM) to Jelly Bean last night (I know, I know, I'm a few days late), I unlocked its bootloader (the usual fastboot oem unlock) and commenced rooting, which I thought would only take a minute or two. However, after almost 2 hours of pushing, flashing, rebooting, and trying no less than 5 different root methods, I still didn't have root. Something must have changed under the hood, and no root method I was trying was working (even PaulOBrien's SuperBoot).
While we were able to test this process on the Virgin Mobile variant, it has notbeen tested on the Sprint version. It's not advised that you even attempt this on the Sprint variant until we've been able to test it first.
We are not responsible for any destruction of data, phones, or small animals. Use these instructions at your own risk.
While giving the AT&T HTC One X's firmware a look over, I ran across a a vulnerability that would allow us to gain root access. It turned out not to be all that useful at the time, as another root was released the same day. With the latest 1.85 firmware leak, the previously published root has been fixed, making the one I found earlier useful once again.
Update: AT&T disabled the app installation features of Ready2Go thereby breaking this root process.
Three short days ago, AT&T's phone selection got a little bit better. Of course, I'm talking about the arrival of the HTC One X. If you already have this flagship in hand, then you'll be happy to know that a one-click root method is already available.
Disclaimer: Android Police isn't responsible for any harm to your device - proceed at your own risk.
This will automatically root, install Busybox, and SuperSU onto your One X, all while you sit back and sip some coffee.
If you don't have at least one file explorer installed on your device, then I'm not sure how you actually use it (if you an even call it "using"). However, there are a veritable plethora of file managers in the Store, so choosing one as your primary can be a real task.
If you're on the side of the fence that most of us here at AP are, and have tried nearly every reasonable-looking file manager in the Play Store, then you've probably gotten to the point where you don't even check out new offerings any more, right?
While not everyone who owns an Android device roots, the Android modding community is at the very heart of everything we love about our little green buddy. Security researcher Dan Rosenberg recently gave a presentation where he elaborates on root and modding methods, as well as expounding on the security implications of modding Android phones.
Rosenberg also had quite a lot to say about how carriers influence the Android landscape.