You saw Android Wear a couple of months ago when Google unveiled the SDK and both LG and Motorola presented the first promotional pictures. Then you watched the Google I/O keynote that officially launched the LG G Watch and Samsung's surprise addition of the Gear Live. And now you've got a shiny, brand new Android Wear watch before you... but all you can think about is ripping into the digital guts of that thing and doing all of the awful things that Google never intended.
I don't think the developer behind the Xposed Google Experience Launcher Settings (XGELS) module will be satisfied until he's made the stock Google Search launcher every bit as flexible as Nova and Apex. The latest update to the popular module adds even more customization options. Premium users can now assign custom icons to a single app or the app drawer icon, with or without a full icon theme applied, like most of the more advanced launchers allow.
Sometimes corresponding events that might otherwise be considered mere coincidence are so amazing that they're attributed to serendipity or universal irony. This... isn't one of those times. But it might just make you go, "huh." Google's recent acquisition Nest Labs has launched the Nest Developers Program, which will allow developers to easily create connections between the smart thermostat and smoke detector hardware and other integrated devices. You can check out various tools and documentation at developer.nest.com.
There are a few ways to get root access on HTC's new lineup of smartphones, but root only gets you so far. If you really want to hack around, you'll want an unlocked bootloader and s-off. That's what you get with the new SunShine tool from Justin Case, Beaups, and associates. This time, however, the free lunch is over.
Last year we told you about GravityBox, easily one of the most complete and far-reaching Xposed modules for rooted Nexus and AOSP ROMs. The creator is still expanding the module, and has quickly incorporated the Heads Up notifications recently featured in CyanogenMod nightly builds. Heads Up notifications pop up for easy viewing and action while in full screen mode. The feature is hidden deep in Android 4.4 code, and easily enabled here.
Google has chosen to keep the on-screen navigation bar simple ever since it was introduced back in Honeycomb. It's changed a little bit over the years, but Xtended NavBar lets you change the way it works without screwing up the UI. When you need you navigation buttons, they're in the usual spot, but you can swipe to access more functions.
AT&T and Verizon, with their insistence on locked bootloaders for Android devices, are the scourge of the Android customization scene. Unfortunately they're also the largest carriers in the United States, which leaves a lot of Android power users in a pickle. If you're on either carrier and rocking a branded Galaxy S5, today is your lucky day: someone's gone and made a near-universal and amazingly simple root method that should work for the S5 (and more) on both carriers.
The latest version of the Play Store hit the scene a little over a week ago and introduced a tweak to the way permissions are displayed at install time, and it left some people feeling a little...uncertain. Gone is the ugly wall of poorly spaced, semi-specific permissions. The replacement is a short set of simplified categories, each with crisp-looking icons and buttons that reveal a brief description when tapped. Google filtered through roughly 145 permissions and narrowed them down to a dozen groups, plus one bucket for anything that remains.
Ask anybody that spends time in the security circles and they'll tell you that every large software project is bound to have a few long-standing vulnerabilities in the code. Fortunately, there are usually a few people who are paid to close up those holes so you, the customer, don't find yourself the victim of nefarious evildoers someday. Like so many before it, the latest update to Android came with a boatload of changes, at least one of which fixes a potentially dangerous vulnerability that can be used for numerous attacks, including a way to acquire root.