Yesterday, we told you that Amazon's newest Kindles are shipping with locked bootloaders. We mentioned that this probably wouldn't prevent the devices from being rooted, as a method was already in the works. That method has now been confirmed, and root for the Kindle Fire HD is go!
This is confirmed to work on the Fire HD 7, but should work on all new variants that are based on ICS.
So, you were thinking about picking up a Kindle Fire HD, rooting it, and throwing a ROM on it for an impressive $200 tablet? Turns out that idea may not work out as well as we initially thought: both the Kindle Fire HD and the second gen KF have locked bootloaders. Bummer.
This may not mean that custom ROMs are impossible on these devices, only that it's more improbable.
For those who may not know, the bootloader is responsible for checking the firmware's signature before a device boots.
Today, Motorola just floored users with an unprecedented offer: if you bought a phone from Motorola that launched in 2011, most of you will receive an upgrade to Jelly Bean. If, however, you're using a phone that Motorola decides will have a degraded experience, you will receive $100 in credit towards an upgrade. This may mark the first time that a manufacturer has broadly promised compensation for a lack of updates for all of its devices.
Look around the web and it seems like whenever anyone has a "how can I make my <Android device> do ______," the answer is invariably "root it." And to anyone involved in the Android community, you get the impression that most Android users are rooted. Unfortunately, what people tend to forget is that while a few million Android users may be rooted, there are hundreds of millions of active Android devices out there - meaning rooted users represent a small minority of owners.
For months now, users who wanted to root their Logitech Revue GoogleTV unit were either forced to use hardware modifications or do without. Now, though, Android hacker extraordinaire Dan Rosenberghas found a way to do it completely through software. There's only one problem: it's both extremely difficult and risky. Still, if you're up for a challenge, this one's for you.
This hack uses an exploit called nandpwn, which is explained better on GTVhacker than I could ever do:
A local privilege escalation exploit for the Logitech Revue that leverages the ability to map the hardware registers of the NAND flash controller in conjunction with a Linux kernel information leak to clobber kernel memory in a way that allows gaining privileges.
We've all read the horror stories: a new virus is crawling through the third-party stores, aiming to steal your personal information, identity, and first born child. More often than not, this type of malicious app is made possible because of one of the various root vulnerabilities that have been discovered throughout the various versions of Android.
X-Ray is a new app that lets you see exactly how vulnerable your device is by scanning it against several of these exploits, including RageAgainstTheCage, Gingerbreak, Mempodroid, Levitator, and a few more.
Of the four major US carriers to receive the Galaxy S III, Verizon is the only one to lock down the bootloader. This has made a lot of people very angry and been widely regarded as a bad move. Nevertheless, enterprising hackers over at XDA and RootzWiki have successfully managed to circumvent the lock, achieve root, and flash ClockworkMod recovery. If you're on Verizon and anticipating owning a Galaxy S III, congratulations: your phone is yours again.
After upgrading my Galaxy Nexus (GSM) to Jelly Bean last night (I know, I know, I'm a few days late), I unlocked its bootloader (the usual fastboot oem unlock) and commenced rooting, which I thought would only take a minute or two. However, after almost 2 hours of pushing, flashing, rebooting, and trying no less than 5 different root methods, I still didn't have root. Something must have changed under the hood, and no root method I was trying was working (even PaulOBrien's SuperBoot).
While we were able to test this process on the Virgin Mobile variant, it has notbeen tested on the Sprint version. It's not advised that you even attempt this on the Sprint variant until we've been able to test it first.
We are not responsible for any destruction of data, phones, or small animals. Use these instructions at your own risk.
While giving the AT&T HTC One X's firmware a look over, I ran across a a vulnerability that would allow us to gain root access. It turned out not to be all that useful at the time, as another root was released the same day. With the latest 1.85 firmware leak, the previously published root has been fixed, making the one I found earlier useful once again.
Update: AT&T disabled the app installation features of Ready2Go thereby breaking this root process.