The latest version of the Play Store hit the scene a little over a week ago and introduced a tweak to the way permissions are displayed at install time, and it left some people feeling a little...uncertain. Gone is the ugly wall of poorly spaced, semi-specific permissions. The replacement is a short set of simplified categories, each with crisp-looking icons and buttons that reveal a brief description when tapped. Google filtered through roughly 145 permissions and narrowed them down to a dozen groups, plus one bucket for anything that remains.
Ask anybody that spends time in the security circles and they'll tell you that every large software project is bound to have a few long-standing vulnerabilities in the code. Fortunately, there are usually a few people who are paid to close up those holes so you, the customer, don't find yourself the victim of nefarious evildoers someday. Like so many before it, the latest update to Android came with a boatload of changes, at least one of which fixes a potentially dangerous vulnerability that can be used for numerous attacks, including a way to acquire root.
This means you can remount /system as read-write, just as before, change build.prop, push APKs to /system/app, and do whatever you want without rebooting into recovery.
For now, you're safe. But probably not for long. And when the hammer drops, we'll have yet another reason to opt in for a custom ROM or kernel, because nobody can take our freedom, not even the mighty El Goog.
As useful as the Google Experience Launcher (GEL) is, it's not exactly what you'd call "customizable." But intrepid modder Alexander Schulz has been working on that, making the GEL bend to his will through the magic of root and the Xposed Framework tool. The latest update to Xposed GEL Settings adds some really cool features. The most impressive is probably the dynamic home button: the home button on the virtual nav bar will switch to the app tray icon on the default home screen if that's the function you've selected.
Over the years, Google has been shoring up security on Android in a bid to make the operating system more attractive to governments and businesses, and to reduce the threat of malware for regular users. Unfortunately, these changes often come at the expense of flexibility in our beloved platform. As we close in on the next major release of Android, due to be announced next month, SuperSU developer Chainfire has discovered a set of commits to the Android Open Source Project (AOSP) that may seriously impact some of the functionality currently enjoyed by many root users.
Xposed has fast become the go-to modification tool for Android power users who are comfortable with root, but who won't (or can't) move to a completely custom ROM. The latest update to the non-Play Store app adds a few creature comforts in the form of user interface tweaks, plus the usual bug fixes under the hood.
The first thing you'll notice is a spiffy new logo for your launcher and shortcuts.
Two weeks ago developer Chainfire rooted the international GSM-LTE version of the Galaxy S5. These things take time, but apparently not much of it. Barely two weeks later, the modder is back after having rooted six additional variants just in time for the official commercial launch. These include the T-Mobile, US Cellular, and MetroPCS models, the International Exynos option, and some shipped to various other parts of the Western Hemisphere.
There's nothing like a completely open device if you really want to tweak things and flash all sorts of ill-advised software. HTC isn't going to make it easy, though. Getting s-off is necessary to do all that fun stuff, and now the recently released Firewater tool has been updated with support for the M8.
You've taken the plunge and thrown down some cold hard cash on a brand new HTC One M8, but you're feeling stifled because Verizon doesn't want to allow the bootloader to be unlocked? You might want to check out WeakSauce, a handy new root exploit by XDA recognized developers Justin Case (jcase) and beaups. It's a simple tool that can set up root on both the HTC One M8 and last year's model, the HTC One (codenamed M7).
Update: It looks like users can unlock the AT&T version of the HTC One M8 with the HTCdev unlock tool, at least for the time being. A build of TWRP for the AT&T model is already available on XDA. Hat tip to Google+ reader Brian Haslip.
Wow, developers aren't wasting any time when it comes to cracking open new high-end hardware. Just a few days after a root method was released for the Galaxy S5, the folks at Team Win Recovery Project have already prepared TWRP for both the international and Sprint models of the new HTC One M8.