The Chromecast runs a modified version of Android, so of course modders are all over it like white on rice. The folks at GTVHacker already gave us a working bootloader hack and root access, not that there's much you can do with it at the moment except switch to the beta or dev channel. Unfortunately, a quick over-the-air update for the Chromecast seems to have closed this modding avenue already.
Titanium Backup has been a top app for rooted users since early in Android's life. It's still one of the best ways to backup and manage the apps installed on your phone or tablet. After the Android 4.3 update started rolling out, users found that Titanium wasn't working quite right. Today's update fixes that issue, and adds a few more goodies.
A number of root apps have been having issues post-4.3.
If you updated your Verizon Galaxy S4 to the latest over-the-air build, or bought one after it was already installed, you might already be aware that it's been especially resistant to root attempts. Savvy power users have stayed well away from the updated VRUAME7 firmware, which makes rolling back to an earlier build impossible. But as is so often the case, two enterprising XDA-Developers posters have solved at least some of the problems, and released a new rooting method for the latest OTA.
Well, that didn't take long. TeamWin has just dropped a new version of its TWRP custom recovery designed specifically for the Flo – the new Nexus 7. As usual, it's a fairly simple procedure with a Nexus device to get a custom recovery running, which allows you to flash root. The Android 4.3 SuperSU file is already out there, so we're ready to go.
Android 4.3 was officially unveiled and released two days ago to the Android Open Source Project. In a surprisingly timely fashion, Google also released both the factory images and OTAs to the Nexus 4, 7, 10, and the Galaxy Nexus.
Android 4.3 was officially unveiled and released yesterday to the Android Open Source Project. In a surprisingly timely fashion, Google also released both the factory images and OTAs to the Nexus 4, 7, 10, and the Galaxy Nexus.
If you've already updated to Android 4.3, whether via an OTA or by flashing it manually, and rooted it, you're more than likely using Chainfire's SuperSU, which carefully works around the new restrictions Google put in place. Cody has a good write-up about why they did it and what's going on, so go read that if you're interested in the details.
Chainfire created the Android 4.3-compatible root method and the updated SuperSU back when the first leaks showed up for the Galaxy S4 but hasn't updated it for a few weeks.
It's no surprise that Google's latest update to our favorite operating system is in instant demand amongst power users and enthusiasts. Without fail, the people eagerly installing 4.3 are frequently the same ones who consider root privileges a necessity for a good Android experience. Unfortunately, it seems a wrench has been thrown into the works when it comes to exposing ultimate access, and people are experiencing more than a few hiccups because of it.
Android 4.3 was officially unveiled and released today to the Android Open Source Project. In a surprisingly timely fashion, Google also released both the factory images and OTAs to the Nexus 4, 7, 10, and the Galaxy Nexus.
A few weeks ago the "Master Key" APK verification vulnerability rocked the Android security landscape... then immediately stopped rocking it, once Google revealed that they had patched the vulnerability months ago. Still, that's little comfort to users who aren't on a brand-new 4.2 phone (or, you know, a Nexus device that gets real updates). CyanogenMod has responded by patching all of its official ROMs (twice), and now noted security firm Duo has teamed up with Northeastern University's SecLab to do the same for all Android rooted users, regardless of their device.