Ask anybody that spends time in the security circles and they'll tell you that every large software project is bound to have a few long-standing vulnerabilities in the code. Fortunately, there are usually a few people who are paid to close up those holes so you, the customer, don't find yourself the victim of nefarious evildoers someday. Like so many before it, the latest update to Android came with a boatload of changes, at least one of which fixes a potentially dangerous vulnerability that can be used for numerous attacks, including a way to acquire root.
This means you can remount /system as read-write, just as before, change build.prop, push APKs to /system/app, and do whatever you want without rebooting into recovery.
For now, you're safe. But probably not for long. And when the hammer drops, we'll have yet another reason to opt in for a custom ROM or kernel, because nobody can take our freedom, not even the mighty El Goog.
As useful as the Google Experience Launcher (GEL) is, it's not exactly what you'd call "customizable." But intrepid modder Alexander Schulz has been working on that, making the GEL bend to his will through the magic of root and the Xposed Framework tool. The latest update to Xposed GEL Settings adds some really cool features. The most impressive is probably the dynamic home button: the home button on the virtual nav bar will switch to the app tray icon on the default home screen if that's the function you've selected.
Over the years, Google has been shoring up security on Android in a bid to make the operating system more attractive to governments and businesses, and to reduce the threat of malware for regular users. Unfortunately, these changes often come at the expense of flexibility in our beloved platform. As we close in on the next major release of Android, due to be announced next month, SuperSU developer Chainfire has discovered a set of commits to the Android Open Source Project (AOSP) that may seriously impact some of the functionality currently enjoyed by many root users.
Xposed has fast become the go-to modification tool for Android power users who are comfortable with root, but who won't (or can't) move to a completely custom ROM. The latest update to the non-Play Store app adds a few creature comforts in the form of user interface tweaks, plus the usual bug fixes under the hood.
The first thing you'll notice is a spiffy new logo for your launcher and shortcuts.
There's nothing like a completely open device if you really want to tweak things and flash all sorts of ill-advised software. HTC isn't going to make it easy, though. Getting s-off is necessary to do all that fun stuff, and now the recently released Firewater tool has been updated with support for the M8.
You've taken the plunge and thrown down some cold hard cash on a brand new HTC One M8, but you're feeling stifled because Verizon doesn't want to allow the bootloader to be unlocked? You might want to check out WeakSauce, a handy new root exploit by XDA recognized developers Justin Case (jcase) and beaups. It's a simple tool that can set up root on both the HTC One M8 and last year's model, the HTC One (codenamed M7).
Wow, developers aren't wasting any time when it comes to cracking open new high-end hardware. Just a few days after a root method was released for the Galaxy S5, the folks at Team Win Recovery Project have already prepared TWRP for both the international and Sprint models of the new HTC One M8.
That was fast. Despite the fact that the Galaxy S5 won't be released for another two weeks, well-known developer and modder Chainfire has already rooted the phone. Well, at least one of the Galaxy S5s (S Fives? Galaxies S5? whatever), specifically the SM-G900F model, which seems to be the international GSM-LTE version. The root method will probably work with at least some regional and carrier variants.