Much to the chagrin of cell carriers and hardware manufacturers, there are still many in the Android community that choose to delve into the world of hacking and modding their phones. Owners of the Verizon Moto G are certainly in this crowd, and they've been eagerly awaiting a reliable method for unlocking their bootloaders. It turns out that their wait ends today. Sunshine, a tool built by Justin Case, Beaups, and others to unlock HTC and Motorola phones, just gained support for the Moto G on Verizon.
You saw Android Wear a couple of months ago when Google unveiled the SDK and both LG and Motorola presented the first promotional pictures. Then you watched the Google I/O keynote that officially launched the LG G Watch and Samsung's surprise addition of the Gear Live. And now you've got a shiny, brand new Android Wear watch before you... but all you can think about is ripping into the digital guts of that thing and doing all of the awful things that Google never intended.
You've taken the plunge and thrown down some cold hard cash on a brand new HTC One M8, but you're feeling stifled because Verizon doesn't want to allow the bootloader to be unlocked? You might want to check out WeakSauce, a handy new root exploit by XDA recognized developers Justin Case (jcase) and beaups. It's a simple tool that can set up root on both the HTC One M8 and last year's model, the HTC One (codenamed M7).
If you like to mod your Nexus devices but you're also a fan of tight security, you probably already know BootUnlocker. It's a simple app that allows rooted devices to lock and unlock the bootloader without wiping user data. The developer, segv11, is back with v1.5.1 of this handy little utility. The latest update adds support for the WiFi (flo) and LTE (deb) variants of the 2013 Nexus 7 and the ability to set the tamper flag on the Nexus 4 (mako) and Nexus 5 (hammerhead).
That didn't take long. Just 2 days after Justin Case released a root method for the Moto X, Droid Ultra, Droid Mini, and Droid Maxx, he's already back with a hack that bypasses write protection. By disabling the write protection afforded by the bootloader, it becomes possible to flash 3rd-party ROMs, themes, and other mods. In other words, the flood gates are open for the modding community.
Much like MotoRoot, PwnMyMoto is packaged as a single app that must be sideloaded with adb.
Since Dan Rosenberg declared his intentions to stop publishing exploits for Motorola devices, fans of the OEM have been wondering if there will be much of a future within the modding community. While the distant future is still very foggy, Justin Case has come to the rescue with his own rooting method for Motorola's latest salvo of devices. His simple-to-use app roots the Moto X, Ultra, Mini, and Maxx.
I'm sure most of you are here to get your phone rooted, so let's go straight to the instructions.
It's not terribly hard to unlock and root a Nexus device, but mucking around with ADB simply isn't for everyone. If you want a somewhat more automated rooting experience for your 2013 Nexus 7, there's the Root Toolkit from Mskip. It's available now for all your modding needs.
Mskip is a senior moderator and recognized developer at XDA. He makes it his business to build simple root toolkits for a ton of devices.
If you were thinking about picking up one of Motorola's newest Android handset, maybe this will push you over the edge. Android tinkerer Dan Rosenberg has published a root exploit that should work on almost all of Motorola's recent devices including the RAZR M, Atrix HD, Photon Q, RAZR i, and the upcoming RAZR HD.
The exploit is exceptionally easy to run. All you have to do is get your device plugged in with USB debugging on.
Look around the web and it seems like whenever anyone has a "how can I make my <Android device> do ______," the answer is invariably "root it." And to anyone involved in the Android community, you get the impression that most Android users are rooted. Unfortunately, what people tend to forget is that while a few million Android users may be rooted, there are hundreds of millions of active Android devices out there - meaning rooted users represent a small minority of owners.
Even though the device hasn't even hit the street, noted Android developer Chainfire has obtained root on the Samsung Galaxy S III. Chainfire doesn't actually have the device in hand, so don't start berating him with questions on that matter. Rather, he got root on a firmware build that was leaked to him, and has a few juicy tidbits to share with everyone.
It appears that the Galaxy S III isn't going to be locked down in any significant way.