If you like to mod your Nexus devices but you're also a fan of tight security, you probably already know BootUnlocker. It's a simple app that allows rooted devices to lock and unlock the bootloader without wiping user data. The developer, segv11, is back with v1.5.1 of this handy little utility. The latest update adds support for the WiFi (flo) and LTE (deb) variants of the 2013 Nexus 7 and the ability to set the tamper flag on the Nexus 4 (mako) and Nexus 5 (hammerhead).
That didn't take long. Just 2 days after Justin Case released a root method for the Moto X, Droid Ultra, Droid Mini, and Droid Maxx, he's already back with a hack that bypasses write protection. By disabling the write protection afforded by the bootloader, it becomes possible to flash 3rd-party ROMs, themes, and other mods. In other words, the flood gates are open for the modding community.
Much like MotoRoot, PwnMyMoto is packaged as a single app that must be sideloaded with adb.
Since Dan Rosenberg declared his intentions to stop publishing exploits for Motorola devices, fans of the OEM have been wondering if there will be much of a future within the modding community. While the distant future is still very foggy, Justin Case has come to the rescue with his own rooting method for Motorola's latest salvo of devices. His simple-to-use app roots the Moto X, Ultra, Mini, and Maxx.
I'm sure most of you are here to get your phone rooted, so let's go straight to the instructions.
It's not terribly hard to unlock and root a Nexus device, but mucking around with ADB simply isn't for everyone. If you want a somewhat more automated rooting experience for your 2013 Nexus 7, there's the Root Toolkit from Mskip. It's available now for all your modding needs.
Mskip is a senior moderator and recognized developer at XDA. He makes it his business to build simple root toolkits for a ton of devices.
If you were thinking about picking up one of Motorola's newest Android handset, maybe this will push you over the edge. Android tinkerer Dan Rosenberg has published a root exploit that should work on almost all of Motorola's recent devices including the RAZR M, Atrix HD, Photon Q, RAZR i, and the upcoming RAZR HD.
The exploit is exceptionally easy to run. All you have to do is get your device plugged in with USB debugging on.
Look around the web and it seems like whenever anyone has a "how can I make my <Android device> do ______," the answer is invariably "root it." And to anyone involved in the Android community, you get the impression that most Android users are rooted. Unfortunately, what people tend to forget is that while a few million Android users may be rooted, there are hundreds of millions of active Android devices out there - meaning rooted users represent a small minority of owners.
Even though the device hasn't even hit the street, noted Android developer Chainfire has obtained root on the Samsung Galaxy S III. Chainfire doesn't actually have the device in hand, so don't start berating him with questions on that matter. Rather, he got root on a firmware build that was leaked to him, and has a few juicy tidbits to share with everyone.
It appears that the Galaxy S III isn't going to be locked down in any significant way.
Amazon's new tablet, the Kindle Fire, has been grabbing all of the headlines following Amazon's press event yesterday, and rightfully so. Priced at an aggressive $199, it has virtually alienated all other Android tablet manufacturers in one fell swoop, offering potential buyers a great piece of hardware and all of the content Amazon has to offer to back it up.
Despite this, there are still a few things that the Fire won't offer.
Jamezelle, jcase (that's me), and all of AndIRC (i.e. everyone - AndIRC is an open dev group), the same folks who rooted the pre-production Thunderbolt in February, proudly present:
A Very Dirty HTC Thunderbolt Root V1.02 2011/03/18
- Root with read/write access to /system
- Ability to downgrade and flash any RUU (i.e. signed firmware)
While rooted Android users have been taking screenshots on their phones for a while now, stock, non-rooted owners have been left out of the fun (there are some notable exceptions to this rule, like the EVO 4G). No longer, according to Paul O'Brien, one of the visionaries in the Android community, who posted the following in reply to Cyanogen (aka Android god):
We haven't been able to confirm what exactly changed in 2.3.3, but according to Android Central, screenshots are now possible without root "because of some changes in the way the SurfaceFlinger service handles what it captures from the framebuffer."
This newly uncovered fact means that all phones running Android 2.3.3 and above should be able to take screenshots regardless of whether they're rooted or not.