You've taken the plunge and thrown down some cold hard cash on a brand new HTC One M8, but you're feeling stifled because Verizon doesn't want to allow the bootloader to be unlocked? You might want to check out WeakSauce, a handy new root exploit by XDA recognized developers Justin Case (jcase) and beaups. It's a simple tool that can set up root on both the HTC One M8 and last year's model, the HTC One (codenamed M7).
If you like to mod your Nexus devices but you're also a fan of tight security, you probably already know BootUnlocker. It's a simple app that allows rooted devices to lock and unlock the bootloader without wiping user data. The developer, segv11, is back with v1.5.1 of this handy little utility. The latest update adds support for the WiFi (flo) and LTE (deb) variants of the 2013 Nexus 7 and the ability to set the tamper flag on the Nexus 4 (mako) and Nexus 5 (hammerhead).
That didn't take long. Just 2 days after Justin Case released a root method for the Moto X, Droid Ultra, Droid Mini, and Droid Maxx, he's already back with a hack that bypasses write protection. By disabling the write protection afforded by the bootloader, it becomes possible to flash 3rd-party ROMs, themes, and other mods. In other words, the flood gates are open for the modding community.
Much like MotoRoot, PwnMyMoto is packaged as a single app that must be sideloaded with adb.
Since Dan Rosenberg declared his intentions to stop publishing exploits for Motorola devices, fans of the OEM have been wondering if there will be much of a future within the modding community. While the distant future is still very foggy, Justin Case has come to the rescue with his own rooting method for Motorola's latest salvo of devices. His simple-to-use app roots the Moto X, Ultra, Mini, and Maxx.
I'm sure most of you are here to get your phone rooted, so let's go straight to the instructions.
It's not terribly hard to unlock and root a Nexus device, but mucking around with ADB simply isn't for everyone. If you want a somewhat more automated rooting experience for your 2013 Nexus 7, there's the Root Toolkit from Mskip. It's available now for all your modding needs.
Mskip is a senior moderator and recognized developer at XDA. He makes it his business to build simple root toolkits for a ton of devices.
If you were thinking about picking up one of Motorola's newest Android handset, maybe this will push you over the edge. Android tinkerer Dan Rosenberg has published a root exploit that should work on almost all of Motorola's recent devices including the RAZR M, Atrix HD, Photon Q, RAZR i, and the upcoming RAZR HD.
The exploit is exceptionally easy to run. All you have to do is get your device plugged in with USB debugging on.
Look around the web and it seems like whenever anyone has a "how can I make my <Android device> do ______," the answer is invariably "root it." And to anyone involved in the Android community, you get the impression that most Android users are rooted. Unfortunately, what people tend to forget is that while a few million Android users may be rooted, there are hundreds of millions of active Android devices out there - meaning rooted users represent a small minority of owners.
Even though the device hasn't even hit the street, noted Android developer Chainfire has obtained root on the Samsung Galaxy S III. Chainfire doesn't actually have the device in hand, so don't start berating him with questions on that matter. Rather, he got root on a firmware build that was leaked to him, and has a few juicy tidbits to share with everyone.
It appears that the Galaxy S III isn't going to be locked down in any significant way.
Amazon's new tablet, the Kindle Fire, has been grabbing all of the headlines following Amazon's press event yesterday, and rightfully so. Priced at an aggressive $199, it has virtually alienated all other Android tablet manufacturers in one fell swoop, offering potential buyers a great piece of hardware and all of the content Amazon has to offer to back it up.
Despite this, there are still a few things that the Fire won't offer.
Jamezelle, jcase (that's me), and all of AndIRC (i.e. everyone - AndIRC is an open dev group), the same folks who rooted the pre-production Thunderbolt in February, proudly present:
A Very Dirty HTC Thunderbolt Root V1.02 2011/03/18
- Root with read/write access to /system
- Ability to downgrade and flash any RUU (i.e. signed firmware)