It's been quite some time since we heard major release information from the ROM developers at the Android Open Kang Project, or as the cool kids call them, AOKP. After three months of relative quiet (though plenty of development and testing has been going on behind the scenes) The team just announced AOKP Jelly Bean Milestone 2, a complete and hopefully bug-free build that brings a ton of new features.
Some devices get all the ROMs. Of course, for the Google Play Edition of the Galaxy S4, that's kind of the point. Late last month an early version of Android 4.3 was leaked for the phone right around the time of its Play Store debut, and now an even newer build labeled "JWR66V" has popped up. According to XDA Developers forum poster Jahon, it was build on July the 11th, and now it's been re-packaged into a ROM file flashable in the custom recovery of your choice.
Several hours ago, an Android 4.3 system dump was leaked for the Nexus 4. As it turns out, even though the bootloader and the radios weren't included, the system dump is totally bootable. I'm running it right now. If you want to try it out, it's easy to do so, but be prepared to have your bootloader unlocked and flash some zips via a custom recovery. If you don't know what any of this means, I suggest you get familiarized with Android flashing first.
For the past few hours, I've been observing a curious case of Jeff Williams on Google+. Jeff posted a screenshot of what he claimed was a Nexus 4 he bought from a Googler... with a build of Android 4.3 on it. The same build, JWR66N, that we saw leaked earlier on a Galaxy S4 GPE by SamMobile.
In disbelief, some have called him a hoaxer, but a number of resourceful folks decided to get Jeff on IRC (channel #Android43 on freenode) and worked with him for hours, trying over and over to get the magical system dump that would prove Jeff's story to be real.
Community developer LlabTooFeR has reason to believe that Android 4.2 will, in fact, be coming to HTC's One S. A series of tweets late last night between Llab and a few followers indicate that the One S "Ville" model (the version using a Snapdragon S4 processor) will receive Android 4.2 one way or another.
Good news everyone,HTC will make update for One S (Ville)It will get 4.2.2 and Sense 5.0. No details about VilleC2...
Google has officially launched the new web version of the Play Store, and it's a looker. The new interface is based around - you might have guessed - cards and sidebar navigation. I can't find a single page that hasn't been completely revamped. The new look is quite attractive, I think, and presents information in a much more clean, readable manner.
While functionally there aren't a huge amount of changes, the visual difference is stark.
It's hard to deny that Android Studio has been a big hit since its announcement at Google I/O this year, and despite the "Early Preview" moniker, developers have been flocking to it. Yesterday afternoon, version 0.2.0 was announced through the Android Developers account on Google+. The new version brings several bug fixes and updates to the IntelliJ IDE, Lint, Gradle, templates, layout rendering, and more. While the list of new features is relatively sparse, what has been added it pretty cool.
Second verse, same as the first. Two days ago the CyanogenMod ROM team announced a security update to the CM 10.1 platform, incorporating the "Master Key" security patch that Google had already issued back in February. Yesterday another, more intricate exploit in the same vein was posted by a Chinese blog, and again, Google has rapidly moved to patch the problem in Android... which won't be much comfort to those running an older release.
Hot on the heels of Bluebox's disclosure of the "Master Key" exploit, a Chinese blog has posted details of a similar vulnerability. This attack also sidesteps a bug in the signature verification step and allows seemingly innocent APKs to include a potentially dangerous payload; and like its brethren, Google has already patched the flaw and posted it to the Android Open Source Project (AOSP). The information comes to us from a China-based group (or possibly individual) calling itself the Android Security Squad.
Scary tales about Android malware have been told since before people started guessing what dessert name would start with the letter 'D' (it's "Donut," in case anybody has forgotten.) Most of those claims came and went, amounting to little more than ghost stories. Unfortunately, there are a few real ghouls and goblins for which we should be afraid. Back in February, one such monster was discovered lurking about that allowed modified APKs to be installed on your device while successfully side-stepping the cryptographic signature used to prevent that very thing.