You've taken the plunge and thrown down some cold hard cash on a brand new HTC One M8, but you're feeling stifled because Verizon doesn't want to allow the bootloader to be unlocked? You might want to check out WeakSauce, a handy new root exploit by XDA recognized developers Justin Case (jcase) and beaups. It's a simple tool that can set up root on both the HTC One M8 and last year's model, the HTC One (codenamed M7).
HTC has released a whole slew of kernel source files for the 2013 version of the One today, following the gradual rollout of Android 4.4.2 to the device around the world. There are, frankly, too many variants to name in this post individually, but some of the highlights include Vodafone UK, AT&T, Sprint, O2 in Germany and the UK, and a number of unlocked variants. The screenshots below tell the full story.
Developers have certainly made great use of the Alpha and Beta distribution channels in the Play Store since they became available last summer. There was one glaring oversight: developers could only write a single block of text for the "What's New" section. This often led to changelogs that left beta testers in the dark about changes or confusing regular users with promises of new features and fixes that hadn't yet materialized in the stable channel.
Last December, Google announced LiquidFun, a cross-platform physics engine developers could use to create realistic gaming experiences. Now, as a part of Google Developer Day at this year's Game Developers Conference, the company has released version 1.0 out into the wild. It's also provided no shortage of videos demoing what the project is capable of.
When Samsung announced the Gear 2 and the Gear 2 Neo last month, the news came with the confirmation that the company was dropping Android from both devices. Instead, both smart watches are powered by Tizen. This may not mean all that much for consumers in the short term, but it does impact developers. For you, Samsung has just shared the first version of the Tizen SDK aimed at wearables. This is what you need to grab if you intend to build apps for the company's two intelligent wristwatches.
If you've been watching your tech news feed regularly over the past day or so, you've probably come across at least one story making the rounds about a "backdoor" vulnerability in some newer Samsung phones. The original report, published by the Free Software Foundation and written by Paul Kocialkowski, a developer of Replicant, does all but directly accuse Samsung of planting a method of securing remote access to users' devices. A quick read over of the piece makes it rather obvious that the author has a rather significant bone to pick with any and all proprietary software:
Following last week's big update, the Pebble smartwatch now has a centralized app store where Android users can find nifty content for their monochromatic watch. What next? The team is kicking off the Pebble App Challenge, offering up $5,000 to the app developer who finishes first and a Pebble Steel for each of the top 16 finalists. Users get new apps, some developers get nice stuff, and we the public get to watch the action firsthand.
It's no mystery that Google has been poking around wearable gadgets for quite some time. The list of projects seems to keep growing as we hear about rumors of an LG-made smartwatch, another prototype watch designed by Motorola, and of course, Google's own Glass. Earlier today at SXSW, Sundar Pichai took to the stage to announce plans to release a brand new SDK for Android-based wearable devices in about two weeks.
AIDE is an integrated development environments that lets you develop Android apps... from an Android app. Now the piece of software has reached version 2.5 and is taking things a step further. Instead of merely letting you code, it's prepared to teach you how. The latest version provides interactive lessons with step-by-step instructions, so you can learn how to program in Java and develop for Android at your own pace.
Malware is a problem for Android, but that problem almost exclusively exists outside the confines of the safety of the Play Store. Like any platform where the sharing of pirated, cracked software occurs, if you're downloading something you didn't rightly pay for, there's a risk it might be carrying a little something "extra" you hadn't counted on being included. For the most part, this is how Android malware spreads - but what do malware distributors do once they've got a device infected?