For those who missed it, Steve Kondik, the founder and lead developer of CyanogenMod, along with several other members of the CM team gave a compelling talk in San Francisco at the start of Google I/O. Delivered during the SF Android User Group Meetup (hosted at Yelp), Kondik's talk took a look at CyanogenMod's role in the Android world, some of the project's goals, solutions, and the challenges the CM team faces in getting CM to new devices, explaining everything from conflicts with proprietary drivers to locked bootloaders and more.
Following yesterday's Jelly Bean AOSP invasion, the HSPA+ Galaxy Nexus is now receiving the release build 4.1.1 (JRO03C) of Jelly Bean. That's indeed great news, but since the rollout is usually staggered, not all phones are allowed to receive it the second it's out there. If you're rooted or have an unlocked bootloader, why not just bypass the line and flash the update manually? I just did, and it took only a few minutes.
The Android development community couldn't be more on fire today now that Android 4.1 has been fully open sourced. While the Jelly Bean flavored CyanogenMod 10 is not just here just yet (though work has already begun), the CyanogenMod team released a fantastic treat for new Galaxy S III owners on AT&T, Sprint, and T-Mobile - official nightlies, available for downloading and flashing right now:
Those wondering whether Motorola's recently-announced Atrix HD will carry a locked bootloader can exhale – in a string of tweets earlier this evening, Moto confirmed that, yes, the Atrix HD's bootloader will be locked and signed.
That being said, Moto indicated that their "goal" is to provide a way to "unlock the bootloaders on our devices to those who wish to do so," adding that more details are "to come."
@kulow_atx Motorola ATRIX HD at AT&T will have a locked bootloader to meet requirements; (1/2)
So, you heard about Google's new predictive text engine in the Android 4.1 Jelly Bean keyboard, right? Now you can download that keyboard courtesy of Beansoft (developer of Thumb Keyboard), from the Play Store, free of charge. It's ported straight from AOSP, though it's currently in "alpha" state. The only catch is that you need to be running Android 4.0.3 or higher (Ice Cream Sandwich).
I've noticed the Android 4.1 keyboard also seems to have improved accuracy and speed (it looks ever so slightly different, too), so this is definitely worth a try.
OK, OK, that's actually Linus Torvalds expressing his feelings about NVIDIA, but there's no better way to articulate the continued frustration with the complete lack of Sprint Galaxy Nexus support in AOSP. Verizon is [almost] there. Sprint, however, is not. Try finding it (hint: its codename is toroplus) - specifically, the CDMA/LTE binaries.
If you still have doubts about the above notion so eloquently conveyed by Linus' gesture, Jean-Baptiste Queru's comment confirms:
As far as toroplus, the situation is unchanged: there are no plans to support it as a target device for custom AOSP builds.
It means that ROMs that are built from AOSP, like CyanogenMod, can now start integrating the Jelly Bean code and release the first true JB nightlies. Not broken ports from the Galaxy Nexus builds - real ROMs.
On day one of Google I/O, the Play Store team announced an upcoming brand new version of the Android Developer Console - a publishing interface developers use to, you guessed it, publish apps to Google Play. The completely redesigned UI contains improvements based on feedback from the past several years and is fantastic. For further details, hit the link above or just watch this video:
As promised, you can now sign up to be first in line to give the private beta a go by following this url.
Xuxian Jiang, along with his research team at North Carolina State University, has cooked up a proof-of-concept "clickjack rootkit" which targets Android. The rootkit is unique not only in that it can function without a device restart, but also in that it targets Android's framework, not requiring deep modifications to the underlying firmware or kernel.
Clickjacking, for those unfamiliar, is a malicious technique typically used on the web to "trick" users into handing over control of their device or confidential information.