Despite Verizon's best efforts to keep their own variant of the Galaxy SIII locked down, ingenious users haven't been deterred in rooting, flashing custom ROMs, and even bypassing the device's locked bootloader to use custom kernels. The fact remained, however, that VZW's SIII had a locked bootloader which, in general, is a hassle for developers and tweakers hoping to customize the SIII to its fullest potential. It was this fact that made Samsung's promised Developer Edition SIII appealing to many.
Things started to look a little brighter for SIII users on Verizon today though, with the introduction of an unsecure bootloader "leaked by an African-Canadian Sock Monkey," revealed earlier this evening at XDA.
The exploit – dubbed CASUAL for Verizon GS3 – is basically a leaked unsecure bootloader which skips signature checking on the boot partition.
It's easy to apply, but of course carries the standard warning that those who apply it do so at their own peril, and should not apply any factory updates from Samsung afterward, lest they risk bricking their device.
With Samsung's Developer Edition SIII still labeled "coming soon," this exploit may be a good option for those that already own a Verizon-connected SIII and have been yearning for an unlocked bootloader. To grab the download and find full instructions/information about the exploit, just follow the link below.
Source: XDA Forums