Both AT&T and Verizon have repeatedly and vociferously stated that their policy of locking bootloaders isn't going away any time soon. And in both cases, public-spirited security researcher Dan Rosenberg has managed to fox them on at least some hardware. Like a mischievous trickster deity, the Loki tool has been pressed into service to work around the locked bootloaders of various Samsung and LG devices, and the latest update adds support for the flagship LG G2 on both carriers. Read More
Locked bootloaders can be a real drag, but there's usually some way around it. In the case of the Verizon and AT&T Galaxy S4, Dan Rosenberg released the Loki tool to bypass the locked bootloader and execute custom kernels. This developer-focused tool has been a hit with its intended audience, and now it has added support for LG devices.
Loki can be obtained from GitHub with all the necessary code and documentation. Read More
When news broke that Verizon's and AT&T's versions of the Galaxy S4 would ship with locked/non-unlockable bootloaders, people were... upset. This sort of action was basically expected from Verizon, but AT&T had historically left its device's bootloaders unlocked, allowing users to do what they wanted with their own handsets. To make matters worse, the Galaxy S4's bootloader signature verification is nearly impossible to crack.
Then, at the first of the month, all-around genius hacker Dan Rosenberg released a teaser for his upcoming tool that would "hack" the AT&T's versions bootloader. Read More
It was only yesterday that Cyanogen definitively confirmed AT&T's treacherous move to lock down the Galaxy S4's bootloader, but there is light at the end of that tunnel. No thanks to AT&T but to security researcher extraordinaire and a person I admire Dan Rosenberg, a.k.a. the magician, a.k.a. the root whisperer.
Dan, who is responsible for numerous root and unlock exploits, tweeted this photo of his Galaxy S4 earlier today:
There are no instructions or blog posts explaining the unlock at Dan's blog yet - these should be coming in the future. Read More
When it comes to root and mod action on Motorola devices from the last couple of years, all eyes turn to brilliant Android hacker Dan Rosenberg. Since the Droid 3 was released two years ago, Rosenberg has successfully found root exploits for every Motorola device, including the D3, Bionic, RAZR, Droid 4, Xoom 2, Atrix HD, RAZR HD, and RAZR M. Add to that the fact he just released a tool that unlocks the bootloaders on the most modern Moto phones (RAZR HD, M, and Atrix HD), and it's not hard to see why he's such an important part of the Motorola modding community. Read More
Winning a $450 bounty and the hearts of Droid RAZR/MAXX users, Dan Rosenberg has found a successful root method for the phone's 4.1 JellyBean OTA, which began rolling out last Christmas Eve.
Some readers are likely familiar with Mr. Rosenberg's work, as he's rooted everything in sight from the Droid RAZR/MAXX HD to the RAZR M, all the way back to the LG Spectrum. As a security researcher, he's even given (and published) a helpful presentation on rooting and modding for the security conscious. Read More
Here's a bit of good news for anyone with an unrooted Motorola device - the root method released earlier today by Dan Rosenberg for the Xyboard/Xoom 2 should actually work on any Moto device that's running Gingerbread or Honeycomb. The direct quote, from Dan himself:
The Droid 4 root ("Motofail") should work on all Gingerbread Motorola devices that I know of. The just-released XYBoard root ("XYZ") should root all Gingerbread and Honeycomb Motorola devices.
Over the past 2 days, I've been watching a thread over at MDW that showcased a rooted Motorola XYBOARD tablet but instructed us to wait a few days for the root method to be released. Root was achieved by none other than Dan Rosenberg, the ninja from vulnfactory.org, who has been serving multiple root methods for previously unrootable devices left and right.
Good news, everyone [of you five fine gentlemen in the corner who own a XYBOARD] - as of this morning, we have the root files. Read More