Well, that's the easy part done. The DROID X2 has been rooted, huzzah! The device was found to be vulnerable to one of the known root exploits out there (Gingerbreak) - apparently Moto couldn't be bothered to patch up the hole (the fix has been backported to 2.2 from AOSP, according to our own Justin Case.) This hasn't been fully confirmed yet, but it seems plausible, given that all previous Motorola Froyo builds have been susceptible to this exploit. Read More
Well, that was fast. It hasn't been very long since the vold exploit was found that allowed root access to Gingerbread and Honeycomb systems, but Google has already patched it and moved the fix into the AOSP code (see these commits: , , , ). This means that once this update is pushed, we will need to find another route to achieve root access on devices running Gingerbread and Honeycomb. Read More
Neither z4root nor SuperOneClick is currently working on the Charge (though I'm sure someone will come up with a one-click method soon enough), but guess what - Gingerbreak sure does. Follow these instructions, and you should have root and full /system unlock on your Droid Charge in a few minutes. Credit goes to the Exploid Crew and unnamed testers.
No custom recovery, such as ClockworkMod or RA, is available yet, but it is surely going to arrive very soon. Read More