This contest is now over.
The final results are listed below. If you've won, you will be contacted in the near future. Congratulations!
Everyone else - keep participating and stay tuned to Android Police so that you don't miss our upcoming giveaway announcements. You can follow AP on Twitter, Facebook, and RSS.
Any decent bank heist movie always has one common hurdle for the would-be thieves: a regularly changing access code to the vault, and only one person knows what it is. Read More
Some Moto X owners weren't particularly happy to learn that a recent OTA with improvements to the camera also had the undesirable consequence of breaking root acquired through PwnMyMoto. Fortunately, the creator of PwnMyMoto, Justin Case, is back with an updated root method that works on the latest Moto X update and should be compatible with all recent Motorola firmwares.
Update: RockMyMoto is confirmed to also work on the latest firmwares for the Droid Maxx, Ultra, and Mini. Read More
That didn't take long. Just 2 days after Justin Case released a root method for the Moto X, Droid Ultra, Droid Mini, and Droid Maxx, he's already back with a hack that bypasses write protection. By disabling the write protection afforded by the bootloader, it becomes possible to flash 3rd-party ROMs, themes, and other mods. In other words, the flood gates are open for the modding community.
Much like MotoRoot, PwnMyMoto is packaged as a single app that must be sideloaded with adb. Read More
When buying used phones off of eBay, Craigslist, or the like, a primary concern of anyone purchasing CDMA devices (Verizon, Sprint, Boost Mobile, Virgin Mobile, etc.) is the status of the phone's ESN (electronic serial number). If a device's ESN is registered as "banned" on its carrier because it has been listed as stolen or is attached to an unpaid account, then that phone cannot be activated on said carrier. Thus, the phone is either useless or has to be activated on a pre-paid carrier, which is generally not all that desirable and drastically decreases a device's worth. Read More
Justin Case has done it again, bringing root access back to users of Amazon's Kindle Fire who accepted the recent firmware update to version 6.2.2. BurritoRoot 2 is an easy-to-use exploit that only requires adb (Android debug bridge) and a few moments of your time. Users looking to root their device after Amazon's latest firmware update can grab BurritoRoot 2 using the download mirrors below.
To use the exploit, just download the file and run the following commands from adb:
adb push BurritoRoot2.bin /data/local/
adb shell chmod 777 /data/local/BurritoRoot2.bin
adb shell /data/local/BurritoRoot2.bin
adb shell id
<if uid = 0 continue, if not start over>
adb push su /system/xbin/su
adb shell chown 0.0 /system/xbin/su
adb shell chmod 06755 /system/xbin/su
adb install Superuser.apk (skip this step if its already installed)
For more information, check out Justin's original thread over at XDA. Read More
UPDATE: The Gingerbread radio is apparently being linked to hard bricks. We have removed the link for the time being, until this issue is resolved, or a new radio version is leaked.
This morning 911Sniper dropped a leaked Gingerbread test build for the HTC Thunderbolt, but there was one issue: it wasn't flashable. Our buddy Justin Case from TeamAndIRC immediately took it to the lab and started dissecting its parts to see what needed to be done. Read More