Sure, the Galaxy S III is the first major flagship device to get Jelly Bean outside the Nexus line. That's not fast enough for you, though, is it? Of course not! We can do better! Or, more accurately, XDA can do better. In fact, a TouchWiz Jelly Bean ROM has found its way to the development forum giant's threads already!
The build is still unofficial and obviously there are inherent risks to flashing it.
If you jumped on the phablet bandwagon as soon as the Intuition hit Big Red's shelves, you've probably been waiting for a root exploit to hit so you can take full control of the system. Good news! Thanks to our boy jcase, you can now have what your heart so desperately desires. Let's get started.
Those of us with rooted devices and a penchant for flashing ROMs know just how valuable a great backup tool can be. Titanium backup is undoubtedly one of the most popular (and most useful) backup tools around, and it just got an update to version 5.6.0.
The update, which had been floating around as a "test version" prior to official release, brings a few UI enhancements and fixes, an updated set of translations, and improved "Market Doctor" and "Force Attach" functions to repair broken links between apps and the Play Store.
Yesterday, we told you that Amazon's newest Kindles are shipping with locked bootloaders. We mentioned that this probably wouldn't prevent the devices from being rooted, as a method was already in the works. That method has now been confirmed, and root for the Kindle Fire HD is go!
This is confirmed to work on the Fire HD 7, but should work on all new variants that are based on ICS.
So, you were thinking about picking up a Kindle Fire HD, rooting it, and throwing a ROM on it for an impressive $200 tablet? Turns out that idea may not work out as well as we initially thought: both the Kindle Fire HD and the second gen KF have locked bootloaders. Bummer.
This may not mean that custom ROMs are impossible on these devices, only that it's more improbable.
For those who may not know, the bootloader is responsible for checking the firmware's signature before a device boots.
Today, Motorola just floored users with an unprecedented offer: if you bought a phone from Motorola that launched in 2011, most of you will receive an upgrade to Jelly Bean. If, however, you're using a phone that Motorola decides will have a degraded experience, you will receive $100 in credit towards an upgrade. This may mark the first time that a manufacturer has broadly promised compensation for a lack of updates for all of its devices.
Look around the web and it seems like whenever anyone has a "how can I make my <Android device> do ______," the answer is invariably "root it." And to anyone involved in the Android community, you get the impression that most Android users are rooted. Unfortunately, what people tend to forget is that while a few million Android users may be rooted, there are hundreds of millions of active Android devices out there - meaning rooted users represent a small minority of owners.
For months now, users who wanted to root their Logitech Revue GoogleTV unit were either forced to use hardware modifications or do without. Now, though, Android hacker extraordinaire Dan Rosenberghas found a way to do it completely through software. There's only one problem: it's both extremely difficult and risky. Still, if you're up for a challenge, this one's for you.
This hack uses an exploit called nandpwn, which is explained better on GTVhacker than I could ever do:
A local privilege escalation exploit for the Logitech Revue that leverages the ability to map the hardware registers of the NAND flash controller in conjunction with a Linux kernel information leak to clobber kernel memory in a way that allows gaining privileges.
We've all read the horror stories: a new virus is crawling through the third-party stores, aiming to steal your personal information, identity, and first born child. More often than not, this type of malicious app is made possible because of one of the various root vulnerabilities that have been discovered throughout the various versions of Android.
X-Ray is a new app that lets you see exactly how vulnerable your device is by scanning it against several of these exploits, including RageAgainstTheCage, Gingerbreak, Mempodroid, Levitator, and a few more.
Of the four major US carriers to receive the Galaxy S III, Verizon is the only one to lock down the bootloader. This has made a lot of people very angry and been widely regarded as a bad move. Nevertheless, enterprising hackers over at XDA and RootzWiki have successfully managed to circumvent the lock, achieve root, and flash ClockworkMod recovery. If you're on Verizon and anticipating owning a Galaxy S III, congratulations: your phone is yours again.