The Google Pixel phones' development has had a big week; just a few days ago, the Verizon and EE variants had their bootloaders unlocked. Now, Chainfire, the famed developer of SuperSU and FlashFire, has debuted a systemless root method for the Pixels.
Due to the Pixels' odd partition structure (two system, two boot, two vendor, zero recovery, and zero cache partitions), Chainfire's root method required a bit of re-engineering. It's pretty impressive how quickly he was able to do this, but we'd expect no less from him. Read More
If you follow Android Police, there's a good chance you've got a rooted device, whether it be an easy-to-root Nexus or something like a Galaxy that takes more effort to do so. It's also very possible that you play Pokémon GO, which can probably be considered the fad of the year. For those of you who fall into both of those categories, you're probably frustrated that with the latest version (0.37), you'll now be forbidden from playing the game on your phone, just because some no-gooders used GPS spoofing and/or Xposed modules to get ahead. Even RootCloak doesn't work. Not to worry though, as there's a fairly simple way to circumvent this block. Read More
Well, it was nice while it lasted. A few months ago prolific Android developer Chainfire introduced a method of rooting Android devices without modifying the /System partition. It had the added and extremely welcome benefit of getting around SafetyNet detection for applications that were intentionally disabled on rooted phones, like Android Pay. But it looks like Google has caught on: starting this weekend (as reported on the /r/Android subreddit ), Android Pay and other SafetyNet apps no longer work with the roundabout root method. Bummer.
Google's system uses a server-side update, so at the moment there's no way to get around the check even with older versions of Android Pay, Google Play Services, et cetera. Read More