Smartphone cameras have advanced so tremendously over the past few years that they have almost completely replaced point and shoot digital cameras for the most of us. Furthermore, since our smartphones are always with us, the majority of us end up taking tons of photos throughout the lifespan of our devices. But what happens to all the old photos you take? Do you store them on an external hard-drive or keep them backed up to an online cloud service like Flickr? Let us know what your favorite way of storing old photos is and why.
Just Like That, Kindle Fire HD 7 Receives the Gift of Root
Just earlier today, we discussed the invulnerable, un-crackable, Kindle Fire HD7 (bootloader, anyway). We talked about how Amazon was trying their hardest to keep you purchasing one important thing for them: content. We also talked about how the device is very well protected at the bootloader level, which means that no custom ROMs will surface any time soon. Having said that, we just became aware thanks to a thread by XDA Elite Recognized Developer jcase that the Kindle Fire HD7 was finally free from its chains and successfully rooted. As it turns out, the exploit was nothing new, and in fact, it was a method developed by XDA Recognized Contributor sparkym3 for the Eee Transformer Prime.
A while back, sparkym3 found an exploit for ICS that allowed developers easily obtain root. However, shortly after it was published, Google patched up the exploit and it stopped working on more updated builds of ICS and above. Fast forward a few months, and we are sitting in front of an ICS-based device. As it turns out, it looks like the good people from Amazon did not exactly do their due diligence, and happened to miss a commit posted on AOSP that discussed and dealt with the hole found by sparkym3. When devs started looking for exploits and tried a few out, this one seemed to work. It was tried a few times over and confirmed that the invulnerable device indeed had an Achilles’ heel. All in all, the hole is present in the latest KF code. This prompted the dev to pick up the old exploit again and write an easy-to-use tool for this partuclar device.
The new app can be found under the name Qemu Automated Root, and using it is a simple ordeal. Y0u simply need to make sure that you have the correct drivers installed on your PC, which also happen to be provided in the thread. So, if this is what you were waiting for to make the jump to the HD 7 while laughing at Amazon’s misfortune, take it for a spin. If you truly need some hand holding to do this, XDA Forum Member reverendkjr has posted a video on how to root the device.
This tool will root your device based on my qemu local.prop root method.
Want something published in the Portal? Contact any News Writer.[Thanks to jcase for the tip!]
Want something on the XDA Portal? Send us a tip!
Before the release of Android 5.0 Lollipop, the Holo Design guidelines served as the official reference for Android design, right from IceCream Sandwich to KitKat. However, updates to the guidelines were few and far between, leading to a lack of synchronization between Android design and current UI/UX trends. Google seems to have learned from their mistake the last time around, and earlier this week, a significant update was released for the Material Design guidelines, marking the second revision in less...
New Privacy concerns have emerged regarding Cyanogen’s latest announcements, primarily the inclusion of email app Boxer and that of a multitude of Microsoft apps, including Bing services, Skype, OneDrive, OneNote, Outlook, and Microsoft Office. The concerns arise when you look at both announcements together. At face value they may appear to be the beginning of Cyanogen’s plan to “take Android away from Google,” however there is certainly something more nefarious occurring. Along side the partnership with Microsoft, Cyanogen also recently announced...