Will Verduzco · Jul 28, 2013 at 11:00 am

Chromecast Secure Boot Exploit and Root

The Google Chromecast is shaping up to be quite a popular device. Largely due to its price point, adoption of Google’s latest media streamer has been so high as to exhaust Google’s free Netflix promotion. As exciting as the new device is, it’s hard to disagree that the included feature set could be a bit better. However, as with all limited devices, it was only a matter of time before someone rooted it, and that’s exactly what the folks over at GTV Hacker have done.

So how does it work? You first must get your device into USB boot mode, which is accomplished by holding down the single button as the device powers on. Then you use a powered mini USB OTG cable to provide the device with a signed image at a specific address on the USB drive. This firmware is passed along to the device’s cryptography hardware to be verified. However, due to problems with the device’s image signature verification, return code is simply not checked. Thus, you are able to run your own code at will. One thing to keep in mind, though, is that this security hole could be closed with any update at any time, so it’s likely not to be available for too long.

So what can you do with this? Right now, not a whole lot. In fact, if you’re not thinking of developing for the device, we’d recommend not doing this due to the inherent risks. However, the groundwork has been laid for future developments that will build upon this and add more functionality to the admittedly spartan device. I mean after all, who wouldn’t want Miracast support on the Chromecast? Seems like a match made in heaven.

To learn more head over to the GTV Hacker Wiki and also read their coverage of the exploit. And when you’re ready to get in on the Chromecast fun yourself, be sure to head over to the newly created Google Chromecast forum.


_________
Want something on the XDA Portal? Send us a tip!

Will Verduzco

willverduzco is an editor on XDA-Developers, the largest community for Android users. Will Verduzco is the Portal Administrator for the XDA-Developers Portal. He has been addicted to mobile technology since the HTC Wizard. But starting with the Nexus One, his gadget love affair shifted to Google's little green robot. He is also a Johns Hopkins University graduate in neuroscience and is now currently studying to become a physician. View willverduzco's posts and articles here.
Emil Kako · Apr 27, 2015 at 12:26 pm · 4 comments

Do You Use 4:3 or 16:9 in the Camera App?

Every person has their own method of taking the best photos on their devices, but which aspect ratio is best when taking photos on your smartphone camera? Let us know whether you prefer to use 4:3 or 16:9 and why in the comments below.

DISCUSS
Aamir Siddiqui · Apr 27, 2015 at 11:12 am · 3 comments

The Curious Case Of The Flash Sale

What do the horses in the Xiaomi stable, notably the Mi 3, Mi 4, Redmi 1S, Redmi 2 & Redmi Note 4G have in common with the YU Yureka or the Micromax Canvas Spark, or even the Lenovo A6000 and the A7000? For starters, the mentioned phones are amongst the more value centric Android smartphones, aiming to offer a better deal in terms of specifications and an overall package, than their domestic and foreign competitors in the Indian market. What...

XDA NEWS
Jimmy McGee · Apr 27, 2015 at 06:00 am · 3 comments

3D Printable Mobile Microscope? Nexus 7 Discontinued – XDA TV

The Nexus 7 2013 has been discontinued on the Google Store! That and much more news is covered by Jordan when he reviews all the important stories from this weekend. Included in this weekend's news is the announcement of Xposed 3.0 Alpha 3 and be sure to check out the article talking about the 3D printable microscope for mobile devices. That's not all that's covered in today's video! Jordan talks about the other videos released this week on XDA TV. XDA...

XDA NEWS
Share This