The recently released Google Edition Galaxy S4 has been generating a lot of excitement since being announced. What a lot of people did not see coming was Jelly Bean 4.3 leak. Despite containing only a few minor changes likely that would affect the average end user, there may well still be a few differences under the hood that we are yet to discover.
A recently leaked Samsung firmware based on Android 4.3 (JWR66N for those keeping track) has been found to work pretty darn well on the original TouchWiz-laden Snapdragon-powered Galaxy S4. However it was not rootable until today, and therefore somewhat less viable of an option for those who can’t live without their root applications. Cue XDA Elite Recognized Developer Chainfire and his modified version of SuperSU, which is specially adapted for use with 4.3.
The exploit was made public in a Google+ post by Chainfire, and it explains precisely why a modified SuperSU is required. The main difference between this and a regular version of SuperSU, in Chainfires own words, is that:
For this root, SuperSU is running in daemon mode (new feature), and launched during boot.
The daemon handles all su requests, and while this should mostly work just fine, some apps may expect their su session to be running on the same branch on the process tree as the app that launched the session.
Whether these changes are due to Samsung or just Android 4.3 in general remains to be seen. But needless to say, once we see a few more 4.3-based firmwares, we will have an answer. There are also some other differences that will you will want to be aware of, especially those of you using a CWM-based recovery, so I highly recommend checking out that post in full.
If you’re currently running the 4.3 leak on your S4, this is probably something you’ve been looking forward to for a few days now. The flashable zip file itself can be downloaded from the Google+ post, and the current SuperSU thread should be used for any related issues.
June 11, 2013 By: Jimmy McGee
Last time, XDA Developer TV Producer Kevin explored DLNA. Today, he is continuing his exploration of often overlooked technologies that work with Android. To do this, Kevin talks about USB On-the-Go. All you need is an OTG cable, some accessories, and some time. The possibilities are endless.
Kevin gives a demonstration of USB On-the-Go. Kevin shows you five examples of how to use OTG on your device. From his Xbox controller, to his keyboard and mouse. He even shows you how to use a USB thumb drive to get additional storage or access to files with Nexus Media Importer and Nexus Photo Viewer. Finally, he shows off XDA Elite Recognized Developer Chainfire’s DSLR Controller app. What are you waiting for? Check out this video.
May 27, 2013 By: Jimmy McGee
XDA Elite Recognized Developer Chainfire has worked around Samsung’s attempt to block rooting your phone. Therefore, new devices have been added to CF-Auto-Root. That and more are covered by Jordan, as he reviews all the important stories from this weekend. Included in this week’s news is a tutorial on testing your app with Robotium. And in related news, there is an article on how flash custom ROMs and Recovery to the Samsung Galaxy S 4.
Jordan talks about the other videos released this week on XDA Developer TV. XDA Developer TV Producer Jayce released a video on phone interview tips and tricks and he follows it up with a video on tips and tricks for a main interview. Pull up a chair and check out this video.
May 24, 2013 By: jerdog
Samsung, Samsung, Samsung, you never cease to amaze. You love to say that you are friendly to the developer and user communities, and some have even bought that. There’s an old saying that says, “Actions speak louder than words.” There’s another one that says, “Fool me once, shame on you; fool me twice, shame on me.” Both apply here, as you stooped to another low when you started rolling out updates to the Samsung Galaxy S4 that disabled the ability to elevate user permissions (effectively what “su” does) via a kernel configuration.
With the update of SuperSU to v1.30, XDA Elite Recognized Developer Chainfire has patched the attempt by Samsung to hamper the developer community they so (hate) love. While good for a time when Samsung first deployed this, hack attempts like supercurio’s StupidSU are no longer needed, as they utilized a temporary solution.
In addition to the SuperSU update, Chainfire has also updated his CF-Auto-Root to include the Sprint Galaxy S4 and Canadian Galaxy S4, and updated the Samsung Galaxy S4 I9500 and I9505 releases. And to top it all off, ADBD Insecure was updated to allow it to play nicely with SELinux on the S4. Whew! That’s quite an impressive body of work in such a short time.
I think it’s time we learned a lesson from some wise, old contemporary philosophers who asked us to get on our knees and pray that “we don’t get fooled again” by Samsung’s words.
April 16, 2013 By: egzthunder1
We have had some rather long running projects on XDA over the years. Some involve simple, yet elegant things like theming engines (UCCW, VR Theme, etc), while others focus a bit more on the functionality side of things. The case for recovery images is one such area that needs to be constantly evolving due to the evolution of the devices and their inner workings. Pushing an insecure recovery into a device is not always easy. Or rather, it is not as simple as some people make it be. Lots of things and information are required even before beginning the process of loading it onto a new device. For XDA Recognized Developer Dees_Troy and other members of Team Win, this has been the case for a while now, but they always tend to come out on top.
TWRP (Team Win Recovery Project) is an open recovery project that has been around for a couple of years now. It is a great alternative to the ever popular CWM if you are looking for something with a bit more flair and functionality. This new version, which stands at 22.214.171.124, is loaded with updates and fixes. These changes make the overall experience smoother and more enjoyable. For instance as of version 126.96.36.199, TWRP was given the ability to turn off the screen to save battery while in recovery. Version 2.5 takes that concept a step further and not only allows the user to select the timeout, but now even the screen brightness can be tweaked as well. On top of that, partition handling and selection has been vastly improved, and it is now easier to use thanks to the implementation of a scrollable list. And as if that weren’t enough, not being in the Android UI should not mean that you cannot enjoy a good looking recovery with our ever-growing-pixel-packed screens. So, a theme for 1080 x 1920 was added for devices like the Xperia Z, HTC One, and others. And speaking of which, the recovery is now available for the new beast from HTC… the One.
Please do keep in mind that the new version is still undergoing somewhat heavy testing and there are some bugs that you may run into. On the other hand, if you manage to get this installed, rooting the One will be as simple as using the built in tool to inject SuperSU. Please take it for a spin and report feedback and bugs that you may run into.
Team Win Recovery Project 2.x, or twrp2 for short, is a custom recovery built with ease of use and customization in mind. It’s a fully touch driven user interface – no more volume rocker or power buttons to mash. The GUI is also fully XML driven and completely theme-able. You can change just about every aspect of the look and feel.
You can find more information in the original thread.
Want something published in the Portal? Contact any News Writer.
[Thanks to OEM Relations Manager jerdog for the tip!]
April 5, 2013 By: Jimmy McGee
XDA Elite Recognized Developer Chainfire has rooted the Samsung Galaxy S 4 successfully and variably. That story and more are covered by Jordan when he reviews all the important stories from this week. Included in this week’s news is a discussion of XDA’s April fools pranks, like us teaming up with Google to track iPhones and the Job Board shutting down.
Jordan talks about the other videos released this week on XDA Developer TV. XDA Developer TV Producer Kevin gives us a tutorial to remotely support or access computers from your device, Elite Recognized Developer AdamOutler started development on his Google ADK 2012, and TK released an Android App Review of Wakelock Detector. Pull up a chair and check out this video.
Just because a device hasn’t been released, is in limited release, or isn’t in the hand of a developer doesn’t mean that developers cannot root the device. XDA Elite Recognized Developer Chainfire has rooted a pre-release device a few times, such as when he remotely rooted the Samsung Galaxy S III. Today, we are talking about Chainfire’s CF-Auto-Root in a roundabout way.
XDA Recognized Developer DooMLoRD took the Nexus 4 version of CF-Auto-Root, modified it a bit, did a dance to the rooting gods, and crossed his fingers. Using TeamViewer, which we’ve reviewed in the past, to remotely attempt rooting, he was successful. Thanks to Chainfire’s app and DooMLoRD’s dancing, the Sony Xperia Z now has root.
It is important to note that you need to have firmware version 10.1.A.1.350, an unlocked bootloader, and fastboot files for this to work. Check out the original thread to find out more.
January 29, 2013 By: jerdog
We talk a lot about the importance of developers here at XDA because the reality is XDA was born for developers and exists for developers. So when one of our own consistently puts out significant and useful applications, we make sure to talk about it. XDA Elite Recognized Developer Chainfire is one of those. His work with CF-Root, Triangle Away, ExynosAbuse, PerfMon, FAAPT, adbd Insecure, and more is second to none. With SuperSU, he introduced an icon competition to pick the next icon for the upcoming version 1.00 of SuperSU. Now, both have reached completion.
With the icon competition, Chainfire decided to deploy some new SuperSU features into the mix, including the ability to choose from one of the four finalists for your app icon. Using SuperSU’s new UI enhancements, you choose the app icon in the Settings menu. The four choices are now:
It goes without saying that the new icons are spiffy, and the new features for SuperSU are as well. To add to the icon selection, SuperSU now has theme selection, convert to system app, 7″ tablet support, reworked shell detection, and much more. To find out more about the new features, visit the original thread and help support Chainfire’s continued contributions to the community.
It’s not often that a developer of many prolific applications gives the rest of the world the power to pick the icon for one of his apps. In this visual world, the icon is what the user sees when they decide what they want to open. And very often, the icon is what sets the first impression for the usefulness or value of the app. Essentially, it becomes the app’s identity.
XDA Elite Recognized Developer Chainfire decided that since many users were unhappy with SuperSU’s new icon Super Andy, he should let them pick its replacement. After a few months of taking user submissions, he is finally ready to let the voting begin. On his site, he has 150 user-submitted icon, ranging from the very basic to the intricate and complex. You can choose to vote for the few that you like, as well as choose the ones you don’t like. Chainfire does ask, however, that you limit the number of votes to a handful of positive and negative selections.
The competition is slated to take as long as there is significant voting activity, and his goal is to use the winning icon in SuperSU v1.00. He does reserve the right to veto the winning selection if it does not adhere to the Android Design Guidelines or if it does not match the color-scheme for the app. Other than that, the options are wide-open, so make sure you visit his website to begin the voting process. May the best icon win!
December 17, 2012 By: jerdog
We recently told you about the Exynos4 security hole found by XDA Member alephzain. This is a security hole in the kernel that allows malicious code full access to all physical memory. XDA Elite Recognized Developer Chainfire would have none of it, and not only pointed out the security hole by creating an app that roots your device without ODIN, but also provided a way to plug it.
His application, aptly named ExynosAbuse APK, gains root privileges via the ExynosAbuse exploit and installs SuperSU. In addition, in version v1.10, it allows you to disable the exploit at boot. The downside of disabling the exploit is that your camera may break. However, this is not so bad considering how your device can no longer be compromised by this exploit. Lesser of two evils, right? If you absolutely must have your camera, the application allows you to re-enable the exploit.
Unlike the other app-based patches out there, Chainfire’s solution to patch on boot runs before any normal Android apps perform their launch after boot code, thus preventing that attack vector as well. One thing Chainfire points out is that the protections included in his APK are just workarounds, rather than actual fixes. For that, we’ll have to rely on our talented developers in the XDA Developer community or Samsung. (Do I hear crickets chirping?)
For more details on the exploit, you can head over to alephzain’s exploit thread or Chainfire’s application thread. When visiting the latter, be sure to help Chainfire test various Samsung devices by stating your device, its firmware, and whether the application and fix worked.
December 11, 2012 By: Jimmy McGee
A little over a month ago, the Big Android BBQ event happened and XDA was in attendance. XDA Developer TV Producer Erica was there with her camera, recording all things exciting and interesting. After sifting through hundreds of hours of video, Erica presents a video detailing all the fun at the Big Android BBQ.
Erica interviews many people including, XDA Elite Recognized Developer supercurio, Recognized Developer and AOKP creator Roman Birg, Creator of Awesomeness Tha Phlash, Recognized Developer and creator of ClockWorkMod Recovery Koush, Senior Moderator M_T_M, Elite Recognized Developer AdamOutler, Elite Recognized Developer Chainfire, Elite Recognized Developer Entropy512, and a special appearance from TV Producer azrienoch. Also, you get to see parts of all the fun events at the Big Android BBQ that you missed if you didn’t attend. What are you waiting for? Watch this video!
Unless you’ve been hiding under a rock somewhere, you know that Google has released a few new devices (Nexus 4 and Nexus 10), as well as a refresh to the Nexus 7. What makes this different from previous Nexus releases is that there are two new manufacturers added to the mix with Asus (Nexus 7) and LG (Nexus 4) joining Samsung (Nexus 10 as well as Nexus S and Galaxy Nexus) and HTC (Nexus One).
We recently told you about XDA Elite Recognized Developer Chainfire’s new project to automatically root devices and keep them as stock as possible, and we now have an important update to share with you, as Chainfire has added CF-Auto-Root support for the new Nexus devices. What makes this update different from previous versions is that fastboot support has been enabled, as well as an updated version of SuperSU (v0.99).
Follow the links below to learn more and to obtain the downloads.
November 23, 2012 By: Jimmy McGee
In this third part of our four-part series, XDA Elite Recognized Developer and TV Producer AdamOutler shows you how to root your Samsung Galaxy Camera with Odin, Elite Recognized Developer ChainFire’s CF-AutoRoot, and a PC. Before this episode, AdamOutler submitted a recovery to Chainfire to be CF-AutoRooted. AdamOutler shows how easy CF-AutoRoot is to use.
In this episode, AdamOutler gives you a list of reasons why you would want to root your Galaxy Camera. He then gives you the step-by-step process for rooting the Galaxy Camera. If you missed it, check out part one of this series, where AdamOutler unboxes the Galaxy Camera and shows of the basics. Also, be sure to check out part two for a detailed tear down of the internals of the device.