POSTS TAGGED: chainfire
Posted June 11, 2013 at 11:30 am by Jimmy McGee
Last time, XDA Developer TV Producer Kevin explored DLNA. Today, he is continuing his exploration of often overlooked technologies that work with Android. To do this, Kevin talks about USB On-the-Go. All you need is an OTG cable, some accessories, and some time. The possibilities are endless.
Kevin gives a demonstration of USB On-the-Go. Kevin shows you five examples of how to use OTG on your device. From his Xbox controller, to his keyboard and mouse. He even shows you how to use a USB thumb drive to get additional storage or access to files with Nexus Media Importer and Nexus Photo Viewer. Finally, he shows off XDA Elite Recognized Developer Chainfire’s DSLR Controller app. What are you waiting for? Check . . . READ ON »
Posted May 27, 2013 at 01:30 pm by Jimmy McGee
XDA Elite Recognized Developer Chainfire has worked around Samsung’s attempt to block rooting your phone. Therefore, new devices have been added to CF-Auto-Root. That and more are covered by Jordan, as he reviews all the important stories from this weekend. Included in this week’s news is a tutorial on testing your app with Robotium. And in related news, there is an article on how flash custom ROMs and Recovery to the Samsung Galaxy S 4.
Jordan talks about the other videos released this week on XDA Developer TV. XDA Developer TV Producer Jayce released a video on phone interview tips and tricks and he follows it up with a video on tips and tricks for a main interview. Pull up a chair and check out this . . . READ ON »
Chainfire Patches Samsung’s Attempts to Block Root, New Devices Added to CF-Auto-Root and ADBD Insecure
Posted May 24, 2013 at 03:30 pm by jerdog
Samsung, Samsung, Samsung, you never cease to amaze. You love to say that you are friendly to the developer and user communities, and some have even bought that. There’s an old saying that says, “Actions speak louder than words.” There’s another one that says, “Fool me once, shame on you; fool me twice, shame on me.” Both apply here, as you stooped to another low when you started rolling out updates to the Samsung Galaxy S4 that disabled the ability to elevate user permissions (effectively what “su” does) via a kernel configuration.
Posted April 16, 2013 at 03:30 pm by egzthunder1
We have had some rather long running projects on XDA over the years. Some involve simple, yet elegant things like theming engines (UCCW, VR Theme, etc), while others focus a bit more on the functionality side of things. The case for recovery images is one such area that needs to be constantly evolving due to the evolution of the devices and their inner workings. Pushing an insecure recovery into a device is not always easy. Or rather, it is not as simple as some people make it be. Lots of things and information are required even before beginning the process of loading it onto a new device. For XDA Recognized Developer Dees_Troy and other members of Team Win, this has been the case for a while now, but they always ten. . . READ ON »
Posted April 5, 2013 at 11:30 am by Jimmy McGee
XDA Elite Recognized Developer Chainfire has rooted the Samsung Galaxy S 4 successfully and variably. That story and more are covered by Jordan when he reviews all the important stories from this week. Included in this week’s news is a discussion of XDA’s April fools pranks, like us teaming up with Google to track iPhones and the Job Board shutting down.
Jordan talks about the other videos released this week on XDA Developer TV. XDA Developer TV Producer Kevin gives us a tutorial to remotely support or access computers from your device, Elite Recognized Developer AdamOutler started development on his Google ADK 2012, and TK released an Android App Review of Wakelock Detector. Pull up a chair . . . READ ON »
Posted February 20, 2013 at 02:00 am by Jimmy McGee
Just because a device hasn’t been released, is in limited release, or isn’t in the hand of a developer doesn’t mean that developers cannot root the device. XDA Elite Recognized Developer Chainfire has rooted a pre-release device a few times, such as when he remotely rooted the Samsung Galaxy S III. Today, we are talking about Chainfire’s CF-Auto-Root in a roundabout way.
XDA Recognized Developer DooMLoRD took the Nexus 4 version of CF-Auto-Root, modified it a bit, did a dance to the rooting gods, and crossed his fingers. Using TeamViewer, which we’ve reviewed in the past, to remotely attempt rooting, he was successful. Thanks to Chainfire’s app and DooMLoRD’s dancing, the Sony Xperia Z now . . . READ ON »
Posted January 29, 2013 at 06:00 pm by jerdog
We talk a lot about the importance of developers here at XDA because the reality is XDA was born for developers and exists for developers. So when one of our own consistently puts out significant and useful applications, we make sure to talk about it. XDA Elite Recognized Developer Chainfire is one of those. His work with CF-Root, Triangle Away, ExynosAbuse, PerfMon, FAAPT, adbd Insecure, and more is second to none. With SuperSU, he introduced an icon competition to pick the next icon for the upcoming version 1.00 of SuperSU. Now, both have reached completion.
With the icon competition, Chainfire decided to deploy some new SuperSU features into the mix, including the ability to choose from one of the four fin. . . READ ON »
Posted January 5, 2013 at 11:00 am by jerdog
It’s not often that a developer of many prolific applications gives the rest of the world the power to pick the icon for one of his apps. In this visual world, the icon is what the user sees when they decide what they want to open. And very often, the icon is what sets the first impression for the usefulness or value of the app. Essentially, it becomes the app’s identity.
XDA Elite Recognized Developer Chainfire decided that since many users were unhappy with SuperSU’s new icon Super Andy, he should let them pick its replacement. After a few months of taking user submissions, he is finally ready to let the voting begin. On his site, he has 150 user-submitted icon, ranging from the very basic to the . . . READ ON »
Posted December 17, 2012 at 08:00 am by jerdog
We recently told you about the Exynos4 security hole found by XDA Member alephzain. This is a security hole in the kernel that allows malicious code full access to all physical memory. XDA Elite Recognized Developer Chainfire would have none of it, and not only pointed out the security hole by creating an app that roots your device without ODIN, but also provided a way to plug it.
His application, aptly named ExynosAbuse APK, gains root privileges via the ExynosAbuse exploit and installs SuperSU. In addition, in version v1.10, it allows you to disable the exploit at boot. The downside of disabling the exploit is that your camera may break. However, this is not so bad considering how your device can no longer b. . . READ ON »