December 4, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Jordan shows you how to root your Oppo N1. The Oppo N1 is hot news in the Android ecosystem. It is the device that is pushing the limit of phone size, and some say even phablet size. This thing is huge. But as usual at XDA, we must root all the things, and the Oppo N1 is no exception!
Jordan presents step-by-step instructions on how to gain root access on your Oppo N1 using tools from the XDA Developers Forums. First, Jordan shows you how to gain root access using XDA Senior Recognized Developer Jcase’s APK root exploit. Then, he installs TWRP and OmniROM. If you wanted to root your Oppo N1, take a moment and check this video out.
November 25, 2013 By: Will Verduzco
For the most part, there aren’t too many Intel-powered Android smartphones on the market. There’s nothing inherently wrong with them, although things are a bit tricky for older NDK-produced apps that haven’t been cross-compiled. However, there is one relatively popular model that featured Intel’s Atom Z2460 chip, and that’s the Motorola RAZR i.
Recently, we talked about how Motorola was doing the right thing and reinstating warranties on developer edition devices that have had their bootloaders unlocked via Motorola’s unlocking service. Unfortunately though, this only applies to developer edition devices. Standard Motorola devices that are unlocked will have their warranties void, just as before. And previously on the RAZR i, this was the only way to obtain root access.
Now thanks to XDA Senior Recognized Developer jcase, you no longer have to unlock your bootloader in order to root your device. Jcase developed a seven-step root exploit method that will get you rooted without a bootloader unlock. The method involves a few adb push and adb shell commands, and they’re clearly laid out by the developer.
If you were holding off on rooting your RAZR i because you didn’t want to void your warranty, you may want to give Jcase’s method a shot. To get started, simply head over to the original thread and follow the seven easy steps. Developers interested in viewing the source code behind the exploit can do so by making your way over to Jcase’s GitHub.
[Many thanks to reader Dagonban for the tip!]
Earlier today, we covered a relatively simple root method for the Oppo N1. Unfortunately, however, that root method wasn’t exactly ideal, as it used the kingoroot root method to do the heavy lifting. And in addition to the potential hazards of that approach, it offered no real advantages over installing TWRP by Senior Recognized Developer Dees_Troy and then flashing Senior Recognized Developer Chainfire‘s SuperSU.
Now, however, XDA Senior Recognized Developer jcase presents a simple exploit-based root method based on research conducted by Saurik and Giantpune. The tool lets you achieve root on your N1 by simply installing and executing the provided APK. Once that is done, you wait one minute, install SuperSU from Google Play, and uninstall the APK using ADB (or a terminal emulator).
If simple root access is what you’re after and you don’t need to have the power and versatility of a custom recovery, jcase’s root exploit is your best bet for achieving root on the Oppo N1 simply and easily. Make your way over to the original thread to get started.
You really need to hold the Oppo N1 in your hands to fully understand the detail and design that Oppo crafted into this 5.9″ device. Aside from the sheer size, the device features a unique camera system, as well as a very healthy corporate policy on aftermarket development. While obtaining the device in many countries is still somewhat of a challenge, XDA Senior Member Harfainx shared simple and easy tool capable of rooting the N1. The process so simple that all you need to do is connect your device to your computer with USB Debugging enabled, and it’ll pretty much take care of the rest. The process is for Windows computers only, and requires ADB drivers to be installed, but other than that, there’s not much to it. Head over to the original thread, located within our newly created Oppo N1 Forum, to learn more. And while you’re at it, don’t forget to check out TWRP for the N1 courtesy of Senior Recognized Developer Dees_Troy!
November 23, 2013 By: Will Verduzco
After a fortuitous change of heart no doubt due to the influence of its new parent company, Motorola is now becoming one of the good guys. Along with their newly found acceptance of third-party developers, the company has also been pumping out KitKat updates for its flagship Moto X at an impressive pace. We were first shocked to see the Verizon model receive the first non-Nexus KitKat OTA update. Not too long after, we saw the T-Mobile and AT&T variants follow suit.
One thing is always a bit troublesome when upgrading Android firmwares, though, and that’s reacquiring root access. Thankfully, this has proven no major challenge for XDA Senior Recognized Developer jcase, who has managed to root the Android 4.4 update on the Moto X using what he is calling SlapMyMoto. SlapMyMoto is essentially a modified version of the previously covered RockMyMoto, an exploit package that was originally created to root the Moto X after it had received the 4.2.2 camera update.
It is important to note that SlapMyMoto is currently in a BETA release. What this means to end users is that while the root method works, it involves a rather convoluted procedure. In other words, non-techy users would be best served by holding off for now, while jcase readies a more permanent solution. But if you try this and you run into problems, jcase recommends flashing back to the 4.2.2 camera update. That said, this process is more risky than previous versions. And of course, don’t accept any OTAs after using this root method.
If you’ve been eagerly awaiting root access on your newly KitKat-laden Moto X, head over to the development thread to get started! Again, please keep in mind that this root method isn’t for the faint of heart. But if you follow the steps properly, you’ll be rewarded with a freshly rooted piece of that KitKat bar.
[Many thanks to jcase for the heads up!]
October 14, 2013 By: Jimmy McGee
At this years Big Android BBQ, a new player in the custom ROM world comes to life with the announcement of OmniROM. That and much more news is covered by Jordan, as he reviews all the important stories from this week. Included in this week’s news is an article reporting online flashing with Universal Kernel Flash Tool and the announcement that you can now root your Samsung Galaxy Note 3 in a KNOX-friendly way.
In other important news, Jordan talks about a multi-device image flasher based on CASUAL. Finally, Jordan talks about decompiling, deodexing, and more that you can accomplish with the Android Everything tool. Be sure to check out other videos on on XDA Developer TV. Pull up a chair and check out this video.
October 10, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer TK shows you how to root your Samsung Galaxy Note 3 with Odin and a PC. TK just recently reviewed the Samsung Galaxy Note 3, and it is the latest in Samsung’s phablet line. Many people say it’s a great device that is the current device to beat and is wonderful out of the box. But at XDA, we must root all the things.
TK presents step-by-step instructions on how to gain root access on your Samsung Galaxy Note 3 using tools from the XDA Developers Forums. The process is works for a majority of the variants. You will just need to follow the below links to XDA Elite Recognized Developer Chainfire’s thread and find the specific files for your variant. So take a moment and check this video out.
September 30, 2013 By: Jimmy McGee
The Sony Add-on SDK 2.0 has been released, and it brings new APIs for the Sony SmartWatch 2 and Xperia Z1. That and much more news is covered by Jordan, as he reviews all the important stories from this week. Included in this week’s news is an article about an easy rooting Toolkit makes rooting simple on Sony devices. In more Sony news, he talks about the guide on how to port the Sony small apps and task switcher to CM10.1.
Jordan talks about the other videos released this weekend on XDA Developer TV. XDA Developer TV Producer Jayce released a video answering his frequency asked questions, and later he released a video talking about how to combat procrastination. Pull up a chair and check out this video.
September 24, 2013 By: Jimmy McGee
We have talked about app development, Ubuntu Touch development, NFC and Firefox OS presentations from XDA:DevCon 2013. All of these presentations are of great value for developers and enthusiasts. However, there is a dark secret in your pocket: exploits. These exploits can be used for good, gaining root or unlocking. However, they can also be used for bad, such as stealing your chickens or texting curse words to your mother, or worse.
This presentation has a simple title, but the content is not simple. “Android Security Vulnerabilities and Exploits” presented by XDA Elite Recognized Developer jcase. Jcase is a mobile security researcher and the developer of many Android exploits. There is great reason he is an XDA Elite Recognized Developer. Members of the forum sing his praises and OEMs curse his names.
In his presentation, Jcase talks about how the very exploits we often use to root our phones expose us and others to malicious software such as spyware, bots, keyloggers and other forms of malware. He shows past vulnerabilities in applications and firmware and how they are mitigated today. He shows off some of the tools and methods he uses in identifying vulnerabilities. Finally, he walks the audience through finding a security vulnerability and exploiting it.
If you want to see more or get a copy of the presentations slides, visit the XDA:DevCon Presentations page.
September 21, 2013 By: Jimmy McGee
We’ve already talked about four great app development presentations, including Ubuntu Touch development from XDA:DevCon 2013. However, the presentations from Mark Murphy, Daniel Nazer, Ariel Shimoni and Michael Hall were not the only app development presentation at XDA:DevCon 2013, and this one is especially close to XDA’s heart.
The presentation was given by XDA Elite Recognized Developer Stericson. Being involved in the Android community since the pre-release of the T-Mobile G1, He started out learning how to create themes for Android. Stericson developed Android applications and the RootTools library to assist others with creating applications for root users. These were discussed in his presentation “Root Application Development with the RootTools Library.” As a developer, creating root applications for rooted users becomes extremely trivial with the RootTools open source library. Stericson focused on how to use the RootTools Library in order to create root applications that your users will love and appreciate.
If you want to see more or get a copy of the presentations slides, visit the XDA:DevCon Presentations page.
September 4, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Jordan shows you how to root your Nvidia Shield. The Nvidia Shield is a device that is in a class all of it’s own. There is really nothing else like it, and that is a good thing. But as usual, here at XDA we must root all the things and the Shield is no exception to that!
Jordan presents step-by-step instructions on how to gain root access and unlock the bootloader on your Nvidia Shield using tools from the XDA Forums. First, Jordan shows you how to unlock the device. Then he shows you how to gain root access. If you are having trouble installing the proper drivers on Windows 8, Jordan recommends checking out wwJoshdew’s video. So take a moment and check this video out.
July 30, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Kevin shows you how to root your New Nexus 7 (2013). To go along with Android 4.3, Google announced that they had refreshed the Nexus 7. Ever since, the Internet has wet its pants in excitement. Everyone is excited about the new device. As usual at XDA, we must root all the things.
Kevin presents step-by-step instructions on how to gain root access on your New Nexus 7 (2013) using tools from the XDA Forums. First, Kevin shows you how to unlock the device. Then, he shows you how to install TWRP custom recovery, and finally gain root access. So take a moment and check this video out.
The recently released Google Edition Galaxy S4 has been generating a lot of excitement since being announced. What a lot of people did not see coming was Jelly Bean 4.3 leak. Despite containing only a few minor changes likely that would affect the average end user, there may well still be a few differences under the hood that we are yet to discover.
A recently leaked Samsung firmware based on Android 4.3 (JWR66N for those keeping track) has been found to work pretty darn well on the original TouchWiz-laden Snapdragon-powered Galaxy S4. However it was not rootable until today, and therefore somewhat less viable of an option for those who can’t live without their root applications. Cue XDA Elite Recognized Developer Chainfire and his modified version of SuperSU, which is specially adapted for use with 4.3.
The exploit was made public in a Google+ post by Chainfire, and it explains precisely why a modified SuperSU is required. The main difference between this and a regular version of SuperSU, in Chainfires own words, is that:
For this root, SuperSU is running in daemon mode (new feature), and launched during boot.
The daemon handles all su requests, and while this should mostly work just fine, some apps may expect their su session to be running on the same branch on the process tree as the app that launched the session.
Whether these changes are due to Samsung or just Android 4.3 in general remains to be seen. But needless to say, once we see a few more 4.3-based firmwares, we will have an answer. There are also some other differences that will you will want to be aware of, especially those of you using a CWM-based recovery, so I highly recommend checking out that post in full.
If you’re currently running the 4.3 leak on your S4, this is probably something you’ve been looking forward to for a few days now. The flashable zip file itself can be downloaded from the Google+ post, and the current SuperSU thread should be used for any related issues.