September 4, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Jordan shows you how to root your Nvidia Shield. The Nvidia Shield is a device that is in a class all of it’s own. There is really nothing else like it, and that is a good thing. But as usual, here at XDA we must root all the things and the Shield is no exception to that!
Jordan presents step-by-step instructions on how to gain root access and unlock the bootloader on your Nvidia Shield using tools from the XDA Forums. First, Jordan shows you how to unlock the device. Then he shows you how to gain root access. If you are having trouble installing the proper drivers on Windows 8, Jordan recommends checking out wwJoshdew’s video. So take a moment and check this video out.
July 30, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Kevin shows you how to root your New Nexus 7 (2013). To go along with Android 4.3, Google announced that they had refreshed the Nexus 7. Ever since, the Internet has wet its pants in excitement. Everyone is excited about the new device. As usual at XDA, we must root all the things.
Kevin presents step-by-step instructions on how to gain root access on your New Nexus 7 (2013) using tools from the XDA Forums. First, Kevin shows you how to unlock the device. Then, he shows you how to install TWRP custom recovery, and finally gain root access. So take a moment and check this video out.
The recently released Google Edition Galaxy S4 has been generating a lot of excitement since being announced. What a lot of people did not see coming was Jelly Bean 4.3 leak. Despite containing only a few minor changes likely that would affect the average end user, there may well still be a few differences under the hood that we are yet to discover.
A recently leaked Samsung firmware based on Android 4.3 (JWR66N for those keeping track) has been found to work pretty darn well on the original TouchWiz-laden Snapdragon-powered Galaxy S4. However it was not rootable until today, and therefore somewhat less viable of an option for those who can’t live without their root applications. Cue XDA Elite Recognized Developer Chainfire and his modified version of SuperSU, which is specially adapted for use with 4.3.
The exploit was made public in a Google+ post by Chainfire, and it explains precisely why a modified SuperSU is required. The main difference between this and a regular version of SuperSU, in Chainfires own words, is that:
For this root, SuperSU is running in daemon mode (new feature), and launched during boot.
The daemon handles all su requests, and while this should mostly work just fine, some apps may expect their su session to be running on the same branch on the process tree as the app that launched the session.
Whether these changes are due to Samsung or just Android 4.3 in general remains to be seen. But needless to say, once we see a few more 4.3-based firmwares, we will have an answer. There are also some other differences that will you will want to be aware of, especially those of you using a CWM-based recovery, so I highly recommend checking out that post in full.
If you’re currently running the 4.3 leak on your S4, this is probably something you’ve been looking forward to for a few days now. The flashable zip file itself can be downloaded from the Google+ post, and the current SuperSU thread should be used for any related issues.
June 23, 2013 By: Jimmy McGee
The main benefit to rooting one’s Android device is the ability to run applications that are developed for root users. These applications allow you to take control of your device and do a wide variety of actions not normally permitted or possible without root access. Some of these applications allow you to take entire system-wide backups, change your devices screen density, or even alter the look and feel of your device. There is no doubt that rooting a device has many advantages.
At XDA:DevCon 2013, we are talking all about app development. Scheduled to present is XDA Elite Recognized Developer Stericson. Also known as Stephen Erickson, Stericson has been involved in the Android community since the prerelease of the T-Mobile G1, or since rc19 if we want to go in terms of Android releases. He started out learning how to create themes for Android and then he moved on to hex edits that enabled one device’s apps to work on another device. He finally moved on to developing Android applications and the RootTools library to assist others with creating applications for root users.
As a developer, creating root-enabled applications becomes trivial with the RootTools open source library. Sterison’s presentation will focus on how to use the RootTools library in order to create root applications that your users will love and appreciate.
June 21, 2013 By: Samantha
Ever since moving to a phone with virtual navigation buttons, I’ve been bugged by the screen space they use—a gripe held by many out there as well. However you minimize this issue, be it a mod that reduces the height of the navigation bar, using Pie control on Paranoid Android or CM10, or a third-party app such as Button Savior, there’s now an alternative called the Ultimate Dynamic Navbar, developed by XDA Forum Member MrBIMC.
Ultimate Dynamic Navbar is possibly the one solution that many have been waiting for. Instead of drastically changing the way we navigate our devices with a different UI and position, it retains the navigation bar in its form and shape, with one subtle twist: It can hide itself. What’s even better is the extensive customization that MrBIMC has allowed for, packing in four different themes, the option to adjust transparency, and a choice of three activation methods, among plenty of other settings. Additional buttons can be set, and different actions can be triggered on long-press. The app also includes the option to hide the real navigation bar, thus a rooted device is required.
Ultimate Dynamic Navbar is actively supported by MrBIMC, with an agenda of ridding bugs and including even more customization options such as theming support. This support can already be seen with the seven versions already under his belt. The app is ad-free and is free exclusively on the XDA Forums. So if you would like to check it out, visit the original thread for more information and download.
“Wait, what is the Motorola MotoACTV? Doesn’t sound very familiar.”
Unbeknownst to many, the MotoACTV is an interesting device released by Motorola all the way back in 2011 that acts as a part-time watch, and a part-time fitness tracker. With Bluetooth, WiFi and GPS support, it also interestingly came with Android Gingerbread, thus making it a standout device among its smartwatch peers, and even more so with the active development going on behind it.
XDA Recognized Developer ClearD came up with a root method for the MotoACTV, crowning it the title of the first rooted smartwatch. With ClearD’s Root Tool recently updated to version 2.0.1, users of this device can not only root the MotoACTV, but also perform a plethora of other actions. These include:
In addition to the RootTool, ClearD also developed the MotoACTV Image Flasher, a tool that allow MotoACTV users to flash images and roms (and yes, there are custom ROMs for this watch), and wipe the device’s data and cache.
With a rooted device comes an overclock method, discovered by XDA Senior Member dproldan. Using the overclock module by Tiago Sousa and the provided zip file, users must have ADB installed to issue the given commands required to create 4 frequency steps:
So if you are a user of the Motorola MotoACTV, most definitely go ahead and check out the development thread for more information and discussion.
May 24, 2013 By: jerdog
Samsung, Samsung, Samsung, you never cease to amaze. You love to say that you are friendly to the developer and user communities, and some have even bought that. There’s an old saying that says, “Actions speak louder than words.” There’s another one that says, “Fool me once, shame on you; fool me twice, shame on me.” Both apply here, as you stooped to another low when you started rolling out updates to the Samsung Galaxy S4 that disabled the ability to elevate user permissions (effectively what “su” does) via a kernel configuration.
With the update of SuperSU to v1.30, XDA Elite Recognized Developer Chainfire has patched the attempt by Samsung to hamper the developer community they so (hate) love. While good for a time when Samsung first deployed this, hack attempts like supercurio’s StupidSU are no longer needed, as they utilized a temporary solution.
In addition to the SuperSU update, Chainfire has also updated his CF-Auto-Root to include the Sprint Galaxy S4 and Canadian Galaxy S4, and updated the Samsung Galaxy S4 I9500 and I9505 releases. And to top it all off, ADBD Insecure was updated to allow it to play nicely with SELinux on the S4. Whew! That’s quite an impressive body of work in such a short time.
I think it’s time we learned a lesson from some wise, old contemporary philosophers who asked us to get on our knees and pray that “we don’t get fooled again” by Samsung’s words.
May 13, 2013 By: Conan Troutman
There has been a bit of a back and forth between the development community and Verizon lately, specifically relating to the Samsung Galaxy Note 2. It is perhaps best summed up by XDA Elite Recognized Developer AdamOutler:
“Well, this has been quite the saga thus far…
Us: Suck It Verizon (exploit)
them: Suck it XDA-Developers (OTA patch)
Us: Back Atcha Verizon (exploit)
them: Stop it XDA (OTA Patch)
Us: No You! (exploit)”
The combination of Adam’s CASUAL deployment system and Recognized Developer Ralekdev‘s exploits themselves has been continually providing Verizon Note 2 owners with the ability to free their device through each OTA. The pair have once again managed to undo the restrictions put in place by the latest update, and they have released that exploit to the public. Be aware that this is only for those who are running a completely stock ROM. If you are not stock and have already installed a custom recovery, this will cause you issues.
This exploit lifts the restrictions put in place by Verizon that prevent the device from running unauthorized software. Be warned that it will leave you unable to accept their OTA updates. However, you will now have a much friendlier bootloader, and who doesn’t want that?
For those of you who are running a stock ROM and looking to unlock their device, the usual rules apply. Windows(7/8)/Mac/Linux users can all make use of this cross platform tool, which will take you through the process quickly and easily. Make sure you have Java installed beforehand and you’re all set. As always, be prepared to take a log if you run into any issues, and make sure to have a thorough read through the development thread before starting the process.
Users of the Xperia Tablet S, rejoice! XDA Forum Member xxliftsupxx has discovered a sneaky method to root Android 4.1.1 on the sgpt12… finally.
Soon after noticing that the the sgpt12 uses the exact same kernel as the Asus Transformer, which has a working root method, xxliftsupxx stumbled across Dan Rosenberg’s Motochopper, the same tool used to root a variety of Motorola devices, as well as the Galaxy S4. The method is quite simple, requiring you to download Motochopper and run the ‘run.bat‘ file while the tab is connected in USB debugging mode, very much the same as the Asus Transformer.
If you do find yourself with an unsuccessful root, Forum Member jappaj has posted simple fixes through replacing the ‘adb.exe‘ file in the root package or manually debug and root through windows command prompt. Windows 8 users may have to follow instructions posted by Forum Member jimibxl and Senior Member stifilz, which require some extra steps and downloads to get things working.
This root exploit is a welcomed discovery for users of the Xperia Tablet S, who for a long time, have not been able to have any sorts of developmental works for the device because of the unlockable bootloader courtesy of Sony’s VAIO department. Please note, however, that this is not Sony’s Mobile Communication’s department, which is doing wonders for their latest Android devices.
April 27, 2013 By: Mike Szczys
If you’re thinking about signing up for a carrier-subsidized Samsung Galaxy S4 here’s a bit of good news: XDA Recognized Developer Djrbliss posted a rooting guide that is dead simple and works with all variations that use a Qualcomm processor (AT&T, T-Mobile, Verizon, etc.). The technique was originally developed for Motorola devices, and thus is called Motochopper. It will work for Windows, Linux, or OSX. Windows users will need to have the latest Samsung USB drivers. With that prerequisite satisfied, you need only run the .bat (Windows) or .sh (the other OSes) file get your root on.
This was just released yesterday, and there are a few things to consider before giving it a spin. Rooting the S4 can be considered a bit risky because there isn’t a clear path for fixing the device if rooting fails. But I image it won’t be too long before someone is able to dump a stock image and get a custom recovery working on the device. And I’m sure you’ve heard the news that at least some carriers will be delivering phones with locked bootloaders (booo!) but that’s never stopped us before. Maybe the same exploit that worked with the Atrix HD will work with these since the processors are cousins?
If you still want to throw caution to the wind, head over to the original thread for a download link and instructions.
The Acer E350, otherwise known as the Liquid Gallant, is one of those devices that sits squarely in the middle of the road. While more than capable of running Android 4.0.3, its specs aren’t really anything to write home about. This coupled with the fact that Acer’s devices aren’t particularly renowned for their developer support means that the E350 wasn’t given it’s own dedicated forum. That however has not stopped those with the device from providing it with that all important trio of root, recovery, and ROM that no device should be left without.
XDA Forum Member jaapstreepjan posted a thread detailing exactly how to go about gaining root access and installing a custom CWM-based recovery to the E350, as well as a simple tweaked stock ROM to be flashed from your shiny new recovery. The ROM includes some enhancements such as Google Now, init.d support, and a less bloated /system partition among others. The root method is courtesy of XDA Forum Member Bin4ry, and the recovery via XDA Forum Member erlucky.
If you own one of these devices and are looking to extend its capabilities, check out the original thread for more info.
November 20, 2012 By: Jimmy McGee
Recently, Jamie Condliffe of Gizmodo posted an article asking why anyone would want to root their stock Android device. Our recent news that we published regarding the Nexus 4 being rooted prompted the question.
Condliffe asks, “What are the amazingly useful features you can only access by rooting a Nexus 4? And are they worth the effort, when you already have a great, clean install of Android on your handset in the first place? Tell us”
Who better to answer this question than our own wireless device freedom advocate and XDA Developer TV Producer azrienoch. In this video azrienoch “tells them” why rooting is worth the effort. Check out what azrienoch has to say.
November 19, 2012 By: Jimmy McGee
Jelly Bean Leak, Nexus device rooted, Windows 8 and wireless device manufacturers’ agreements—all this and more covered on today’s episode of XDA Developer TV. Android News specialist Jordan talks about the Jelly Bean leak for the international variant of the Samsung Galaxy S II. Also mentioned is the article talking about more and more Windows 8 apps being released.
In rooting news, Jordan mentions the rooting guide for the Droid DNA device. Also, to the surprise of no one, the Nexus 4 has been rooted. Finally, Jordan mentions the agreement between HTC and Apple and Samsung’s demands to see the particulars of this agreement. Pull up a chair and check out this video.