October 14, 2013 By: Jimmy McGee
At this years Big Android BBQ, a new player in the custom ROM world comes to life with the announcement of OmniROM. That and much more news is covered by Jordan, as he reviews all the important stories from this week. Included in this week’s news is an article reporting online flashing with Universal Kernel Flash Tool and the announcement that you can now root your Samsung Galaxy Note 3 in a KNOX-friendly way.
In other important news, Jordan talks about a multi-device image flasher based on CASUAL. Finally, Jordan talks about decompiling, deodexing, and more that you can accomplish with the Android Everything tool. Be sure to check out other videos on on XDA Developer TV. Pull up a chair and check out this video.
October 10, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer TK shows you how to root your Samsung Galaxy Note 3 with Odin and a PC. TK just recently reviewed the Samsung Galaxy Note 3, and it is the latest in Samsung’s phablet line. Many people say it’s a great device that is the current device to beat and is wonderful out of the box. But at XDA, we must root all the things.
TK presents step-by-step instructions on how to gain root access on your Samsung Galaxy Note 3 using tools from the XDA Developers Forums. The process is works for a majority of the variants. You will just need to follow the below links to XDA Elite Recognized Developer Chainfire’s thread and find the specific files for your variant. So take a moment and check this video out.
September 30, 2013 By: Jimmy McGee
The Sony Add-on SDK 2.0 has been released, and it brings new APIs for the Sony SmartWatch 2 and Xperia Z1. That and much more news is covered by Jordan, as he reviews all the important stories from this week. Included in this week’s news is an article about an easy rooting Toolkit makes rooting simple on Sony devices. In more Sony news, he talks about the guide on how to port the Sony small apps and task switcher to CM10.1.
Jordan talks about the other videos released this weekend on XDA Developer TV. XDA Developer TV Producer Jayce released a video answering his frequency asked questions, and later he released a video talking about how to combat procrastination. Pull up a chair and check out this video.
September 24, 2013 By: Jimmy McGee
We have talked about app development, Ubuntu Touch development, NFC and Firefox OS presentations from XDA:DevCon 2013. All of these presentations are of great value for developers and enthusiasts. However, there is a dark secret in your pocket: exploits. These exploits can be used for good, gaining root or unlocking. However, they can also be used for bad, such as stealing your chickens or texting curse words to your mother, or worse.
This presentation has a simple title, but the content is not simple. “Android Security Vulnerabilities and Exploits” presented by XDA Elite Recognized Developer jcase. Jcase is a mobile security researcher and the developer of many Android exploits. There is great reason he is an XDA Elite Recognized Developer. Members of the forum sing his praises and OEMs curse his names.
In his presentation, Jcase talks about how the very exploits we often use to root our phones expose us and others to malicious software such as spyware, bots, keyloggers and other forms of malware. He shows past vulnerabilities in applications and firmware and how they are mitigated today. He shows off some of the tools and methods he uses in identifying vulnerabilities. Finally, he walks the audience through finding a security vulnerability and exploiting it.
If you want to see more or get a copy of the presentations slides, visit the XDA:DevCon Presentations page.
September 21, 2013 By: Jimmy McGee
We’ve already talked about four great app development presentations, including Ubuntu Touch development from XDA:DevCon 2013. However, the presentations from Mark Murphy, Daniel Nazer, Ariel Shimoni and Michael Hall were not the only app development presentation at XDA:DevCon 2013, and this one is especially close to XDA’s heart.
The presentation was given by XDA Elite Recognized Developer Stericson. Being involved in the Android community since the pre-release of the T-Mobile G1, He started out learning how to create themes for Android. Stericson developed Android applications and the RootTools library to assist others with creating applications for root users. These were discussed in his presentation “Root Application Development with the RootTools Library.” As a developer, creating root applications for rooted users becomes extremely trivial with the RootTools open source library. Stericson focused on how to use the RootTools Library in order to create root applications that your users will love and appreciate.
If you want to see more or get a copy of the presentations slides, visit the XDA:DevCon Presentations page.
September 4, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Jordan shows you how to root your Nvidia Shield. The Nvidia Shield is a device that is in a class all of it’s own. There is really nothing else like it, and that is a good thing. But as usual, here at XDA we must root all the things and the Shield is no exception to that!
Jordan presents step-by-step instructions on how to gain root access and unlock the bootloader on your Nvidia Shield using tools from the XDA Forums. First, Jordan shows you how to unlock the device. Then he shows you how to gain root access. If you are having trouble installing the proper drivers on Windows 8, Jordan recommends checking out wwJoshdew’s video. So take a moment and check this video out.
July 30, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Kevin shows you how to root your New Nexus 7 (2013). To go along with Android 4.3, Google announced that they had refreshed the Nexus 7. Ever since, the Internet has wet its pants in excitement. Everyone is excited about the new device. As usual at XDA, we must root all the things.
Kevin presents step-by-step instructions on how to gain root access on your New Nexus 7 (2013) using tools from the XDA Forums. First, Kevin shows you how to unlock the device. Then, he shows you how to install TWRP custom recovery, and finally gain root access. So take a moment and check this video out.
The recently released Google Edition Galaxy S4 has been generating a lot of excitement since being announced. What a lot of people did not see coming was Jelly Bean 4.3 leak. Despite containing only a few minor changes likely that would affect the average end user, there may well still be a few differences under the hood that we are yet to discover.
A recently leaked Samsung firmware based on Android 4.3 (JWR66N for those keeping track) has been found to work pretty darn well on the original TouchWiz-laden Snapdragon-powered Galaxy S4. However it was not rootable until today, and therefore somewhat less viable of an option for those who can’t live without their root applications. Cue XDA Elite Recognized Developer Chainfire and his modified version of SuperSU, which is specially adapted for use with 4.3.
The exploit was made public in a Google+ post by Chainfire, and it explains precisely why a modified SuperSU is required. The main difference between this and a regular version of SuperSU, in Chainfires own words, is that:
For this root, SuperSU is running in daemon mode (new feature), and launched during boot.
The daemon handles all su requests, and while this should mostly work just fine, some apps may expect their su session to be running on the same branch on the process tree as the app that launched the session.
Whether these changes are due to Samsung or just Android 4.3 in general remains to be seen. But needless to say, once we see a few more 4.3-based firmwares, we will have an answer. There are also some other differences that will you will want to be aware of, especially those of you using a CWM-based recovery, so I highly recommend checking out that post in full.
If you’re currently running the 4.3 leak on your S4, this is probably something you’ve been looking forward to for a few days now. The flashable zip file itself can be downloaded from the Google+ post, and the current SuperSU thread should be used for any related issues.
June 23, 2013 By: Jimmy McGee
The main benefit to rooting one’s Android device is the ability to run applications that are developed for root users. These applications allow you to take control of your device and do a wide variety of actions not normally permitted or possible without root access. Some of these applications allow you to take entire system-wide backups, change your devices screen density, or even alter the look and feel of your device. There is no doubt that rooting a device has many advantages.
At XDA:DevCon 2013, we are talking all about app development. Scheduled to present is XDA Elite Recognized Developer Stericson. Also known as Stephen Erickson, Stericson has been involved in the Android community since the prerelease of the T-Mobile G1, or since rc19 if we want to go in terms of Android releases. He started out learning how to create themes for Android and then he moved on to hex edits that enabled one device’s apps to work on another device. He finally moved on to developing Android applications and the RootTools library to assist others with creating applications for root users.
As a developer, creating root-enabled applications becomes trivial with the RootTools open source library. Sterison’s presentation will focus on how to use the RootTools library in order to create root applications that your users will love and appreciate.
June 21, 2013 By: Samantha
Ever since moving to a phone with virtual navigation buttons, I’ve been bugged by the screen space they use—a gripe held by many out there as well. However you minimize this issue, be it a mod that reduces the height of the navigation bar, using Pie control on Paranoid Android or CM10, or a third-party app such as Button Savior, there’s now an alternative called the Ultimate Dynamic Navbar, developed by XDA Forum Member MrBIMC.
Ultimate Dynamic Navbar is possibly the one solution that many have been waiting for. Instead of drastically changing the way we navigate our devices with a different UI and position, it retains the navigation bar in its form and shape, with one subtle twist: It can hide itself. What’s even better is the extensive customization that MrBIMC has allowed for, packing in four different themes, the option to adjust transparency, and a choice of three activation methods, among plenty of other settings. Additional buttons can be set, and different actions can be triggered on long-press. The app also includes the option to hide the real navigation bar, thus a rooted device is required.
Ultimate Dynamic Navbar is actively supported by MrBIMC, with an agenda of ridding bugs and including even more customization options such as theming support. This support can already be seen with the seven versions already under his belt. The app is ad-free and is free exclusively on the XDA Forums. So if you would like to check it out, visit the original thread for more information and download.
“Wait, what is the Motorola MotoACTV? Doesn’t sound very familiar.”
Unbeknownst to many, the MotoACTV is an interesting device released by Motorola all the way back in 2011 that acts as a part-time watch, and a part-time fitness tracker. With Bluetooth, WiFi and GPS support, it also interestingly came with Android Gingerbread, thus making it a standout device among its smartwatch peers, and even more so with the active development going on behind it.
XDA Recognized Developer ClearD came up with a root method for the MotoACTV, crowning it the title of the first rooted smartwatch. With ClearD’s Root Tool recently updated to version 2.0.1, users of this device can not only root the MotoACTV, but also perform a plethora of other actions. These include:
In addition to the RootTool, ClearD also developed the MotoACTV Image Flasher, a tool that allow MotoACTV users to flash images and roms (and yes, there are custom ROMs for this watch), and wipe the device’s data and cache.
With a rooted device comes an overclock method, discovered by XDA Senior Member dproldan. Using the overclock module by Tiago Sousa and the provided zip file, users must have ADB installed to issue the given commands required to create 4 frequency steps:
So if you are a user of the Motorola MotoACTV, most definitely go ahead and check out the development thread for more information and discussion.
May 24, 2013 By: jerdog
Samsung, Samsung, Samsung, you never cease to amaze. You love to say that you are friendly to the developer and user communities, and some have even bought that. There’s an old saying that says, “Actions speak louder than words.” There’s another one that says, “Fool me once, shame on you; fool me twice, shame on me.” Both apply here, as you stooped to another low when you started rolling out updates to the Samsung Galaxy S4 that disabled the ability to elevate user permissions (effectively what “su” does) via a kernel configuration.
With the update of SuperSU to v1.30, XDA Elite Recognized Developer Chainfire has patched the attempt by Samsung to hamper the developer community they so (hate) love. While good for a time when Samsung first deployed this, hack attempts like supercurio’s StupidSU are no longer needed, as they utilized a temporary solution.
In addition to the SuperSU update, Chainfire has also updated his CF-Auto-Root to include the Sprint Galaxy S4 and Canadian Galaxy S4, and updated the Samsung Galaxy S4 I9500 and I9505 releases. And to top it all off, ADBD Insecure was updated to allow it to play nicely with SELinux on the S4. Whew! That’s quite an impressive body of work in such a short time.
I think it’s time we learned a lesson from some wise, old contemporary philosophers who asked us to get on our knees and pray that “we don’t get fooled again” by Samsung’s words.
May 13, 2013 By: Conan Troutman
There has been a bit of a back and forth between the development community and Verizon lately, specifically relating to the Samsung Galaxy Note 2. It is perhaps best summed up by XDA Elite Recognized Developer AdamOutler:
“Well, this has been quite the saga thus far…
Us: Suck It Verizon (exploit)
them: Suck it XDA-Developers (OTA patch)
Us: Back Atcha Verizon (exploit)
them: Stop it XDA (OTA Patch)
Us: No You! (exploit)”
The combination of Adam’s CASUAL deployment system and Recognized Developer Ralekdev‘s exploits themselves has been continually providing Verizon Note 2 owners with the ability to free their device through each OTA. The pair have once again managed to undo the restrictions put in place by the latest update, and they have released that exploit to the public. Be aware that this is only for those who are running a completely stock ROM. If you are not stock and have already installed a custom recovery, this will cause you issues.
This exploit lifts the restrictions put in place by Verizon that prevent the device from running unauthorized software. Be warned that it will leave you unable to accept their OTA updates. However, you will now have a much friendlier bootloader, and who doesn’t want that?
For those of you who are running a stock ROM and looking to unlock their device, the usual rules apply. Windows(7/8)/Mac/Linux users can all make use of this cross platform tool, which will take you through the process quickly and easily. Make sure you have Java installed beforehand and you’re all set. As always, be prepared to take a log if you run into any issues, and make sure to have a thorough read through the development thread before starting the process.