Earlier today, we covered a relatively simple root method for the Oppo N1. Unfortunately, however, that root method wasn’t exactly ideal, as it used the kingoroot root method to do the heavy lifting. And in addition to the potential hazards of that approach, it offered no real advantages over installing TWRP by Senior Recognized Developer Dees_Troy and then flashing Senior Recognized Developer Chainfire‘s SuperSU.
Now, however, XDA Senior Recognized Developer jcase presents a simple exploit-based root method based on research conducted by Saurik and Giantpune. The tool lets you achieve root on your N1 by simply installing and executing the provided APK. Once that is done, you wait one minute, install SuperSU from Google Play, and uninstall the APK using ADB (or a terminal emulator).
If simple root access is what you’re after and you don’t need to have the power and versatility of a custom recovery, jcase’s root exploit is your best bet for achieving root on the Oppo N1 simply and easily. Make your way over to the original thread to get started.
You really need to hold the Oppo N1 in your hands to fully understand the detail and design that Oppo crafted into this 5.9″ device. Aside from the sheer size, the device features a unique camera system, as well as a very healthy corporate policy on aftermarket development. While obtaining the device in many countries is still somewhat of a challenge, XDA Senior Member Harfainx shared simple and easy tool capable of rooting the N1. The process so simple that all you need to do is connect your device to your computer with USB Debugging enabled, and it’ll pretty much take care of the rest. The process is for Windows computers only, and requires ADB drivers to be installed, but other than that, there’s not much to it. Head over to the original thread, located within our newly created Oppo N1 Forum, to learn more. And while you’re at it, don’t forget to check out TWRP for the N1 courtesy of Senior Recognized Developer Dees_Troy!
November 23, 2013 By: Will Verduzco
After a fortuitous change of heart no doubt due to the influence of its new parent company, Motorola is now becoming one of the good guys. Along with their newly found acceptance of third-party developers, the company has also been pumping out KitKat updates for its flagship Moto X at an impressive pace. We were first shocked to see the Verizon model receive the first non-Nexus KitKat OTA update. Not too long after, we saw the T-Mobile and AT&T variants follow suit.
One thing is always a bit troublesome when upgrading Android firmwares, though, and that’s reacquiring root access. Thankfully, this has proven no major challenge for XDA Senior Recognized Developer jcase, who has managed to root the Android 4.4 update on the Moto X using what he is calling SlapMyMoto. SlapMyMoto is essentially a modified version of the previously covered RockMyMoto, an exploit package that was originally created to root the Moto X after it had received the 4.2.2 camera update.
It is important to note that SlapMyMoto is currently in a BETA release. What this means to end users is that while the root method works, it involves a rather convoluted procedure. In other words, non-techy users would be best served by holding off for now, while jcase readies a more permanent solution. But if you try this and you run into problems, jcase recommends flashing back to the 4.2.2 camera update. That said, this process is more risky than previous versions. And of course, don’t accept any OTAs after using this root method.
If you’ve been eagerly awaiting root access on your newly KitKat-laden Moto X, head over to the development thread to get started! Again, please keep in mind that this root method isn’t for the faint of heart. But if you follow the steps properly, you’ll be rewarded with a freshly rooted piece of that KitKat bar.
[Many thanks to jcase for the heads up!]
October 14, 2013 By: Jimmy McGee
At this years Big Android BBQ, a new player in the custom ROM world comes to life with the announcement of OmniROM. That and much more news is covered by Jordan, as he reviews all the important stories from this week. Included in this week’s news is an article reporting online flashing with Universal Kernel Flash Tool and the announcement that you can now root your Samsung Galaxy Note 3 in a KNOX-friendly way.
In other important news, Jordan talks about a multi-device image flasher based on CASUAL. Finally, Jordan talks about decompiling, deodexing, and more that you can accomplish with the Android Everything tool. Be sure to check out other videos on on XDA Developer TV. Pull up a chair and check out this video.
October 10, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer TK shows you how to root your Samsung Galaxy Note 3 with Odin and a PC. TK just recently reviewed the Samsung Galaxy Note 3, and it is the latest in Samsung’s phablet line. Many people say it’s a great device that is the current device to beat and is wonderful out of the box. But at XDA, we must root all the things.
TK presents step-by-step instructions on how to gain root access on your Samsung Galaxy Note 3 using tools from the XDA Developers Forums. The process is works for a majority of the variants. You will just need to follow the below links to XDA Elite Recognized Developer Chainfire’s thread and find the specific files for your variant. So take a moment and check this video out.
September 30, 2013 By: Jimmy McGee
The Sony Add-on SDK 2.0 has been released, and it brings new APIs for the Sony SmartWatch 2 and Xperia Z1. That and much more news is covered by Jordan, as he reviews all the important stories from this week. Included in this week’s news is an article about an easy rooting Toolkit makes rooting simple on Sony devices. In more Sony news, he talks about the guide on how to port the Sony small apps and task switcher to CM10.1.
Jordan talks about the other videos released this weekend on XDA Developer TV. XDA Developer TV Producer Jayce released a video answering his frequency asked questions, and later he released a video talking about how to combat procrastination. Pull up a chair and check out this video.
September 24, 2013 By: Jimmy McGee
We have talked about app development, Ubuntu Touch development, NFC and Firefox OS presentations from XDA:DevCon 2013. All of these presentations are of great value for developers and enthusiasts. However, there is a dark secret in your pocket: exploits. These exploits can be used for good, gaining root or unlocking. However, they can also be used for bad, such as stealing your chickens or texting curse words to your mother, or worse.
This presentation has a simple title, but the content is not simple. “Android Security Vulnerabilities and Exploits” presented by XDA Elite Recognized Developer jcase. Jcase is a mobile security researcher and the developer of many Android exploits. There is great reason he is an XDA Elite Recognized Developer. Members of the forum sing his praises and OEMs curse his names.
In his presentation, Jcase talks about how the very exploits we often use to root our phones expose us and others to malicious software such as spyware, bots, keyloggers and other forms of malware. He shows past vulnerabilities in applications and firmware and how they are mitigated today. He shows off some of the tools and methods he uses in identifying vulnerabilities. Finally, he walks the audience through finding a security vulnerability and exploiting it.
If you want to see more or get a copy of the presentations slides, visit the XDA:DevCon Presentations page.
September 21, 2013 By: Jimmy McGee
We’ve already talked about four great app development presentations, including Ubuntu Touch development from XDA:DevCon 2013. However, the presentations from Mark Murphy, Daniel Nazer, Ariel Shimoni and Michael Hall were not the only app development presentation at XDA:DevCon 2013, and this one is especially close to XDA’s heart.
The presentation was given by XDA Elite Recognized Developer Stericson. Being involved in the Android community since the pre-release of the T-Mobile G1, He started out learning how to create themes for Android. Stericson developed Android applications and the RootTools library to assist others with creating applications for root users. These were discussed in his presentation “Root Application Development with the RootTools Library.” As a developer, creating root applications for rooted users becomes extremely trivial with the RootTools open source library. Stericson focused on how to use the RootTools Library in order to create root applications that your users will love and appreciate.
If you want to see more or get a copy of the presentations slides, visit the XDA:DevCon Presentations page.
September 4, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Jordan shows you how to root your Nvidia Shield. The Nvidia Shield is a device that is in a class all of it’s own. There is really nothing else like it, and that is a good thing. But as usual, here at XDA we must root all the things and the Shield is no exception to that!
Jordan presents step-by-step instructions on how to gain root access and unlock the bootloader on your Nvidia Shield using tools from the XDA Forums. First, Jordan shows you how to unlock the device. Then he shows you how to gain root access. If you are having trouble installing the proper drivers on Windows 8, Jordan recommends checking out wwJoshdew’s video. So take a moment and check this video out.
July 30, 2013 By: Jimmy McGee
In this episode, XDA Developer TV Producer Kevin shows you how to root your New Nexus 7 (2013). To go along with Android 4.3, Google announced that they had refreshed the Nexus 7. Ever since, the Internet has wet its pants in excitement. Everyone is excited about the new device. As usual at XDA, we must root all the things.
Kevin presents step-by-step instructions on how to gain root access on your New Nexus 7 (2013) using tools from the XDA Forums. First, Kevin shows you how to unlock the device. Then, he shows you how to install TWRP custom recovery, and finally gain root access. So take a moment and check this video out.
The recently released Google Edition Galaxy S4 has been generating a lot of excitement since being announced. What a lot of people did not see coming was Jelly Bean 4.3 leak. Despite containing only a few minor changes likely that would affect the average end user, there may well still be a few differences under the hood that we are yet to discover.
A recently leaked Samsung firmware based on Android 4.3 (JWR66N for those keeping track) has been found to work pretty darn well on the original TouchWiz-laden Snapdragon-powered Galaxy S4. However it was not rootable until today, and therefore somewhat less viable of an option for those who can’t live without their root applications. Cue XDA Elite Recognized Developer Chainfire and his modified version of SuperSU, which is specially adapted for use with 4.3.
The exploit was made public in a Google+ post by Chainfire, and it explains precisely why a modified SuperSU is required. The main difference between this and a regular version of SuperSU, in Chainfires own words, is that:
For this root, SuperSU is running in daemon mode (new feature), and launched during boot.
The daemon handles all su requests, and while this should mostly work just fine, some apps may expect their su session to be running on the same branch on the process tree as the app that launched the session.
Whether these changes are due to Samsung or just Android 4.3 in general remains to be seen. But needless to say, once we see a few more 4.3-based firmwares, we will have an answer. There are also some other differences that will you will want to be aware of, especially those of you using a CWM-based recovery, so I highly recommend checking out that post in full.
If you’re currently running the 4.3 leak on your S4, this is probably something you’ve been looking forward to for a few days now. The flashable zip file itself can be downloaded from the Google+ post, and the current SuperSU thread should be used for any related issues.
June 23, 2013 By: Jimmy McGee
The main benefit to rooting one’s Android device is the ability to run applications that are developed for root users. These applications allow you to take control of your device and do a wide variety of actions not normally permitted or possible without root access. Some of these applications allow you to take entire system-wide backups, change your devices screen density, or even alter the look and feel of your device. There is no doubt that rooting a device has many advantages.
At XDA:DevCon 2013, we are talking all about app development. Scheduled to present is XDA Elite Recognized Developer Stericson. Also known as Stephen Erickson, Stericson has been involved in the Android community since the prerelease of the T-Mobile G1, or since rc19 if we want to go in terms of Android releases. He started out learning how to create themes for Android and then he moved on to hex edits that enabled one device’s apps to work on another device. He finally moved on to developing Android applications and the RootTools library to assist others with creating applications for root users.
As a developer, creating root-enabled applications becomes trivial with the RootTools open source library. Sterison’s presentation will focus on how to use the RootTools library in order to create root applications that your users will love and appreciate.
June 21, 2013 By: Samantha
Ever since moving to a phone with virtual navigation buttons, I’ve been bugged by the screen space they use—a gripe held by many out there as well. However you minimize this issue, be it a mod that reduces the height of the navigation bar, using Pie control on Paranoid Android or CM10, or a third-party app such as Button Savior, there’s now an alternative called the Ultimate Dynamic Navbar, developed by XDA Forum Member MrBIMC.
Ultimate Dynamic Navbar is possibly the one solution that many have been waiting for. Instead of drastically changing the way we navigate our devices with a different UI and position, it retains the navigation bar in its form and shape, with one subtle twist: It can hide itself. What’s even better is the extensive customization that MrBIMC has allowed for, packing in four different themes, the option to adjust transparency, and a choice of three activation methods, among plenty of other settings. Additional buttons can be set, and different actions can be triggered on long-press. The app also includes the option to hide the real navigation bar, thus a rooted device is required.
Ultimate Dynamic Navbar is actively supported by MrBIMC, with an agenda of ridding bugs and including even more customization options such as theming support. This support can already be seen with the seven versions already under his belt. The app is ad-free and is free exclusively on the XDA Forums. So if you would like to check it out, visit the original thread for more information and download.