August 13, 2014 By: egzthunder1
Security is a rather paramount issue in this day and age where sensitive technology is handed to people who probably should not have it until they are old enough to drive. People are as widely, overtly inappropriate on the Internet as they humanly can be, yet they have the audacity to reach out for web outlets whenever their “stuff” leaks out into the Internet. Then, these same people are the ones who complain that hackers and the government are after them because of all the important (eye of the beholder) text messages that are stored in their devices are gone. After all, nothing screams “national security threat” like a message from your mom asking if you want meatloaf for dinner. That is one side of the coin, while the other side involves people who truly need to have some sanctuary from the horrors of the likes of hackers, root, or even the government. They can, and probably are, holding onto important information on their e-mail accounts and whatnot that could jeopardize something worth going after. So, how do the latter deal with such a sword of Damocles dangling on top of their heads? The answer is to get a phone that is secure enough to hold all their stuff. Enter the Blackphone.
The Blackphone is a device made by a joint venture between Silent Circle and Geeksphone, which is now known as SGP Technologies. The device is an Android phone unlike many others out there. The main difference between this and your [enter your device name here] lies mainly in the software make up of the phone. Yes, it still runs on Android, but with a modified version of the OS (read: custom ROM) known as PrivatOS. This ROM has been loaded with several “secure” applications that should make you feel more secure while going about your daily routine. Also, the phone’s security has been boasted by the company to be parallel to none as the PrivatOS is more mature than most OEM options currently out there and therefore, most (if not all) vulnerabilities are nothing but a thing of the past. So much was their confidence that the company decided to take their product into one of the largest hacker expos, Def Con. Now, as you are aware, there are various types of hackers, all with very different motivations to do what they do, but one thing that they do have in common: They sure do love a challenge when presented with one, and XDA Senior Recognized Developer and Forum Moderator jcase is no exception.
According to jcase, the device was rooted but it was not an easy task as reported by many, many, many other blogs (several of these pro Blackberry blogs taking this opportunity to take a few stabs at their new competitor, which is a fight that equates Android users and iOS users to a certain extent). Most of them reported that the entire ordeal lasted a whopping 5 minutes, which is factually incorrect (and in fact, many have either withdrawn the articles or amended them with the proper information). Jcase goes on to state that there were 3 different vulnerabilities found in the device at the time, and that root was achieved without the need to unlock the device’s bootloader.
The first vulnerability found was a way to re-enable ADB on the device, which is disabled by default. The company went a few steps further than simply disabling ADB and decided to do away with Developer Menu altogether. The company came back stating that this was not done as a security measure but rather as a temporary fix due to USB ADB connectivity creating stability and performance issues on the device (when ADB was on and encryption was turned on, the device was said to go into a bootloop). Due to a pressing and rather tight schedule, instead of trying to quickly work out a patch to see where the issue was, they simply swept it under the rug until they could find what was causing the problem with hopes to push an OTA update to re-enable the missing dev options and ADB with it. In any case, this vulnerability (regardless of whether the company admits it or not) was required to get the root method to work.
The second part of the root process involved a lot of tinkering with the actual device. First and foremost, you needed to get USB ADB going on it (hence, the previously mentioned vulnerability). Next, you pretty much need to flat out ignore any and all recommendations by the manufacturer during set up. Next up, device encryption needed to remain off and you needed to grant permission to “unknown sources” for installing apks. And last but not least, you needed to either disable or at the very least know the PIN to the device in question. There was a third part in the whole exploit process but jcase has decided not to disclose this part to the general public and instead reported it to the company.
The entire affair was not exactly short lived, despite what other blogs may state and jcase walked out of this one with nothing but bragging rights and a custom made t-shirt, effectively letting the company know what he thought about the “reward” for his efforts. This, however, was really nothing but a joke as jcase holds no ill will against the company and in fact, has gone on to say that he appreciates the professionalism displayed by their CSO and CEO regarding the entire ordeal. Yes, the device was rooted but it is far from being the insecure junk that Blackberry users make it seem. This device is an alternative to those who own BB devices and cannot justify giving up the security perks of the device for a brand new and shinny Android phone. Yes, the device may have obtained root access but that does not make it any less secure. So, to all the people out there who brag about BB’s security, lets just say that you may be picking attention from the very people your “security” is meant to drive away. Just remember, in the words of JFK
We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too. – John F. Kennedy
Just replace “go to the moon” with “hacking BB10″. You can find more information in the original (and actually accurate) article from Ars Technica.
XDA Recognized Developer Chainfire presents his latest app TriangleAway. The tool will give you the option to reset your flash counter and remove the yellow triangle by coding the bootloader. Use it only on rooted devices with Android Ice Cream Sandwich as it´s operating system.
The flash counter and triangle state had to be stored somewhere. Everybody knew that. Guesses have been made in the past where it could be, and I have personally compared the raw flash disk contents between different amount of custom flashes in the past, unable to find any differences. You can dump and compare the entire /dev/block/mmcblk0 and you won’t find a difference (you’ll find a few unallocated and unused gaps, though).
The solution comes with the new kernel uses by ICS builds. The flash disk actually has two hidden boot partitions, /dev/block/mmcblk0boot0 and /dev/block/mmcblk0boot1 . The MMC driver in the kernels used for Gingerbread did not present these partitions in the past, the MMC driver in the ICS kernel does.
Soon as more official ICS firmwares become available, much more devices will be able to use this interesting tool which should be used for experts only, as it can potentially brick your expensive toy.
Please leave your feed back to developer and thanks for reading.
Original XDA thread
If you’ve ever attempted to root a device prone to difficulties or requiring a trial-and-error type exploit (the Motorola Droid X or T-Mobile MyTouch 3G Slide, for example) then you know how easily it can go wrong. Sometimes the operation fails and you end up with the superuser app installed but without actual root file system access. A quick search for “lost root” on our forums yields an astonishing 274,000 results. Almost all the visible results link to posts where forum members believe they have lost root access, usually due to updating a ROM or accepting an over-the-air update.
XDA Member android_owl has created an app to help out in these all-too-common situations. SU Checker searches for and identifies Superuser binaries on your device in a flash. It can help check for root if you suspect you may have lost permissions. This great little diagnostic tool and time saver can be found in the release thread or on the Android Market here. Give it a try the next time and let the developer know what you think!
Not many people know about the LY-F1 tablet. It’s an off brand tablet available for just over $100 available at PandaWill.
The spunky 1.2GHz tablet isn’t just cheap, but it seems as though there’s actually a small push in the direction of development. XDA Senior Member web_ninja has found a root method, utilizing the legendary SuperOneClick Root method and says that the method is working on a permanent basis. web_ninja has reported this in hopes that it’ll get a few developers interested in porting ClockworkMod Recovery and possibly releasing some ROMs to help the tablet perform up to par with today’s newer and more expensive models.
Additionally, web_ninja has been kind enough to upload the recovery files. They are in Chinese, so they are unreadable unless you happen to know the language, but web_ninja has personally tested them and confirmed them working. As per the norm, make sure you exercise extreme caution if toying around with your device as rooting always carries the inherent risk of bricking.
For more information, the download links, discussion, or if you’re a developer and what to help out on developing on the affordable tablet, check out the original thread.
Some people just need their web to themselves (for whatever reason). For those on Android who crave VPN, a good client can be hard to find.
The app provides users with a few features (with more promised from the developer), including:
DroidVPN can unblock ISP restrictions, unblock voip, bypass firewalls, and lets you browse the web anonymously.
DroidVPN is using its own simple and efficient protocol so its not using PPTP or L2TP which is sometimes blocked by your ISP.
The proprietary protocol is pretty cool, especially with the aforementioned problems with PPTP and L2TP which is one of the things that makes this app unique. Just be sure you’re phone is running Android 2.1 or higher and you’re rooted.
The only downside, for the time being, is the app is in a closed beta. However, if you want to try it out and help with the testing, you can head over to the original thread where you can find additional information on the app and instructions on how to sign up for the beta.
All hail root!
It was only a matter of time before someone got Superuser on the latest and greatest of the Asus Transformer series and that time is right now.
XDA Recognized Developer jcase has successfully found an exploit that will get your Asus Transformer Prime rooted with Superuser so those lucky enough to be toting one can experience all the greatness of Superuser access.
It’s a pretty standard root process for those who are familiar with non-one click solutions. You download the exploit, push it via ADB, install the Superuser app from the market and, as always, the final step is profit.
You can find the downloads, the full instructions, a nifty how-to video, shout outs and all the other goodies in the original thread.
The thread itself is also being used a support thread, as jcase says:
This is the support thread, feel free to ask questions here. Please do not redistribute my exploit.
So any issues, questions or anything else that needs discussed will be in the thread too and it’s always a good idea to read through the whole thread to see what others are having problems with (and the fixes for them) just in case you run into some problems. As always, especially with root, there’s a chance that things can go horribly wrong so make sure you exercise caution as well!
As they say, the real fun doesn’t start until your device gets root and s-off and that’s certainly the case with the HTC Jetstream. The device got root just a couple days ago and the modders and developers have gone to work making the already great device even greater.
XDA Senior Member Giblet-dono has drawn up a quick tutorial that will give your HTC Jetstream the ability to make and receive phone calls over a 3g GSM network. According to Giblet-dono, all you need to get started is:
S-Off (get yours from HTCDev soon!)
Root (get yours from DoomLord)
That seems like a very short and easy list of pre-requisites. Based on the instructions, it seems just as easy as editing your build.prop file which doesn’t carry a whole lot of risk, so if this sounds like you’d like to try out then head on over to the original thread for the full instructions.
Additionally, Giblet-dono is also working on making messaging work and the up-to-date troubleshooting for it is going on right now in the same thread. It won’t be long until you can use your Jetstream as a fully functional phone. A very large, very awesome phone.
The incredibly well known and super successful (and possibly super handsome…we don’t know for sure) XDA Recognized Developer DoomLoRD has finally brought that sweet, sweet root goodness to those who have long awaited it on the HTC Jetstream.
The root process is simple enough. Simply download DooMLoRD’s Easy Rooting Toolkit, place it in the root directory of your computer and press play. Here’s the basic instructions as he puts them:
then download the v02 toolkit for JetStream files and extract contents in root directory of ur pc (e.g: c:\ OR d:\)
then just connect device (with my insecure kernel on it) and activate USB debugging…
then execute RUNME.bat
ur device should now be permanently rooted after reboot…
So there you have it. It’s easier than most one-click root methods out there, but as with any root method it could cause serious damage so make sure you proceed with caution. As DooMLoRD mentiones, it’s still in the testing phase and once he gets a few more people to successfull root their device with it, he’ll be posting it in the HTC Jetstream Development Section.
So if you have your HTC Jetstream handy and want to take a swing at rooting it, follow this link for additional information, instructions and download links or this link if you want to read the whole thread leading up to it.
December 27, 2011 By: Former Writer
Livven has already talked about the Honeycomb update and you can find the article right here .
If you take a stroll down XDA way and take a gander at this thread you can check out this early release of s-off instructions.
As globatron states in the thread,
This is an early version of the S-OFF procedure intended for experienced modders / developers not for general users, if you are neither of these, then it is not intended for you at this time.
So, as the warning states, unless you’re an experienced developer then you should probably stay away from this for the time being. However, this is the official “first step” in getting s-off, root and recovery to all Honeycomb-toting HTC Evo View users.
Despite not being a public release, it is encouraging to see that people are on the job and finding ways around the new framework and we’re sure there will be a public release very soon. Until then, though, you’ll have to keep tabs on the thread from the link above to keep up to date with the HTC View’s Honeycomb rooted goodness!
June 30, 2010 By: admin
Many Android handsets are rooted even before their official release, but the Xperia X10, being Sony Ericsson’s entry into the Android world, apparently has some pretty tough security protection to prevent people from rooting and flashing custom ROMs onto it. Back in May, someone even claimed to have rooted the X10 using a special flashing system which needs dedicated hardware, so not many were able to try it and for those who did, it simply didn’t work as it was a fake.
But now, some clever developers from our forums, including Jerpelea, biktor_gj and Bin4ry, have finally managed to successfully root the X10 and posted some easy-to-follow instructions in the forum thread. If they’re still too complicated for you, jump to the second post which contains links to other tutorials, some even with video.
Ever since the release of the 2.1 update for the device, owners of the CDMA (Sprint) variant of the popular HTC Hero have been begging for someone with the know-how to finally root the new firmware successfully, thereby opening the door once again to custom ROMs for people who have updated their phone.
Taking inspiration from the EVO rooting method, XDA member regaw_leinad has finally got root access on his Eclair-running Sprint Hero (with credits going to many other hard-working members as well) and he has been kind enough to show everyone else how to do it.
A clear guide to rooting the device has been written in this thread, featuring helpful screenshots that should make the process even easier to complete.
Thats Right, Xda-dev members have done it again!
Fresh out of the Drois Eris Development page comes XDA Member jcase with details on how to root your Droid Eris. With the help from the XDA Devs, jcase and Caboose, have opened a new world of ‘Droid rooting. Well Done Guys!
Originally posted by jcase
No other person but yourself, and only you are responsible if it breaks your phone, or anything else. Don’t blame me if it doesn’t work, or if something happens down the line. If your phone turns into skynet, your fault not mine. Same if it stops working, your fault not mine.
Hats off to all the devs, esp to Caboose.
Do not update to the leaked 2.1.
We can go from 1.5, to rooted 2.1.
Not from leaked 2.1 to rooted 2.1