Nook Tablet Exploit Allows Modification of System Files and Copy/Paste
Sometimes it only takes one exploit or one little piece of development to blow the lid off of a device’s development. For most devices, that exploit is root access. However, even after achieving root, things can go wrong. Take the Barnes & Noble Nook Tablet for instance. Even when rooted, many difficulties were faced when modifying system files. Until now, that is.
XDA Forum Member jichuan89 has published a method that allows Nook Tablet owners to modify their system files. As for icing on the cake, the developer used the exploit to give copy/paste functionality on stock, rooted Nook Tablets—an exploit and a feature add-on in the same day! Essentially, /system/bin/uim-sysfs can modify the /system partition, as long as it changes everything back before the reboot. In the words of the developer:
and discovered that /init.omap4430.rc starts /system/bin/uim-sysfs with root permissions at boot, but /system/bin/uim-sysfs does not actually exist. In addition, /system/bin/uim-sysfs is not in /manifest00 or /manifest01, and is thus not verified by /init.
For those who aren’t so technically inclined, it basically means that uim-sysfs can do whatever it wants to the Nook Tablet, as long as all stock settings are restored before rebooting so that it doesn’t get caught by the built-in security of the device.
The method for the Copy/Paste functionality uses this fun little exploit, and is quite simple. Simply drag and drop files into the folders specified. However, it’s best to make a backup before attempting the Copy/Paste mod, as it can throw the Nook Tablet into boot loops.
Head on over to the exploit thread for all the nitty-gritty on uim-sysfs. Those looking to incorporate copy/paste functionality should head over to the copy/paste thread for download links, a video tutorial, and additional information.