A root method has finally been released for Motorola’s Droid Turbo, with a small catch. The program costs $20 per phone you plan on rooting, which is pretty rare to see with root methods on Android devices.
The root tool was developed by maiko1 on XDA and allows you to flash any system image to your Droid Turbo, included pre-rooted system images. It won’t disable write protection, but if all you’re looking for is a simple root method to use some of your favorite root apps, this should do the trick.
It’s pretty rare to see an Android device that doesn’t get rooted at some point in it’s life cycle, and it looks like Samsung’s Galaxy S6 isn’t going to escape that fate. Chainfire’s famous root method has already been confirmed to work on T-Mobile Galaxy S6 and its Edge variant, and those devices aren’t publicly available yet.
So you’ve got yourself a Nexus 6 and want to play around with custom ROMs a little bit. Although we don’t see why you’d want to give up on the seamlessly smooth Android 5.0 experience, it’s never a bad idea to tweak around your smartphone in order to flash custom ROMs or gain access to some root only applications. Today we’ll show you how to unlock the bootloader and root your Nexus 6 without all the hassle of sideloading files or apks.
Root access was achieved on Lollipop not long after its official release, but there have been many issues with root apps on Lollipop not working like they did on KitKat and below. Much of this has to do with Android 5.0’s implementation of SELinux for additional security.
Fortunately, Chainfire has been working on potentially fixing many of those broken root apps, and his latest SuperSU beta claims to resolve many of the issues. This SuperSU beta version 2.23 is freely available for download on Chainfire’s website in the form of a flashable zip, and he’s opened a thread on XDA to track which apps are now working correctly and what still needs to be addressed.
Want a quick way to root your Nexus device?
In the past, one such option has been CF-Auto Root — until now, that option hasn’t been available for Lollipop users.
But with a recent update by XDA Senior Recognized Developer Chainfire, Nexus devices running Android 5.0 can join in on the fun. Hit the break for details:
It was only a matter of time before the Nexus 9 was rooted, and thanks to veteran developer Chainfire, that time is now. Less than a few hours after the source code for the HTC-designed tablet was released, Chainfire has come up with a root method that will be familiar to anyone who has used ADB and FastBoot in the past. If you’re looking to get down and dirty with your new tablet, hit the source for instructions on how to get started.
Google had all but locked down its media-streaming device, the Google Chromecast, soon after its release, but if you’ve been waiting for root access to your device since then, your time has officially come. According to the XDA developers forum, developers GTVHacker, Team-Eureka, and fail0verflow have exploited a new vulnerability which allows root access to the current software build and new models.
Verizon’s Samsung Galaxy S5 is receiving an update (software version KOT49H.G900VVRU1ANE9) which is bringing a bunch of bug fixes to the device, but also seems to be breaking root access to the device, according to a number of users around the web.
The update keeps the phone at Android 4.4.2, and update’s Verizon’s Caller Name ID, Message+ and Cloud apps.
The Nexus Root Toolkit from Wugfresh has become insanely popular since the interest in unlocking bootloaders and rooting devices has expanded to “normal” consumers.
Now, those with an LG G Watch will be able to root and unlock the device just as easily as Wugfresh’s Nexus solution provides.
Chainfire’s SuperSU app has been updated today to build in support for the Android L developer preview. Before now, rooting the developer preview involved a few workarounds with custom boot images so root permissions should work properly, but that should all be fixed up now.
If you’ve been using the L developer preview, have you tried rooting it yet, or are you fine with using a non-rooted device?
source: XDA Developers