The international version of the Samsung Galaxy S5 has already been rooted by Chainfire, and that was before the device was even launched. Well now it looks like seven more versions of the device have been added to that list, as announced by the developer today.
The versions included are as follows: SM-900H (International Exynos), SM-G900M (Middle and South America), SM-G900R4 (US Cellular), SM-G900T (T-Mobile US), SM-G900T1 (Metro PCS), SM-G900W8 (Canada) and SM-G900P (Sprint). To root the devices you’ll need to use the CF-Auto-Root tool, and as Chainfire noted on his Google+ post, rooting the device will break Knox warranty and increase the flash counter. Users may also have issues with Private mode.
New HTC One (M8) owners who had to go the subsidized or payment plan route with their carrier instead of plunking down $700 for a Google Play Edition(GPE) version now have an option to get the GPE experience on their new device. XDA Forum moderator graffixnyc has posted up instructions, with links to the necessary files, to replace the HTC Sense version of the software that comes on non-GPE devices with rooted GPE software.
Just a few days ago, Samsung’s Galaxy S 5 was rooted and the method was made available to the public, thanks to XDA developer, Chainfire. Now, the HTC One M8 is next in line as developers at Team Win Recovery Project have already created the TWRP for the Sprint, AT&T and International variant of the HTC One M8.
The custom recovery for the Sprint variant is already available on Team Win’s webpage, however the International version hasn’t been posted over there. So to get it, you’ll have to head to the XDA developer page linked at the end of this article. If you’ve rooted before, the method is pretty similar.
Thanks to a system dump leak, the new Samsung Galaxy S5 (international version) has been rooted well before its official release. Thanks to a well known developer on XDA by the name of Chainfire, you can use his CF-Auto-Root tool to root your S5 once you have it. Will you root your S5 once you get your hands on it? Hit up the source link for more information!
A diamond in the rough tends to pop up on XDA-Developers every week weeks, and this time it’s ddggttff3‘s PwnedCast ROM for the Google Chromecast. The ROM is based on the 13300 stock image, is rooted, and features its own OTA system. It also has a dedicated recovery and a custom kernel. If you have a rooted Chromecast, hit the break to link over to the XDA-Developers post with instructions and more details.
If the price of $180 wasn’t enough of an enticement to make you grab a Moto G, maybe its ease of being rooted might. Thanks to the famed Android developer Modaco, you can now root the popular budget device using any computer, whether it be a Windows, Mac or Linux.
To carry out this process, your bootloader does need to be unlocked. Also, doing any of this may invalidate your warranty so do this under your own precaution. Otherwise, hit up the source link for download links and instructions on how to achieve this process!
Verizon sent out soak test invites about a week ago, and the first users are reporting that they’re finally receiving that elusive camera update for their Moto X phones. Verizon didn’t manage to get this one out in a timely manner, but hey, better late than never, right? The update adds in camera improvements as well as touchless control improvements and a fix for choppy audio on calls that some users were experiencing.
A pretty major part of this update is the fact that it’s not breaking root for all users. When signing up for the soak test, Motorola and Verizon stated the users would have to be okay with losing root access, but for users that rooted their X with MotoRoot, it looks like you’ll be able to keep. Other root methods are seeing mixed success, so your mileage may vary.
Update: We have no idea how, but the soak test is already over and everyone will be getting the update soon. Full changelog after the break.
Root access on the Sprint, U.S. Cellular, and T-Mobile variants of the Moto X has been relatively simple and straightforward, as Motorola hasn’t put too many safeguards in the way of consumers messing with their devices for these carriers. However, Verizon and AT&T customers haven’t been so lucky. However, that might change very soon for Verizon customers, as developer Justin Case of TeamAndIRC has achieved root on their Moto X, and the procedure also applies to the new DROID phones. The root isn’t permanent at this time and you might want to hold off on any OTA updates if you’re planning on going through with the root.
It’s great news nonetheless and hopefully Justin Case comes out with a more stable method sooner than later.
In unexpected news, Verizon’s brand new HTC One actually has an unlockable bootloader. No, we aren’t joking. the HTC Dev bootloader unlock process works on Big Red’s version of the phone, and even though that means it isn’t a full S-Off unlock, it’s still going to give you enough room to flash custom ROMs and the like. As a cherry on top, there are already easy root files available and a version of CWM recovery has already been ported.
Knowing Verizon, this was probably not intentional and it could very easily be patched up relatively quickly. If you have a new HTC One, you may want to consider following the links below to go ahead and get your device unlocked before Verizon patches anything up.
via: Droid Life
You’ve read that title right folks. Only a few days after the device went on sale do we have an exploit that gives root access to the little HDMI dongle. The folks over at GTVHacker found this exploit. As you know the Chromecast is supposed to be running a simplified version of the ChromeOS however the folks at GTVHacker believe it to be more of a modified Google TV Release. It appears that the bootloader, binaries, init scripts and kernel are from Google TV. This allowed GTVHackers their access.
They’ve been able to build an exploit that allows people to gain a root shell through port 23 via telnet of the device. While this is interesting in itself, Google could send out an update to the dongle and close this loop hole. The team explains the loop hole:
“By holding down the single button, while powering the device, the Chromecast boots into USB boot mode. USB boot mode looks for a signed image at 0×1000 on the USB drive. When found, the image is passed to the internal crypto hardware to be verified, but after this process the return code is never checked! Therefore, we can execute any code at will.”
The GTVHacker’s Wiki page hosts the file and if you feel like tinkering with it you can download it from there. While this news doesn’t mean much for the average person, it was only a matter of time before someone would attempt to exploit the Chromecast. Hit the source link below for a full detailed explanation of how the exploit works. If you’re interested in seeing it in action you can check out the YouTube video after the break. Enjoy!