A diamond in the rough tends to pop up on XDA-Developers every week weeks, and this time it’s ddggttff3‘s PwnedCast ROM for the Google Chromecast. The ROM is based on the 13300 stock image, is rooted, and features its own OTA system. It also has a dedicated recovery and a custom kernel. If you have a rooted Chromecast, hit the break to link over to the XDA-Developers post with instructions and more details.
If the price of $180 wasn’t enough of an enticement to make you grab a Moto G, maybe its ease of being rooted might. Thanks to the famed Android developer Modaco, you can now root the popular budget device using any computer, whether it be a Windows, Mac or Linux.
To carry out this process, your bootloader does need to be unlocked. Also, doing any of this may invalidate your warranty so do this under your own precaution. Otherwise, hit up the source link for download links and instructions on how to achieve this process!
Verizon sent out soak test invites about a week ago, and the first users are reporting that they’re finally receiving that elusive camera update for their Moto X phones. Verizon didn’t manage to get this one out in a timely manner, but hey, better late than never, right? The update adds in camera improvements as well as touchless control improvements and a fix for choppy audio on calls that some users were experiencing.
A pretty major part of this update is the fact that it’s not breaking root for all users. When signing up for the soak test, Motorola and Verizon stated the users would have to be okay with losing root access, but for users that rooted their X with MotoRoot, it looks like you’ll be able to keep. Other root methods are seeing mixed success, so your mileage may vary.
Update: We have no idea how, but the soak test is already over and everyone will be getting the update soon. Full changelog after the break.
Root access on the Sprint, U.S. Cellular, and T-Mobile variants of the Moto X has been relatively simple and straightforward, as Motorola hasn’t put too many safeguards in the way of consumers messing with their devices for these carriers. However, Verizon and AT&T customers haven’t been so lucky. However, that might change very soon for Verizon customers, as developer Justin Case of TeamAndIRC has achieved root on their Moto X, and the procedure also applies to the new DROID phones. The root isn’t permanent at this time and you might want to hold off on any OTA updates if you’re planning on going through with the root.
It’s great news nonetheless and hopefully Justin Case comes out with a more stable method sooner than later.
In unexpected news, Verizon’s brand new HTC One actually has an unlockable bootloader. No, we aren’t joking. the HTC Dev bootloader unlock process works on Big Red’s version of the phone, and even though that means it isn’t a full S-Off unlock, it’s still going to give you enough room to flash custom ROMs and the like. As a cherry on top, there are already easy root files available and a version of CWM recovery has already been ported.
Knowing Verizon, this was probably not intentional and it could very easily be patched up relatively quickly. If you have a new HTC One, you may want to consider following the links below to go ahead and get your device unlocked before Verizon patches anything up.
via: Droid Life
You’ve read that title right folks. Only a few days after the device went on sale do we have an exploit that gives root access to the little HDMI dongle. The folks over at GTVHacker found this exploit. As you know the Chromecast is supposed to be running a simplified version of the ChromeOS however the folks at GTVHacker believe it to be more of a modified Google TV Release. It appears that the bootloader, binaries, init scripts and kernel are from Google TV. This allowed GTVHackers their access.
They’ve been able to build an exploit that allows people to gain a root shell through port 23 via telnet of the device. While this is interesting in itself, Google could send out an update to the dongle and close this loop hole. The team explains the loop hole:
“By holding down the single button, while powering the device, the Chromecast boots into USB boot mode. USB boot mode looks for a signed image at 0×1000 on the USB drive. When found, the image is passed to the internal crypto hardware to be verified, but after this process the return code is never checked! Therefore, we can execute any code at will.”
The GTVHacker’s Wiki page hosts the file and if you feel like tinkering with it you can download it from there. While this news doesn’t mean much for the average person, it was only a matter of time before someone would attempt to exploit the Chromecast. Hit the source link below for a full detailed explanation of how the exploit works. If you’re interested in seeing it in action you can check out the YouTube video after the break. Enjoy!
XDA Senior Member frapeti has developed an application called ‘Android Bot Maker’ which is an automation tool for your Android device which essentially turns it into a bot, making repetitive tasks easy. The program features a numerically ordered “Actions” list of all the automated actions that the user has programmed the device to carry out. Sequences can be rearranged, saved, imported, cleared, and shared onto various cloud social networks connected to the service. There is also a toggle feature to prevent the device from sleeping while the application is in use.
The program is still in its beta phase so there may be some bugs, but developer frapeti has encouraged users to offer suggestions and reports in the application thread via the source. Of course your device will have to be rooted and running at least Android 4.1 to run the application— check out the source for the application thread on the XDA Developers site. Hit the break for the app’s Play Store link. Read more
If you’re an avid root/modder in the Android community then rooting tool-kits should be nothing new to you. Today an all-in-one root plus recovery installer has been made available for the Verizon Samsung Galaxy S 4. The instructions seems relatively easy (if you’re familiar with this kind of stuff), so just make sure you follow the directions thoroughly.
If it runs Android, it’s going to be tinkered with. The new, yet-to-be-released OUYA console is no exception. Some devs on XDA have officially unofficially ported CWM recovery to the little gaming box. This opens the doors for flashing custom ROMs and kernels on the box, although since the device is really aimed at controlling your TV, I wouldn’t expect to see too many ROMs for the OUYA. Performance-tuned kernels are definitely possible, though.
The device will need to be rooted first, but if you’re interested, hit the links below to check out how it’s done.
Good news for those of you that are tired of your generic boot animations on your Android devices— a forum member on XDA Developers, Vincent8111, has compiled about 400 custom boot animations into a single program for your convenience.
The BootAnimation Changer runs on Windows and stores an extensive collection of boot animations, sorted by name or file size, and varies from the opening sequence of the Simpsons, to anime, to colorful abstract patterns, to an obvious favorite, the Android mascot. Read more