Pocketables and a couple of users named "condi" and "BluechipJ'. It's pretty simple as far as Android root processes go: connect via ADB, run a little custom code and you're good to go.
HTC One X, this can happen even faster, and indeed that seems to be the case. Noted ROM developer and general modder Paul "Modaco" O'Brien has already released a superboot package for the HTC One X.
Verizon's stance on the DROID RAZR, and pretty much all of Motorola's devices and anything else they can get away with to boot. In a recent and seemingly unsolicited letter to the FCC, Verizon explained its position and reasoning behind requiring its OEM partners to lock their bootloader (in some cases). The reason? Why, it's all for you, of course!
hours ago, the amazing developer community we all love and trust have already released ClockworkMod Recovery for the quad-core powered tablet. It is available now and will require a few ADB commands but for those interested this is good news.
Dan Rosenberg said that the exploit, which he calls "Motofail", should work on Motorola devices running Gingerbread and Honeycomb. Since that encompasses pretty much every Motorola device released in the last six months, it's a major boon to the community.
Motorola DROID XYBOARD, and those that love to mod their devices have had to conform to using the included stock Honeycomb ROM. That's all about to change thanks to developer Dan Rosenberg! The bootloader is still locked down, but root access is now available.
DROID 4 QWERTY keyboard slider has only been available for a few days and was just released late last week. Thanks to those awesome developers it appears that we already have a full root method for the device, as well as a script to make the entire process simple for those looking for a little root access.
Smartphone Champ, has discovered another way to get into a private Google Wallet account, no root required. Technically this is more of a lopphole than a crack, if only because it uses Android's default setting to achieve access. The gist is that all you need to do to wipe the security PIN is to delete the app's stored data via the Settings menu, essentially resetting it to the state it was in when you downloaded it from the Android Market. This is a common Android function and is even recommended sometimes when an app is misbehaving. Wipe the data, re-launch the app, and you (or anyone who has your phone) can access Wallet, associate it with your Google account (without entering a password) and set up a new PIN. Then they can spend the money at any online or retail store that accepts Google Wallet - all without root. Watch as Hashim demonstrates: [youtube Rh1ytHrhj2E] This is a much bigger problem than the previous leak, because anyone with physical access to your phone has the ability to do this quickly and easily. The problem lies with Google Wallet's authentication system: though funds are added into your account and virtually "kept" by Google, the authentication is linked to a single device, not your account. Compare this with any banking app, which keeps your account password connected to your username. Odds are overwhelming that Google will address this loophole very soon. In the meantime, the best way to stay protected while using Google Wallet is to set up a PIN or lock pattern on your device itself - without the PIN or pattern, a thief would have to completely wipe your phone to access any apps or data. [timeline] [via 9to5Google, via AndroidandMe]
recently exposed vulnerability in the Google Wallet app which potential thieves to steal your PIN code if you're running a rooted version of Android. The crack can be applied even after a PIN or password is changed, but again, only on rooted devices. After The Next Web posted the story from the original source, Google itself responded - though there isn't much information on an actual resolution. Essentially, Google reminds users that a stock phone cannot be affected in this manner, and recommends that root users refrain from downloading Google Wallet at all. Here's the full text of their reply:
The zvelo study was conducted on their own phone on which they disabled the security mechanisms that protect Google Wallet by rooting the device. To date, there is no known vulnerability that enables someone to take a consumer phone and gain root access while preserving any Wallet information such as the PIN.We strongly encourage people to not install Google Wallet on rooted devices and to always set up a screen lock as an additional layer of security for their phone.That's a disappointing answer, but not an unexpected one. When you unlock or root a device, you're always running at least some kind of risk, to your hardware, your software, and even your personal data. The possibility that 1) your rooted phone would get stolen by 2) someone with the technical knowledge to pull a similar hack off and 3) the knowledge that both your banking information is on the phone and that it's possible to retrieve it is remote to say the least. Considering the low saturation of NFC payment systems, especially in the US, it would seem that root users just need to do without for now. This isn't the first time that Google has essentially ignored the considerable percentage of Android users who root: there's still no way to legally watch movies or TV shows downloaded from the Android Market on a rooted device. While this is thought to be a measure insisted upon by the various entertainment studios, that doesn't make the refusal of service any less annoying. Even so, it's not Google's responsibility to cover every contingency of every Android modification: If you modify the software on your phone or tablet, you're responsible for any change in functionality or security. That seems like a reasonable position, if at times frustrating one.