HTC hasn't always been the most popular Android handset maker and while the One appears to holding its own, the same can't be said about a previous handset, the HTC Thunderbolt. Without getting into any specifics, it appears as if one HTC employee has recently taken to the web and offered an apology of sorts.
HTC ThunderBolt. Yup, Ice Cream Sandwich is finally here thanks to an official build that was apparently leaked. The actual update to Android 4.0.3 was leaked and a few awesome developers have made it into an easy to flash ROM for those interested.
published another list officially confirming what HTC smartphones will be getting the update to Android 4.0 Ice Cream Sandwich. Although a few already have, many are still patiently waiting and they've even confirmed the HTC ThunderBolt will see Android 4.0 ICS sometime in July. According to HTC all the devices should be updated to ICS by July.
HTCDev.com and are now truly free.
November 3rd event by HTC we are starting to see even more of the upcoming HTC Rezound. With a few leaks here and there, a second spotting at the FCC and even some hands-on video just yesterday. Today we are back with a little head to head comparison video next to the HTC Thunderbolt.
first taste of Gingerbread, but all the cool kids are already running versions of Android 4.0 Ice Cream Sandwich based off of the Software Development Kit. Verizon's first LTE phone is the latest to get the treatment, courtesy of the fine folks at RootzWiki. Experienced custom ROM users can flash the software in the usual way via a custom recovery - don't forget to do a backup!
Android Police (appropriate, no?) published a "massive" security flaw found on several high-profile devices from HTC. The problem comes from a customization that HTC has implemented on the core Android system, allowing any app that asks for the right permission access to a staggering amount of users' private and technical data. Even more disturbing, it seems to be the case that some of this information can be retrieved remotely by HTC or anyone else due to an HTC app opening up a network port on any affected phone. The primary issue stems from the "android.permission.INTERNET" permission. Once an app calls this permission into effect, it has access to all sorts of disturbing information on both rooted and non-rooted phones. The private information which any app can access includes email addresses, GPS locations and at least some former locations, call logs, SMS logs, and information from running apps. The HTC app "HtcLoggers.apk" is capable of collecting much of this data and then supplying it to anyone who opens up a network port on the phone. Theoretically, it's possible to duplicate a user's entire phone using these vulnerabilities. Trevor Eckhart originally discovered these vulnerabilities, and the flaws have been verified and cataloged by Artem Russakovskii and Justin Case of Android Police. According to these three, the problems effect a wide range of HTC Android devices across all major carriers. The EVO 4G, EVO 3D, EVO Shift 4G, MyTouch 4G Slide and Thunderbolt were mentioned specifically, so it's a fair bet that anything running similar hardware and software is likewise affected. The whistle-blowers have created a proof-of-concept app which allows any user (no root required) to examine the data being collected in real-time. You can find their exhaustive research and the proof of concept app at the source link. Though Eckhart said that he alerted HTC of these security issues more than a week ago, no official response has been made. Update: HTC has made the following statement: "HTC takes our customers' security very seriously, and we are working to investigate this claim as quickly as possible. We will provide an update as soon as we're able to determine the accuracy of the claim and what steps, if any, need to be taken"
HTC Thunderbolt. Although I'm not really sure if that is a fair thing to say since it was delayed in like April, then June, and now finally hitting here at the tail end of September. The updated documents and info has just went live on Verizon's support page.