Chromecast update breaks root-friendly exploit

Chromecast exploit in action

We hope you weren't planning to tinker with your Chromecast this weekend. GTVHacker has confirmed that a recent firmware update to Google's streaming media stick plugs the bootloader exploit that many are using to get root access. Some XDA-Developers members have tried maintaining root by flashing recovery images and disabling signing keys, but those aren't reliable solutions -- we've seen a few reports of bricked Chromecasts. If you're cautious, it may be best to wait until more adventurous owners find a vulnerability in Google's newer code.

Filed under: , ,

Comments

Via: Android Police

Source: XDA-Developers, GTVHacker (Twitter)

Redbox Instant app for Android updated to work on rooted devices

Redbox Instant app for Android updated to work on rooted devices

When Redbox Instant's mobile apps launched earlier this year some users noticed that it refused to work on rooted Android hardware. Now a new update, noted in the log as "changed the way we handle rooted devices," is allowing playback no matter what your superuser status is. Many other premium video apps (but not Netflix, for example) have similar blocks on rooted / jailbroken mobile hardware, although users can usually work around them. Still, it's annoying and mostly unnecessary especially since the block is so easily overcome, so it's good to see Redbox making the change. The ban on rooted hardware and its limited library of subscription streaming content -- although it does throw in the convenience of kiosk rental credits -- have been the source of a large number of negative reviews for the app, hopefully with one looming issue out of the way the other will be addressed shortly.

Filed under: , ,

Comments

Source: Google Play

Google Glass exploration demonstrates a hidden browser and more (video)

Google Glass delve shows hidden browser, omnipresent voice and more video

While it's known that Google Glass has in-testing features just waiting to be exposed, we haven't seen many attempts to reveal them all. Zhuowei Zhang has stepped in with a complete list of what's under the hood, and it turns out that some of those features work... more or less. After modding the latest Glass firmware, Android Police can confirm that there is a functional Chrome browser lurking inside; Google just hasn't woven it into the user experience. Other Labs features produce similarly mixed results. OK Glass Everywhere lets users easily start a voice command chain from anywhere in the interface, but a video stabilization mode clearly isn't ready for prime time. Although you'll want to visit the source links for the full rundown, it's evident from just a cursory glimpse that Glass has plenty of room to grow.

Filed under: ,

Comments

Via: Android Police

Source: GitHub

Google Glass gets a one-stop shop for downloads, including a rooted image

Google Glass gets a onestop shop for downloads, including a rooted image

Early Google Glass owners are dominated by developers and tinkerers, so it's only fair that they get easy access to the downloads they need. Appropriately, Google has quietly set up a page that centralizes both Glass images and kernel source code. The company has even saved owners from having to hack their eyewear the hard way -- one image comes pre-rooted for those willing to toss caution (and their warranties) to the wind. Most of us can't take advantage of these downloads for about a year or more, but those with early access can swing by the new code hub today.

Filed under: ,

Comments

Via: Android Police

Source: Google Developers

Google Glass rooted and hacked to run Ubuntu live at Google I/O

Google Glass rooted and hacked to run Ubuntu live at Google IO

Today at Google I/O the company held a session entitled "Voiding your Warranty" where employees demonstrated how to root Google Glass and install Ubuntu on it. What you're seeing above is a screenshot from a laptop running a terminal window on top and showing the screencast output from Glass on the bottom -- here running the standard Android launcher instead of the familiar cards interface. The steps involve pushing some APKs (Launcher, Settings and Notepad) to the device using adb, then pairing Glass with a Bluetooth keyboard and trackpad. After this, it's possible to unlock the bootloader with fastboot and flash a new boot image to gain root access. From there you have full access to Glass -- just like that! Running Ubuntu requires a couple more apps to be installed, namely Android Terminal Emulator and Complete Linux Installer. The latter lets you download and boot your favorite linux distro (Ubuntu, in this case). You're then able to use SSH or VNC to access Ubuntu running right on Glass. We captured a few screenshots of the process in our gallery. Follow the links below for more info -- just be careful not to brick your Glass okay?

Filed under: , ,

Comments

Source: Google I/O 2013

Google releases Glass kernel GPL source, lets developers have at it

While our own Tim Stevens is currently adapting to life with Google Glass, developers are going beyond scratching the surface and actually starting to fiddle with what's inside. Hot on the heels of Jay Freeman rooting Glass, Google's throwing devs a bone to by publicly releasing the kernel source. Interestingly, Karthik's Geek Center spotted info within the file that points to Glass potentially being equipped for NFC support. If you're up for tinkering, you'll find the temporary location of the tar.zx file itself at the source link.

Filed under: , , , ,

Comments

Via: Karthik's Geek Center

Source: Google

Developers gain root access on Google Glass, not yet sure what to do with it

Developers gain root access on Google Glass, not yet sure what to do with it

Access to Google's Glass headsets is still limited to a lucky few, but that's more than enough to include several curious coders. Some have had success identifying the hardware contained within, but others are focusing on the software. Cydia founder Jay Freeman posted the above image on Twitter this afternoon to show that he had gained root access on his unit, telling Forbes he relied upon a well-known Android 4.0.4 exploit to take control of its OS. The bad news? He hasn't been able to use it much yet, since the Explorer edition isn't quite ready for prescription glasses wearers. For now, the question of whether the same technique will work on eventual retail versions remains unanswered, as well as what it's actually going to be useful for. Steven Troughton-Smith suggests developers can use it to try out more complicated apps than Google currently allows, including always-on heads-up displays or camera apps. Overcoming any remote deactivation Google may try to enforce or loading your own unauthorized apps are also definite possibilities, though we're sure others will surface soon.

Filed under: ,

Comments

Source: Jay Freeman (Twitter), Forbes, 9to5Google

Root exploit unearthed for Snapdragon-based Galaxy S 4

DNP

Inventory delays may stifle prospective Galaxy S 4 owners, but such pesky hurdles appear to have little effect on Android's development community. An XDA-Developers member by the name of "djrbliss" has constructed a root exploit for Snapdragon-powered variants (see: all US carrier versions) of Samsung's newly christened flagship. While burrowing into your phone's software always carries some risk, the bold will find a complete how-to at the source link below.

Filed under: , , ,

Comments

Via: Droid-Life

Source: XDA-Developers

Sony Xperia Z rooted before it reaches most buyers

Sony Xperia Z rooted before it reaches most buyers

We'd say that this is living life on the edge, but that would assume there was an edge to live on. Doomlord at the XDA-Developers forums has rooted the Sony Xperia Z before the device is even available to most of the buying public. His trick was to modify the code of a Nexus 4 root and rely on Teamviewer to remotely test on a real-world device. Others have since chimed in to show that the root isn't a one-time exception, although the hack remains the definition of a risky maneuver when it's both very fresh and lacks a recovery tool. Early (and soon-to-be) Xperia Z owners still eager to throw caution to the wind can try Doomlord's code at the source.

Filed under: , ,

Comments

Via: Phone Arena

Source: XDA-Developers

GTVHacker shows off custom recovery for Google TVs (video)

GTVHacker shows off custom recovery for Google TVs video

There's plenty of official news about Google TV this week at CES, but if you're more interested in cracking the platform wide open unofficially this video may be of interest. The GTVHacker team reveals that it has been developing an exploit that will let it run custom kernels on "most" second generation Google TV devices, along with a custom recovery designed specifically for Google TV. It's not ready for prime time just yet but in the video you can get a peek at it being loaded on a Sony NSZ-GS7 box, opening up wider access to the kinds of adjustments we're already used to seeing on mobile Android devices. There's no word on when this will see wide release, but you can hit the source link for more details plus a history of what the team has been up to since coming together over two years ago

Continue reading GTVHacker shows off custom recovery for Google TVs (video)

Filed under: ,

Comments

Source: GTVHacker