[Kubbur87] put together a guide to replacing the Non-touch Kindle 4 screensavers with your own images. We’ve already seen a way to remove the Special Offers banners from the newest version of Kindle Hardware, this hack lets you use your own 600×800 Portable Network Graphics (.png) file instead of the images pushed to the device by Amazon.
Frankly, we’re shocked at how easy this hack is. [Kubbur87] puts the device into developer mode, enables SSH, and then goes to work on the Linux shell within. It seems the only line of protection is the root password which he somehow acquired.
After the break you’ll find his videos which show how to enable developer mode and how to perform this hack. By putting a file named “ENABLE_DIAGS” with no extension on the device when it is recognized as a USB storage device you’ll gain access to the diagnostic menu system. From there it’s just a matter of cruising that menu to get SSH access. Like we said, you’ll need the root password, that that’s as easy as naming your favorite video game character from the 1980’s.
Continue reading “Custom screensaver on the non-touch Kindle 4”
We figured it wouldn’t be long before someone figured out how to remove the ads from the ‘Special Offers’ versions of the Amazon Kindle hardware. There are two things that made this obvious to us, the huge flaw that lets code be easily run as root, and the MP3 tag forming that makes it possible to unlock the device.
[Pat Hartl] knows his way around a *nix shell, so once he gained SSH access to the device he started a search for the ad images that make up the special offers feature. He found them in a few different places, making backups of the files in an alternate location, then removing them with some simple commands. He even rolled the process into a one-click installer like the Jailbreak package. It makes us wonder if Amazon has a way to tell if your device is not longer pulling down content for these offers?
At risk of sounding preachy, Amazon does offer this hardware without ads for a one-time fee. Circumventing the unobtrusive ads may lead to higher hardware prices in the future, and [Pat] mentions that. He pulled off this hack to show the holes in Amazon’s security, and hitting them in the pocketbook is a powerful way to do it.
Hackaday itself is ad-supported. We run advertisements that do not use sound, popups, or flashing video effects. Remember to turn off your ad-block for our site in order to show your support. Thanks!
The Kindle Touch has been rooted! There’s a proof video embedded after the break, but the best part about this discovery is that [Yifan Lu] wrote in-depth about how he discovered and exploited a security hole in the device.
Gaining access to the device is as easy as injecting some HTML code into the UI. It is then run by the device as root (no kidding!). [Yifan] grabbed an MP3 file, changed its tag information to the HTML attack code, then played the file on the device to exploit the flaw. How long before malicious data from illegally downloaded MP3 files ends up blanking the root file system on one of these?
Continue reading “How the Kindle Touch jailbreak was discovered”
[Kevin Haw] is the proud owner of a brand new Kindle Fire. But to protect the investment he wanted a nice looking case and decided that DIY was the way to go. He ended up repurposing a Moleskine journal as a table cover.
You can do this one yourself in under an hour. Most of the pages in these journals are sewn in place and [Kevin] started by cutting the strings with a hobby knife. Once removed, he used a utility knife to separate the pages that were glued to the cover; this leaves you in the state seen above.
Obviously this unfinished look just won’t do. [Kevin] used some red duct tape duct tape to cover the unsightly spine. This adds strength, and does the job of cleaning up the area, but we might have also applied felt (or microfiber cloth) to the entire inside area for a bit more finished look. The final part is mounting the tablet which was accomplished with adhesive Velcro strips. These can be removed from the back of the Kindle Fire later on if you decided to use a different enclosure.
Amazon’s new tablet reader, the Kindle Fire has been rooted. Early this morning [Death2All110] posted the steps he took to gain root access to his device (which is so fresh out of the box it still smells new). The heavy lifting is done by a package called SuperOneClick which aims to root all manner of phones and devices running Android.
There’s a bit more than the one click necessary, but not by much. Using the Android Developer Bridge in conjunction with the SDK you need to put in a value that will be recognized as the VID. From there, turn on the ability to install apps from unknown developers, re-enumerate the device on your PC and run the one-click package.
What can you do with this? Well, it completely opens up the Android OS so that you can bend it to your will. We haven’t seen any demonstrations yet, but it should be even better than what we saw done with the Sony PRS-T1.
[Addictive Tips via Reddit]
[Glenn] sent us an update on his FrankenKindle project. You might remember this hack from back in July. [Glenn] is modding the device to make it easier for his sister, who has Cerebral Palsy, to use.
The latest revision adds a case for the hardware. The silver button pad is what remains of the V.Reader (a children’s toy), having had the screen portion hacked off. The case provides a stable base for the reader and buttons, holding them at a nice angle for easy use. There’s just a bit of cable routing that needs to be finished to protect some fragile connections. The picture above does show the circuit board to the side, but there is a place for it around back.
In the video after the break [Glenn] mentions that the response to keypresses is a little sluggish. Sure, some of this is Kindle’s own delay when refreshing the ePaper display. But we can’t help but think the code running on the Teensy could also be optimized. We’ve asked him to post his code if he wants some tips, so check back and help out if you can.
We do have one feature suggestion for him. The Kindle keyboard no longer functions because that flat cable coming out the side is what connects to it. It’s quite easy to add a PS/2 keyboard port to a microcontroller. That would be a nice addition to the FrankenKindle as it would make things like shopping for books a bit easier.
Continue reading “More FrankenKindle progress”
If you’ve ever thought the Kindle keyboard was a bit cramped you’re not alone. [Glenn’s] been working on developing an external keyboard for the Kindle for quite some time. It may not make easier for everyone to use, but he’s motivated to improve usability for his sister who has Cerebral Palsy.
We see a lot of keyboard hacks that solder straight to the pads under the buttons, but for a compact device like the Kindle this would really mess things up. Instead of going that route, [Glenn] sourced a 20-pin Flexible Flat Cable and breakout board that match the internal Kindle connector. The prototype seen above uses a TS3A5017 serial multiplexer chip to simulate the keyboard button presses. That multiplexer is driven by a Teensy++ microcontroller board which is monitoring a larger set of buttons on the V.Reader seen above. Check out the video after the break for a brief demonstration, then look around at the rest of [Glenn’s] blog posts to view different steps of the development cycle.
Continue reading “FrankenKindle: building an alternate Kindle keyboard”