The much-anticipated Nexus 5 starting shipping out a few weeks ago, and like many new products, some people have received phones with manufacturer defects. This is always unfortunate, but [Adam Outler] over at the XDA Developer forums thinks he’s found a solution to one of the ailments — a low speaker volume fix!
[Adam] noticed that his phone wasn’t quite as loud as he was used to, so he decided to take it apart and see if there was something causing the muffled sound quality. He assumes glue seeped into part of the speaker where it’s not suppose to during assembly, and what he discovered was, you can increase the audio output by opening up the speaker chamber. He found you can easily port the speaker chamber by popping a few holes in it using a hot needle, which helps increase the volume of the phone. It’s not exactly a confirmed hack, but he will be featuring it on XDA-TV in a few weeks, and hopefully a few more cases pop up in order to evaluate the effectiveness of the hack — it might even help users whose phone isn’t unusually quiet!
Now, most people will just return the phone under warranty, which makes sense. But this is Hackaday and XDA we’re talking about. It’s probably less effort to just suck it up, and fix it ourselves. Who cares about warranties?
[via XDA Developers]
[Adam Outler] tipped us off about a cross-platform Android hacking suite he’s been working on. The project, which is called CASUAL, brings several things to the table. First and foremost it breaks down the OS requirements seen on some hacks. It can perform pretty much any Android hack out there and it doesn’t care if you’re using Linux, OS X, or Windows.
We’ve embedded two videos after the break. The screenshot seen above is from the first clip where [Adam] demonstrates the package rooting the Oppo Find5 Android phone. He then goes on to show off the scripting language CASUAL uses. This layer of abstraction should make it easier to deploy hacking packages, as CASUAL handles all of the underlying tools like the Android Debug Bridge, fastboot, and Heimdall (an open source Odin replacement which brings the low level tool to all OS platforms) . The second video demonstrates a Galaxy Note II being rooted, and having a new recovery image flashed.
Continue reading “CASUAL seeks to make Android hacking OS agnostic”
[Adam Outler] and friends have been hard at work unlocking the bootloader of some Verizon Android devices. His most recent adventure involves unlocking the Verizon branded Samsung Galaxy Note II.
You can’t run Cyanogenmod on a device that has a locked bootloader. This is presumably why it took no time at all for the XDA forum users with Verizon phones to raise enough money to put one of these puppies in [Adam’s] hands. He walks through the process he used to find the exploit in the video after the break. We’re not experts on the process, but apparently the .pit file used when flashing Odin is the entry point for the exploit. A bit of code has been injected into it which provides an opening to flash a replacement bootloader.
We mentioned the Galaxy S3 in the title. Apparently that has been unlocked as well but with one big hang-up. An over-the-air update could possibly brick the S3. To avoid this issue with the Galaxy Note II the original bootloader is patched and reflashed as part of the exploit.
Continue reading “Unlocking Verizon Galaxy Note II and Galaxy S3″
[Adam Outler] and [Rebellos] have been working feverishly to advance the world of mobile device hacking. They’re attacking on two fronts, making it easier for the common hacker to monkey with the phone’s firmware and OS with impunity, and by finding ways to make regular handsets into dev-hardware for low-level hacking.
The Hummingbird Interceptor Bootloader (HIBL) circumvents the chain of trust on smartphones running the Cortex-A8 family of processors. This opens a lot of doors, not the least of which is the ability to run any OS that you’re capable of porting to the hardware. We’re certain that Android builds will come first as they are open-source, but there’s talk of iOS or Windows Phone being run after some heavy assembly hacking.
But the two developers are trying to bring more people into the fold with their recent hacks. [Adam] has put out a call for your broken hardware. He needs your dead smartphone boards to reverse engineer the circuitry. Soldering one wire from the OM5 pin on the processor to the OM1 resistor will make the phones unbrickable (something we heard about back in July) and remove the need for soldering in a JTAG interface. With borked hardware in hand he pops off the processor and traces out this connection as well as the UART pins.
The soldering isn’t an easy process, but it’s a marked improvement that breaks down more barriers that keep people from hacking their coveted hardware. The clip after the break shows how easy it now is to recover your phone if something goes wrong while messing with the firmware or OS.
Continue reading “Smartphone hacking without risk – plus, broken phones needed”