Permanent Root exploit found for g2

The g2 has finally been rooted. Even though a temporary root exploit was found shortly after the phones release, a NAND lock prevented modifying the non-volatile RAM for a permanent root. Some controversy surrounded the g2 when it was erroneously thought to have a rootkit protecting the OS.  Supposedly the rootkit would watch for changes to the file system and then reset the phone to default settings when any unauthorized changes were made.  On the other hand a NAND lock functions by fooling the operating system into thinking there isn’t any memory available, essentially “locking” the memory in key areas.  Once it was discovered to have the NAND lock it was only a matter of time before the g2 was permanently rooted.  NAND locks have become a popular (and unsuccessful) deterrent employed by device makers to stop the jailbreaking comunity.  While this exploit is nothing groundbreaking it is another notch in the belt for the jailbreaking community and a welcome benefit to g2 users.

New nook says: no root for you!

That is a blurry image of a Barnes & Noble Nook eReader stuck in an infinite reboot loop. This is the result of trying to downgrade the firmware to 1.0 in preparation to soft-root the device. So after a few failures the device will recover itself, right? It doesn’t look that way. No problem, don’t you just pop it open and re-write the OS to the SD card inside to do a hardware root? Nope, it looks like the newest hardware revision has replaced that convenient SD card with a memory chip.

For now it’s a brick, but we’re sure there will soon be a way to fix this. A bit of solder, some wires, and a reflash should work much in the same way an EEPROM recovery does. That is, if you have an original image to work with.

So for now, be careful not to attempt to root your nook if the serial number starts with 1003.

[Thanks Ken]

DroidX gets a custom recovery image

[Birdman] has managed to push a custom recovery image to the DroidX. This previously impossible action opens the doors to all kinds of fun hacking. While you can’t just drop a custom Rom on the phone right now, this is the first step in making that happen. You can find the directions in the post, but they’ve got a while to go before they become as easy as something like a jailbreak.

[via phandroid]

Nexus one as USB host

[Sven Killig] Has managed to get his Nexus One into USB host mode. This allows him to plug in all kinds of peripherals such as web cams, keyboards, even a displaylink unit. This is fantastic as it really opens up the possibilities of this device. You can see that he now has an amazingly functional and portable system running. He mentions that it is pretty stable unless he runs big programs, we wonder if he has added any RAM to it. It is worth noting that the Droid can be USB host as well.

I am root! – Alex eReader

The Alex eReader has been rooted. This little handheld was the belle of the ball at CES 2010 when it came to eReaders. Now that is has been released into the wild it takes its place next to the heavy hitters that have already seen root access. If you’re unfamiliar, this device boasts a six-inch e-ink display and a 320×240 LCD touchscreen interface. Now that you can make it do your bidding, what are your plans for the $350 tablet? Let us know in the comments.

[Thanks Richard]

NES lovers grew up and now they’re coding for Palm

In case you missed it back in June, the Palm Pre was rooted by extracting the Root ROM from a Palm tool used to reset a device with damaged software. A lot has been learned from examining the code inside that ROM but we’re most amused by one thing in particular. If you grew up in the 80’s there’s a pretty good chance you know the Konami Code by heart. So did the developers of WebOS, the firmware running on the Palm Pre. By inputting the familiar (UpUpDownDownLeftRightLeftRightBA) set of gestures the handset enters Developer mode for connection to the SDK which was leaked last summer but is now in open release.

Unlocking multitouch for Droid and Nexus One

We’re fans of pinch-zooming and that means multitouch. Although the interface is natively supported by both the hardware and operating systems of the Nexus One and Droid phones, it is locked out of the stock installation. You can make multitouch work on both handsets if you’re willing to do a little firmware alteration.

The coding has already been done for you, it’s a matter of loading a custom kernel. Both the Nexus One and the Droid have been rooted, and that’s what you’ll need to do to unlock multitouch with new firmware. In addition to gaining full access to the device OS, you’ll need to load up some different apps that support pinch zooming, etc. Luckily, these are readily available and you may like them better than the stock browser, maps, and photo applications.

Follow

Get every new post delivered to your Inbox.

Join 94,522 other followers