In the last few days, rooting the T-Mobile G1 and myTouch 3G has become much easier. [Zinx] released FlashRec which lets you flash a new recovery image onto your Android phone. It takes advantage of Linux kernel vulnerability CVE-2009-2692. The app lets you backup your current image and then flashes Cyanogen’s Recovery Image 1.4. Once that’s done, you can use any custom Android build you want. Android and Me has documented the entire process on their site and points out the ridiculously large number of custom ROMs that are out there. Embedded below is a video from [unknownkwita] showing the rooting process.
Continue reading “1-Click Android rooting”
It’s been many months since the T-Mobile G1 was initially rooted. In that time, the process has been streamlined and tools have been built to make it much easier. Having a rooted phone has become even more desirable with the recent release of the 1.5 firmware that includes an onscreen keyboard along with other improvements. Having a rooted phone means you can do tricks like setting up a 3G/WiFi bridge. [Taylor Wimberly] has written a guide to help you easily root your G1 without having to go digging through forums for software bits. The process starts by using [Mike Moussa]’s rooting app to revert the phone to the RC29 build. You then use the “Android stupidly executes everything you type” exploit to launch telnetd and upgrade the bootloader. After that, the upgrade process is fairly easy. You just flash a new baseband and build. Once you’ve got your new custom firmware, you can do future updates using an app from the Android Market. We recently updated our Android Dev Phone 1 to 1.5 and haven’t had any issues.
For those wanting to do some hacking or kernel debugging on their G1, [macpoddotnet] shows how to make a serial to USB cable. He gathered enough information on the Android platform google group to be able to piece something together. He’s using a USB 2.8V serial TTL level converter, and lists several available that should work. Looks like a pretty easy build.
[ghostwalker] has put together instructions for running X11 on your Android device. This means you can run a full-blown Linux desktop environment on your phone. It requires you to already have a Debian shell on the phone, which we covered earlier. Instead of having to come up with a custom display driver, it’s hooked to a VNC server. You can connect to it using an Android VNC viewer on the phone or via any other VNC client. The how-to suggests either IceWM or the even lighter-weight LXDE for a window manager. You could potentially install Gnome or KDE, but we’d be surprised if it was any faster than dog slow. Let us know if you have any success with this and what you think the best use is.
Many G1/ADP1 owners have been using the app Tetherbot to get internet access on their laptop via USB to the phone’s data connection. The app relied on the Android Debug Bridge to forward ports. It worked, but people wanted a solution better than a SOCKS proxy. The community figured out a way to create a properly NAT’d connection using iptables and then [moussam] rolled them up into easy to use applications. There’s one for setting up a PAN device on Bluetooth and another for adhoc WiFi networking. It requires you to have root on your phone, but hopefully you’ve achieved that and are already running the latest community firmware.
When we first saw [Jeffrey Nelson]’s G1 based robot we immediately wondered what the transport for the controls was. The G1‘s hardware supports USB On-The-Go, but it’s not implemented in Android yet. It turns out he’s actually sending commands by using DTMF tones through the headphone adapter. The audio jack is connected to a DTMF decoder that sends signals to the bot’s Arduino. He wrote client/server code in Java to issue commands to the robot. You can find that code plus a simple schematic on his site. A video of the bot is embedded below.
Continue reading “Forknife, Android G1 controlled robot”
[ghostwalker] dropped in on our previous Debian Android post to let us know that he had streamlined the install process. The first time around, it quickly became difficult to complete the process because firmware updates had taken away root access. Hackers have since figured out how to downgrade from RC30 and install BusyBox. All you need to do to put Debian on your phone is download the package from [ghostwalker] and then run the installer script. This isn’t technically a port since Debian already has ARM EABI support. What would you run on your phone if you had access to the entire Debian package tree? A video of Debian starting up is embedded below.
Continue reading “Debian on the G1 once again”