Motorola DROID X users are reporting that the highly anticipated update to Android 2.3 (Gingerbread) is finally beginning to rollout. Update 4.5.588 is currently being delivered to devices as an over-the-air (OTA) update and while no official change log is available at this time, the stand-out addition is obviously Gingerbread. Yes, the DROID X has finally been thrust into 2011, which will definitely be a relief for many anxious owners. What’s more, the new Android 2.3 build for the DROID X has already been rooted, and a public root solution should become available shortly. So, DROID X owners, if you haven’t already received the update, sit tight — it should hit your handsets soon. For the impatient among you, hit the read link to download the update file and apply it manually.
AT&T has started to issue warnings to customers unofficially tethering their smartphones to its network. In an email to unauthorized tetherers, the company writes, “Our records show that you use this capability, but are not subscribed to our tethering plan.” The correspondence goes on to note that users will be automatically enrolled in the $45 per month “DataPro for Smartphone Tethering” plan if they ignore the warning. “The new plan – whether you sign up on your own or we automatically enroll you – will replace your current smartphone data plan, including if you are on an unlimited data plan,” the email continues. The standard DataPro offering is $25 per month and provides users with 2GB of monthly data, although some users are still clinging to a discontinued, $30 per month 5GB data plan. It is safe to assume that a large portion of the unofficial, tethering populous is jailbroken iPhone users and rooted Android users. “If you discontinue tethering, no changes to your current plan will be required.” A copy of the email tethering-cheaters are receiving is after the break.
While investigating several Android Market applications that appeared to be duplicates, Reddit user lompolo discovered several apps that provide an extra, and definitely unwanted, service. The applications in question contain an exploit that, when downloaded, automatically root the Android handset. Not only that, the apps — 21 in total — also contain an embedded .apk file that can accept remote code and upload device information (like your IMEI) to a server in California. The malicious bundles were published by user Myournet and some of the individual applications have been downloaded over 50,000 times each. Once alerted of the potential malware, Google investigated and removed the code from the Market and users handsets. Unfortunately, that doesn’t have any effect on data already compromised by downloaders of the rogue applications. Google has yet to publicly comment on the incident.
UPDATE: More information about the exploit and affected applications can be found here. More →
As noted by enthusiast blog istartedsomething, Windows Phone 7 is on the verge of being jailbroken. Actually, hackers have already gained root access Windows Phone 7′s registry and file system — their methods simply aren’t yet bundled up in a nice little user-friendly package. “Jailbreaking” or “rooting” is a process that will allow users to install applications that have not been approved by Microsoft. It will also allow developers to build applications that utilize functions of the OS that are not accessible using standard developers tools. As it did with the iPhone, a Windows Phone 7 jailbreak will open up a whole new realm of possibilities for apps and customizations that would otherwise be unavailable to end users. More →
Dear hardware OEMs: Resistance. Is. Futile. It seems as though the gang over in the IRC channel #G2Root xda-developers have found a permanent rooting solution for T-Mobile’s HTC G2 handset. As you may recall, the rooting community ran into a little hiccup with the Android 2.2 device due to an auto-restore feature aimed at helping the average consumer un-brick their handset. The new solution comes just days after HTC released the source code for the G2 on their website. The root exploit for the G2 is far from production-ready, but it does look like the software is well on its way to getting the one-click treatment.
UPDATE: Quick correction — As Aaron pointed out in the comments, the G2 root was originally discovered by members of the #G2root IRC channel; an XDA forum member announced it. Thanks, Aaron!
[Via Android Spin] More →
Kids, don’t try this at home. Seriously. Despite the fact that the Internet let out a collective gasp when the T-Mobile G2 was revealed to sport an 800MHz processor, the handset is fantastically responsive out of the box. But that won’t stop the good folks over at xda-developers from ripping T-Mobile’s latest G-phone apart, of course. Forum member coolbho3000 has posted all the goodies one would need to overclock a T-Mobile G2 to a blistering 1.42GHz. While we recommend strongly against attempting the mod unless you really know what you’re doing, that shouldn’t stop anyone from ogling the results of this great hack. Hit the jump for a video of the G2 tearing through benchmarks like a champ. More →
In case you haven’t been keeping up on your HTC G2 news: The recently released Android 2.2, G2 handset from T-Mobile has a built-in security feature that is having an adverse effect on those who are trying to root the device. As T-Mobile explains:
The HTC software implementation on the G2 stores some components in read-only memory as a security measure to prevent key operating system software from becoming corrupted and rendering the device inoperable. There is a small subset of highly technical users who may want to modify and re-engineer their devices at the code level, known as “rooting,” but a side effect of HTC’s security measure is that these modifications are temporary and cannot be saved to permanent memory. As a result the original code is restored.
This is good for those users who are not interest in root access; as the chance of a bricked device become slimmer. It is however not so good for that “subset of highly technical users” who are trying to get their electronic mitts on the G2′s innards. It appears as though the Android-tinkering community will just have to be a little more creative than usual with the G2. More →
The recently announced, unreleased Samsung Galaxy Tab has officially been given the root treatment. Blog sera-apps.de is reporting that they have seen, used, and possess a rooted Gally Tab (now that didn’t take long). The site does caution, “I don’t know if the final Galaxy Tab can be rooted the same way like the one I have here. This is a work in progress prototype – thinks [sic] can differ a lot.” Either way, it is an encouraging sign for Android enthusiasts who are looking forward to getting, tinkering, and h4x0ring their Galaxy Tab. More →
We are a little late on reporting this one, as it got lost in the DROID Incredible melee that happened yesterday afternoon, however the Sprint EVO 4G — running Android 2.2 — has been rooted. The good people over at xda-developers have the write-up ready to go, although there is this warning:
My advice would just be to READ very carefully
through all the STEPS. It’s very easy to get confused if
your are just excited about it and are
trying to finish as soon as possible.
You’ve been warned! If you need the “roots” give the tutorial a shot. Enjoy! More →
If you’ve got yourself a Motorola DROID 2, and are itching for some root user action, look no further. Sebastian Krahmer has come up with a method that will get you the # you desire on your shiny, new D2. The process doesn’t look like one of the easiest we’ve ever seen, but should be doable by those that are worthy of a rooted device. The full instruction set is sitting over at XDA. Hit up the read link and let us know if you have any luck. More →
The folks over at alldroid.org have posted a note in their forums claiming that Android tweaker extraordinaire “Birdman” has successfully booted a stock DROID X into a custom recovery state. The post reads:
Using a hack discovered by the folks who’ve done all the work on the Milestone, birdman has booted a custom recovery on his handset. The process is labor-intensive and dangerous if you’re not prepared to recover from a bricked device (and technically this bricks the device since you can’t reboot into Android at this moment), but it’s a sucessful proof of concept.
Right now he’s working on getting ADB up so we can further investigate what it will take to get a fully functional recovery working (that will also allow reboot back into Android).
From there the focus will move to a more robust recovery and discovery if/how we can do Nandroids and/or write a new /System image (like Froyo).
You may recognize Birdman’s name, as his handy work helped pioneer the original DROID X root. We’ll keep our eyes glued to this one and report back when more progress is made. Godspeed Birdman. More →
Owners of a Sony Ericsson X10 Mini or a Mini Pro will be happy to know that the folks at xda-developers have been able to achieve root on these two Android devices. The root requires some familiarity with adb and terminal commands and apparently takes advantage of the same exploit used to root the DROID X, Devour, and other Android handsets. Hit the read link for the detailed instructions and head over toe xda-devs to link up with other SE owners. Happy Rooting!
[Via xda-developers] More →
Want to root your DROID X? Find yourself confused by all these references to this mysterious adb program and its cryptic commands? If you are nodding your head in agreement, then you need to point your browser to the forums at Alldroid where member Sil3ntKi113 has packaged up a simple and easy rooting tool for Windows users. The application installs all the files and drivers necessary for rooting the DROID X, and launches with two simple buttons — “root me” and “unroot me”. Initial feedback suggests that the program roots the DROID X as well as the manual method of typing terminal commands. Purists may turn up their noses at the ease of rooting that is provided by this application, but for those who are new to Android, this application is a life saver.
[Via Droid Life] More →