I get that the timing of this post seems super silly, especially after the conversations we had yesterday, including one where I said I don’t buy Nexus phones to flash all the things, but you know what? Many of you did buy a Nexus 6 or Nexus 9 to do just that, flash and tinker, so we want to make sure you know how to get started. Also, the process for unlocking the Nexus 6 or Nexus 9’s bootloader that we are about to walk through is something I do with all Nexus devices I own, because there is always a chance I may want to tinker later on down the road. Why not be prepared? (more…)
If you buy one of the new Nexus devices – the Nexus 9 or Nexus 6 – and plan to unlock its bootloader upon first boot, so that you can get to tinkering, understand that you may have to enable the “OEM unlock” command that would typically be used to accomplish that task. In Android 5.0 “Lollipop,” Google has added a check box under Developer Options that enables the OEM unlock command to work. If that box isn’t checked, then I would imagine you will see an error during the bootloader unlock process. (more…)
If you own an LG G3 – we are talking any variant – and are into custom recoveries, ROMs, that sort of thing, then you should probably have already installed Bump. Created by Team Codefire, Bump allows you to boot into a full TWRP custom recovery and flash ROMs as you please, sort of like if you had a full bootloader unlock. As I just mentioned, this should work with all carrier variants (including Verizon’s), you just need to be rooted first (and work through a little adb with a recovery.img). (more…)
The Blackhat 2014 conference is taking place this week in Las Vegas, a conference which Dan Rosenberg, the man responsible for exposing numerous security exploits on Android devices, is speaking at. You may recall his previous work that unlocked the bootloader of a number of Motorola DROID devices, something that developers had attempted for years to try and accomplish without success.
When Rosenberg (@djrbliss) first popped up on the list of Blackhat conference speakers with a topic that was to conclude by discussing an unpublished security exploit “including a live demonstration of using it to permanently unlock the bootloader of a major Android phone,” we were certainly interested. His talk happened last night, and according to those at the conference, he successfully unlocked the bootloader of the Moto X on stage. (more…)