Jump to content


Top Posters

  • satman80Photo
    1. satman80

    1,109,577 posts

  • RSS FeedPhoto
    2. RSS Feed

    26,322 posts

  • SamuriHLPhoto
    3. SamuriHL

    25,740 posts

  • livinginkaosPhoto
    4. livinginkaos

    11,439 posts

  • soocoldPhoto
    5. soocold

    9,321 posts

  • comiskeybumPhoto
    6. comiskeybum

    7,544 posts

  • jayrodPhoto
    7. jayrod

    6,826 posts

  • transmissiontechPhoto
    8. transmissiontech

    6,090 posts

Newest Members

  • Unknown11Photo
    1. Unknown11

    Joined: Today, 12:50 PM

  • kitjhannaPhoto
    2. kitjhanna

    Joined: Today, 11:48 AM

  • vanderrleiPhoto
    3. vanderrlei

    Joined: Today, 11:12 AM

  • dizturbd2Photo
    4. dizturbd2

    Joined: Today, 10:49 AM

  • j10rosaPhoto
    5. j10rosa

    Joined: Today, 10:46 AM

 Photo

New Root Method for All Carrier Versions of LG G3

18 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  stumproot.png   351.82K   14 downloads

 

     The guys of Team Codefire (IOMonster, jcase, autoprime, and PlayfulGod) have released a new root exploit that has been confirmed to work on all carrier versions of the LG G3, including the Sprint version, which up until now did not have a working root method.  Called Stump Root, its about as easy as rooting gets.  Simply download and install the Stump Root apk, run it, reboot when prompted, install SuperSU, uninstall the Stump Root apk, and profit.  Big thanks to the guys of Team Codefire for continuing to find and exploit the vulnerabilities that allow us to have root access on our devices!  Read more about Stump Root and grab the apk HERE.  Standard warnings about rooting your device apply.

 

Source: XDA

  100 Views · 4 Replies ( Last reply by SamuriHL )

 Photo

Moto X+1 and Moto 360 "Event" set for Sept 4th

14 Aug 2014

Posted By KaChow in DroidRzr News and Reviews

Some good news is coming right around the corner and looks like we are finally going to see what these devices look like. 

 

http://www.slashgear...-more-14341133/

 

nexusae0_moto_thumb.gif

 

moto-invite-2-803x420.png

 

moto-invite-600x342.png

  138 Views · 1 Replies ( Last reply by livinginkaos )

 Photo

Qualcomm SOC Vulnerability Found, Affects Many Android Devices

07 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

UPDATE: Dan has gone on record and stated that neither LG nor Samsung devices can be bootloader unlocked with this method.  Period, dot, the end.

 

UPDATE 2: Qualcomm has now issued a statement that they are aware of this vulnerability, and that they have released a patch to device manufacturers.  

 

     Beware, major geek speak lies ahead.  Security research extraordinaire Dan Rosenberg, aka djrbliss, made a presentation at the Black Hat security convention yesterday that, to put it mildly, is kind of a huge deal.  He showed that it is possible to exploit a vulnerability within the TrustZone of a device running a Qualcomm SOC to either unlock or circumvent a secure bootloader.  Then he proved the concept by unlocking the bootloader of a consumer version Moto X.  I'll let that sink in for a second...      

 

     Still with me?  Okay, I'm not going to get into a serious discussion of how this works, because frankly I don't completely understand it. But I'll attempt to break it down as simply as I can.  Any device that is powered by a Qualcomm SOC, including most every flagship Android device produced within the past year, utilizes what is referred to as the TrustZone, which acts as an intermediary between the kernel and hardware and regulates what are trusted apps and commands, and what are not.  Things are broken down even further into what is considered the secure and non-secure sides of the device.  The non-secure side includes the Linux kernel, the Android operating system, and most every app on your device.  On the secure side, you have what is called the Trusted Execution Environment, which in Qualcomm land is called the Qualcomm Secure Execution Environment.  This secure side of the house has access to absolutely everything on your device, both in terms of hardware and software, such as the Qfuses that dictate whether some of your devices' bootloaders are locked or unlocked.  What Dan was able to do was find a vulnerability that allows code to be executed from within that secure side, allowing him to bypass or unlock a secure bootloader.  What devices does this affect? The Moto X, HTC One, Samsung Galaxy S4, and LG G2 to name a few.          

     Now comes the part where I dash everyone's hopes for a Utopian land where locked bootloaders are a thing of the past.  First of all, Dan was able to exploit this onstage at Black Hat, but he has not released the details of exactly how he did it.  So there is currently no exploit in the wild to allow anyone to do this.  Secondly, if an exploit is ever released, there's a good chance it will be patched very, very soon.  So if you have a current Android phone running a Snapdragon SOC and are hoping to profit from this, avoid any OTA updates like the plague.  Finally, the Galaxy S5 and HTC One M8 have already had this vulnerability patched, so no love for owners of those devices.  Dan's paper explaining the details of the vulnerability can be found below.  

 

Source: XDA, (thanks SamuriHL, shane1, and cmh714!)

  369 Views · 9 Replies ( Last reply by KaChow )

 Photo

Hashcode Gets a New Job

06 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  hashcode_400x400.png   182.68K   12 downloads

 

     Many, many of us have profited from this man's work.  Now Hashcode has taken a job with the Linaro Mobile Group, and has decided to take a step back from several of his Android development projects.  In his own words:

 

"Today is an exciting day in my very tiny corner of the universe! I formally accepted a job offer as Engineer with Linaro's Mobile Group (https://wiki.linaro.org/LMG). My first assignment will be working as part of a team to introduce needed changes in the Android OS to support Project Ara (http://www.projectara.com).
 
Obviously, this is a huge opportunity. But also a very challenging task.
 
Over the last 3+ years, I've been working 2 jobs. During the day, I work with clients to solve business related problems via custom software solutions and at night work on Android projects ranging from device support, kernel development, CyanogenMod maintainer duties and Safestrap recovery. It has been an incredible learning experience, but at times it can also be draining. This setup might work due to the flexibility of my job as a consultant where I can determine my own working hours. However, it's not fair to Linaro or my team if I continue this way.
 
This means that I will be stepping away from much of my community development efforts. Affected projects include: Kindle Fire device support, Safestrap recovery and my maintainer duties at CyanogenMod. I hope to find some replacement developers for many of these projects so they can continue to live on.
 
Please don't misunderstand the above to mean: I don't support open source development, or that "I've given in to the man." Linaro is a huge proponent of open source and upstream contributions, and hopefully much of the work I'll be doing will end up in public repos.
 
Lastly, I wanted to say thank you. Over the last few years, I have chatted, emailed, responded to you in forums and you treated me with respect and have shown me a lot of love over the years. It has been a pleasure.
 
TL;DR: I'm making a huge career change and I want to be 100% focused on it. To that end, I'm going to step away from many very time consuming community Android projects."
 
Please join me in wishing Hashcode well in his new career!  Any G+ users who want to say thanks to him directly can do so HERE
 
Source: Hashcode via G+ (thanks Kaos!)

 

  280 Views · 4 Replies ( Last reply by mrlolli )

 Photo

PSA - Update Rolling Out for VZW Galaxy S5, Breaks Root Access

01 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  samsung-galaxy-s5-brilliant.png   282.27K   21 downloads

 

     Consider this your warning.  An update is rolling out for the VZW Galaxy S5, that along with a host of bug fixes, is apparently also breaking root access.  Reports are coming in that not even towelroot is able to restore root access after taking the latest update.  The update, which is designated KOT49H.G900VVRU1ANE9, also adds a few new features, such as the ability search for downloaded apps through the stock file manager.  The update does not upgrade the Android version, which remains at 4.4.2.  So to anyone who wants to keep root access on their device, steer clear of this one for the time being.  More details of what is contained in this update are HERE.

 
Source: Android Authority

 

 

 

 

  442 Views · 18 Replies ( Last reply by SamuriHL )

 Photo

Another Ugly Android Security Vulnerability

29 Jul 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  bad-android-420x215.jpg   13.99K   22 downloads

 

You really didn't think that my first story in over a month would be good news did you?!?  Researchers at Bluebox have discovered a security vulnerability within Android that could allow malicious code to infect nearly any app on your device.  In a nutshell, Android allows for a variety of security certificates that verify the authenticity of an app, including self-signed certificates that aren't issued by a digital certificate authority.  However, there is another type of certificate, referred to as a hard-coded certificate, that gives the associated app elevated permissions, such as the ability to inject code into other apps.  The main three that have been referenced that use this type of certificate are Adobe, which most likely uses this to allow Flash to act as a plug in for other apps; 3LM, which is a service used on Motorola, Sony, HTC, Samsung, and LG devices among others that can install apps and control system settings; and Google Wallet, which uses the hard-coded certificate to provide secure access to NFC.  The problem is that Android does not verify the authenticity of the security certificates that act as intermediaries between the apps in which code is injected and the original hard-coded certificate that allowed the code to be injected in the first place.  So essentially, an attacker can sign a malicious app with a security certificate that appears to be signed by the original hard-coded certificate but actually isn't, and this will never be cross-checked by Android.  The bottom line is that this is yet another way in which an attacker can gain full access to your device and steal your personal stuff.  Google says they have released a patch to address this, with Motorola being the only manufacturer that has begun to push the patch out so far.  More details about the vulnerability, as well as a link to an app that can determine if your device is vulnerable, can be found HERE.  

 

Source: PCWorld.com  

  403 Views · 8 Replies ( Last reply by RikRong )

 Photo

2013 DROID line 4.4.4 change log

14 Jul 2014

Posted By Thach in DroidRzr News and Reviews
Well now that we've begun receiving 4.4.4 for the Droid line, the change log has been posted. It may disappoint some to see that the dialer is still the same. This is actually a requirement that Motorola has to follow. I've attached a screen shot proving that.

But other things have changed and Motorola has posted the logs. Hope everyone enjoys the long awaited update.

Attached File  uploadfromtaptalk1405384013449.jpg   24.31K   67 downloads
Attached File  uploadfromtaptalk1405384025767.jpg   107.32K   73 downloads
Here is the post I spoke of in regards to the dialer.
Attached File  uploadfromtaptalk1405383964136.jpg   70.66K   43 downloads

  591 Views · 0 Replies

 Photo

2013 Droid Line soak test

07 Jul 2014

Posted By Thach in DroidRzr News and Reviews
On Friday, 4 July 14, soak test emails began going out to 2013 Droid owners. If you remember, this line is still on 4.4 and is said to be making a big jump straight to 4.4.4. Because of this, I'm guessing this is going to be a pretty extensive soak test instead of the quick push and done that we've seen in the past. That's if this soak is for 4.4.4 and not just some quick patch to get ready for it. I could be very wrong on that and only time will tell. Either way, its nice to hear some news on this.

Source: Motorola Feedback Network

Attached File  uploadfromtaptalk1404778736621.jpg   108.03K   30 downloads

Sent from my Droid MAXX

  593 Views · 5 Replies ( Last reply by SamuriHL )


Latest Discussions

Site Navigation

Website Poll

Poll: RAZR HD/M KitKat Unlock (108 member(s) have cast votes)

Since root and unlock were found for KitKat on the HD/M, have you unlocked?

  1. Yes (73 votes [65.18%])

    Percentage of vote: 65.18%

  2. No (5 votes [4.46%])

    Percentage of vote: 4.46%

  3. Considering it...i.e. living dangerously waiting for the exploit to be closed again :) (3 votes [2.68%])

    Percentage of vote: 2.68%

  4. I was unlocked previously with motopocalypse (27 votes [24.11%])

    Percentage of vote: 24.11%

  5. i have a developer edition so I've been unlocked (4 votes [3.57%])

    Percentage of vote: 3.57%

Vote Guests cannot vote

  • 417,860 Total Posts
  • 103,764 Total Members
  • Unknown11 Newest Member
  • 5,690 Most Online

1241 users are online

400 members, 841 guests, 0 anonymous users   (See full list)


chasr, Google, Bing, j10rosa, chiahead52, budlight082684, Yahoo, cmh714, jtelander, kijoko, xKroniK13x, Gblake13, tpfries, jtarrants, Alexa, B.E.McAllister, paradox60660, Z32CM, timpohladthomas, gt6061t6, danifunker, lpspecial7, Nagaro, rcb0499, bingo6104, mkayers, jtakers, GTIM2L8, cdrice15, jdcrae, thetoolbox, soocold, RangeRat125, alfonsopyro, SQTierhog, Google Mobile, INTERCELULAR, aksaunders, wolf44, natethepaintman, bengone1, DVDDave, selland74, sk8ingdroid, johnthehillbilly, oneman84, nme1, bigdasmith69, cmac93hatch, wedgey14, jamminjon82, wbmanx, fflint, shadowboxer, prometh, BadAzzBionic, lgoptimusv5, cyrixleong, RedVR6, watson387, pothole, ralphrichard, skeetch79, llawen, tomv5314, garywojdan81, jackr, Darkchilde, retRon, nu2droid, Kaijikun, godofthunder, deduct, Shinare, slaffoon, lovemyram4x4, foxkat, Einsteindks, Mr-Glass, big0013, dreamjaeil, parawood, jmwhitty, nobe1976, paulsilvan, BoulderStu, The_Chupacabra, silvrbullt1, fxwrangler, maddog0331, mkarps, s.dubs, Obsidian, magikx21, vdubdan87, thehappycannibal, mandragora, Unknown11, Staf_in_Wah, Devilalwayscries, polar135, hedwig34, const, AAAAAAAAAAAAAAA, shane1, Jdeere1971, Ian.anindya, Dreams_of_CEH, BrknScrn, Vicious1, Y-Man, buckeyestilidie, D000D, avitas, Boarder277, Grettski, geekabilly, chriskan, pjgraber03, livinginkaos, Scooterman7, wyld, BlackBoots, VerizonLover, speedcan, ecentell, gtg420i, wellsasw, ToolsCake, romeoz, CptSashimi, castrodedon, moejoe88, jthompson122183, kyanil, thaijunk, Thach, SamuriHL, 4ndr01dpilot, joeypro24, masterc333, FlyOnTheWall, ankis225, kyle1329, Xenofx, NoClue48, rbrill177, dex741, RoWilJr, purpleblueblue, useltonm, viper8u2, sfg, puterdad1, perceval, zepman_us, corrsfan99, billy0319, cbrady1981, RikRong, jwc553911, fadeds, tcrews, mrlolli, jfarkas, EliC, chrisp6825, SnydersWeb, nefir, slogar25, migzbionic, Aldroid33, Mange, Zack, smokestace, gadjetman, kamaromike, KaChow, trink746, parson, bobross82, linuxgator, jimgfitzgerald, Agoofydiver, desertfoxx, vze3dh95, sud2020, livlif2fullest, Fasty, lifeasadroid, Quietcowboy, lewwill, jlstark1, mjs27541, dres, BubbleSort, hodgewdm, rjh2196, sherri, morrisr3nd, alk195, matjmonk, Sergy82, twinkyz1979, dolfns99, meabrams, onewire, blindman, grgguy, towbiz, TjNaps27, Pur3vil, iceeyes, nprevette420, airbusacft, mike-f, bad73mav, Cavemanofmo, dandreat, x60centenergyx, barkleyfan, montesn, houch80, raymondrbowman, Kevin108, jibroney, dmbtimmyb21, TJH0188, Willington, james, marleyinoc, dautley, retromad, Furthestprism, Atomicdsm, SonicJoe, mstilson153, DroidXJ, Rapitharian, eleven, brianmagicr, CruzIzcaredoNotn, ej1911, Seaxulf, alames, altspeed, NAKAMONIEL, kr8os71, alamd, razr-totin-Jim, csclyde2121, notbitter, LaurelRaven, hammerhead, ryan8r, ordiesep88, silver02, dvgb131, BKiv, meat-rack, nine5raptor, wakeboredb, DeJaVu74, karthakon, Narffran, scottgti, RzrMike, AndroidSoldier, clydei, dizturbd2, abuttino, beyedup, skapernicus3, kitjhanna, jtapczynski, amnesia, MattCHowell, VingInMedina, zamik, jdjbmedina, skebner, Captain Crypto, lovedgor, jco23, sommerlou, drueter, dbm2321, bdavid, looneybin, elcabo1989, GeekyDad, Ethan82691, fishingsetx, dwh2o13, semiconformist, huff825, chdwrk, eknight22, Android_michael, jhon357add, MariuszO, dschuett, pmbarrontx, aarons100, jayrod, drizzzzzz, mamawm, King Howie, HOOKEDONDROID, crashx2, esothan, extirpate, jhax, omahamatt, bengaldude, topshot17, Fireward71, lcas26, Pinnacle, LDubs, Clegs, smileythom, rishie, markarr, chengmania, 7eregrine, kpsullzz, scotsd01, pt111guy, frankvii, mapple42011, brkelley, dstearle, Dave12308, grunt344, adlx, hidakachi, NWKENT, picturepatti, DroidDetective, almondman, kiwicanoeboy, jvargas, dinger4u, mdcowby, dduncan55330, phathernature, EmericanX, MyStro023, ksbks, sukenz46, ibolski, vanderrlei, khanusma, Esa, JustAGuy, cl72421, tucstwo, droidian1441, eye__dea, adminxxx, NTwoO, larrydean78, imhotev, BBB, sasa12, sspartan, Memnoch73, dwhisent, klabit87, Erievon, terminator1983, Joshrodg, dctrbnsttr, Tommy-Ka, reuelkeiser, sparky697, mozart, dexterityy, user042048, Fetchman, onemotodroid, Kagezuki, muscledroid, zeeryan, comiskeybum, androidlearner, Kitsune, Medany, HairedBelly, Tom in Bristol, bweN_diorD, bankrobber, Henry0964, droidfan, sublime, kanagadeepan, 07734dan, werox709, kellym, tlj000, chinkster, smithfolk4, jbr, lash444


Portal v1.4.0 by DevFuse | Based on IP.Board Portal by IPS