Separate names with a comma.
Discussion in 'Droid X Roms' started by aliasxerog, Nov 2, 2010.
Pretty sure he's referring to the kinda root access we have now on the DX, but on 2.3
I loaded wireless tether for rooted and got a messae about the Linus Kernal. I went to their FAQ site and found this:
If the feature "CONFIG_NETFILTER_XT_MATCH_MAC" is missing the "access control"-feature will not work correctly (you will see a "failed"-status in "Show log" for "Enabling access control"). To detect if all kernel-option were enabled in your current kernel the following kernel-options should be enabled: CONFIG_PROC_FS, CONFIG_IKCONFIG, and CONFIG_IKCONFIG_PRO. This dumps the current kernel-config to /proc/config.gz.
Should I be concerned?
Just an idea, but can the same process be implemented as hacking the gaming consoles to play backup games? Basically they implement code prior to actual boot process that tricks the system to show it is a original game, but allows you to boot backups/homebrew apps & games.
No. None of the game consoles are Linux-y enough to run the kexec. The Wii has software mods you can use already. PS3 is basically soft-modded.
I may be wrong but I think he meant can we use the meathod the game consoles use to make the bootloader on the Droid X think its booting official software...
either way I still believe the answer is no as we don't know any of the security keys we would need to know.
Sent from my DROIDX using DroidForums App
A guy who got Ubuntu running on his Droid 2 had an idea of modding the bootstrapper to force boot something -- but that's as far as his musing went. I might be able to dig up the thread and put you in contact with him if he hasn't contacted you yet.
Yes...sorry I wasn't exactly clear enough. I had just been up for about 23 hours when I wrote the idea..lol. I guess the encryption has alot to do with it since gaming consoles don't need to be all that secure like phones do. But I do like to think as an optimist
The ps3 has a similar setup (in concept) to what we're working with here. It was hacked by somebody discovering the private key. If we had that, we wouldn't be discussing this.
Sent from my DROIDX using DroidForums App
would the same method root the new Kernel that rooted the 3.4.2 version that p3droid put out? i know it was Froyo but he couldn't root it and thought that it could help us root Gingi. Anyways if so that 3.4.2 version has been rooted.
Finally happened, and THIS is why they patched it to take away any easy method of getting root in the first place... (to those that are/were upset that Google/Moto would do such a horrible thing as patch their security flaws...
The Mother Of All Android Malware Has Arrived: Stolen Apps Released To The Market That Root Your Phone, Steal Your Data, And Open Backdoor | Android News, Reviews, Apps, Games, Phones, Tablets, Tips, Mods, Videos, Tutorials - Android Police
Yeah, I hate those !@%$ people that ruin the party for all the rest of us...
So this means that Google now needs to add an official way to root Android safely and securely, right?
im an old xbox hacker so i can probably explain this to you and i can possible explain why it wont work on the droid x
well pretty much the dvd drive has its own programming that the console software references when trying to see if a game is legit or not
so pretty much when team xecuter and C4Eva rewrote the dvd drive firmware they added code they knew you could add to the game's .iso file(IE ssv1,ssv2, and ssv3)
so pretty much the xbox dvd drives custom firmware looks for the original security files found on retail copies or the newly added ones(ssv1,ssv2,ssv3) to give the xbox the response its looking for to allow you to play the games
C4Eva and team xecuter can rewrite the dvd drive firmware because the dvd drive isnt locked down like our bootloaders are on the droid x plus the bootloader is the only way to load new firmware onto the device(kind of like how the xbox software relies on the dvd drives response to play the game or not)
hope this explains a bit
this just dawned on me but if we can find an exploit like the jtag exploit on the xbox 360 we might be able to run custom firmware without much hackery involved
pretty much what the jtag exploit is getting the device into engineering mode and rewriting the bootloader to not check for signatures
im pretty sure that this has been tried on this phone and older phones locked down like this(IE milestone) but its worth a shot(although i think this method has a better outcome)