Feeds

Hackers root Motorola Droid

These are not the Droids you are hacking for

The Power of One Infographic

Updated Hackers have successfully rooted Motorola's Droid smartphone, allowing users to install applications or services of their choice outside the set menu offered by operators.

A hardware modder, rejoicing in the name Zinx Verituse, has developed and published a Droid rooting exploit. Instructions on how to break open Droid smartphones, along with links to the exploit were posed on an Android forum, Wired Gadget Lab via CRN reports.

Once rooted, smartphone users gain administrative privileges and thus the ability to download widgets, add applications, or otherwise customise their phone. The procedure carries a risk of rendering a device inoperable or disabling features. Attempts to tamper with the phone void Motorola's warranty and run against terms of service agreements.

An earlier version of this story compared the process of rooting droids to jailbreaking iPhones in order to bypass Apple's software lock-down and allow the installation of applications not licensed by Apple. Not so.

An option (explained here) on Droid phones already allows non-market applications to be installed.

Rooting the Droid allows users to take complete control of the smartphone. This allows users to add functionality such as tethering for free, install non-Android applications, copy applications, disable automatic updates, or add multi-touch support.

The Droid is distributed by Verizon Wireless in the US. A slightly modified version, known as the Motorola Milestone, was released in Germany and Italy last month. It's unclear whether the rooting hack works on the modified device. ®

Bootnote

Thanks to Karl Koscher and Jason Porter for each dropping us a note explaining what Droid rooting means and how it differs from jailbreaking iPhones.

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.