On Thu, May 28, 2009 at 9:45 AM, lbcoder <[email protected]> wrote: > > On rooting/root lock; > This is designed to prevent regular users from *accidentally* typing > something like "su" followed by "rm /* -rf". This is not a piece of > fruit, these devices are specifically designed to make it easy, > reliable, but non-trivial to gain full control. > Proof: > 1) first engineering bootloader for Dream was found on a consumer > device sold by tmobile prior to availability of ADP1. > 2) rc29 nbh file was mysteriously "leaked", > 3) magic shipped with FASTBOOT enabled - why? > 4) some magic's shipped with ROOT ENABLED - why? >
FYI since I've been neck deep in most of these I can add a bit :) .. #3 was clearly unintentional - you cannot -flash- an unsigned image. Nobody tested -booting- one. (Oops.) #2 is no mystery - there are people in the various companies with access to images and a willingness to pass them out. #1 is probably a refurb mixup with a google testing device (way to go, but it happens.) Send it in for (eg) bad keyboard, they swap the hw, do a recovery-wipe and send it out. (It -was- interesting luck that it landed on a hacker, but it was definitely a refurb unit rather than new.) And I haven't heard of #4 - do you have more info? --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Android Discuss" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-discuss?hl=en -~----------~----~----~----~------~----~------~--~---
