On Thu, May 28, 2009 at 9:45 AM, lbcoder <[email protected]> wrote:

>
> On rooting/root lock;
> This is designed to prevent regular users from *accidentally* typing
> something like "su" followed by "rm /* -rf". This is not a piece of
> fruit, these devices are specifically designed to make it easy,
> reliable, but non-trivial to gain full control.
> Proof:
> 1) first engineering bootloader for Dream was found on a consumer
> device sold by tmobile prior to availability of ADP1.
> 2) rc29 nbh file was mysteriously "leaked",
> 3) magic shipped with FASTBOOT enabled - why?
> 4) some magic's shipped with ROOT ENABLED - why?
>

FYI since I've been neck deep in most of these I can add a bit :) ..

#3 was clearly unintentional - you cannot -flash- an unsigned image. Nobody
tested -booting- one. (Oops.)
#2 is no mystery - there are people in the various companies with access to
images and a willingness to pass them out.
#1 is probably a refurb mixup with a google testing device (way to go, but
it happens.) Send it in for (eg) bad keyboard, they swap the hw, do a
recovery-wipe and send it out. (It -was- interesting luck that it landed on
a hacker, but it was definitely a refurb unit rather than new.)

And I haven't heard of #4 - do you have more info?

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Android Discuss" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/android-discuss?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to