My reading comprehension skills may be a little off but from what I gather here is that you can root using old methods but just making sure you use an updated CWM? I'm not sure if I should try it or not. Does this make sense to you guys?
http://galaxynote3root.com/galaxy-note-3-root/how-to-root-galaxy-note-3/
dylancam90 said:
My reading comprehension skills may be a little off but from what I gather here is that you can root using old methods but just making sure you use an updated CWM? I'm not sure if I should try it or not. Does this make sense to you guys?
http://galaxynote3root.com/galaxy-note-3-root/how-to-root-galaxy-note-3/
Click to expand...
Click to collapse
According to the article, Still requires you to be on KitKat for Verizon.
Locked bootloader. No custom recovery - CWM. Don't try it.
Reilly1812 said:
Locked bootloader. No custom recovery - CWM. Don't try it.
Click to expand...
Click to collapse
but can you use apps which require root? I dont really care much about the custom recovery or locked bootloader. so this guide allows that?
robotnikman said:
but can you use apps which require root? I dont really care much about the custom recovery or locked bootloader. so this guide allows that?
Click to expand...
Click to collapse
That guide is ancient and not applicable. You can only use root apps as intended if you have root. If KK 4.4.4 or Lollipop then no root and currently no way to get it. There is no downgrade to any rootable version if you are running 4.4.4 or above. I was happy to stay rooted with 4.3.
And we wonder why boot loaders are locked these days.
I'm hoping this exploit...
https://www.kb.cert.org/vuls/id/155412
in Swiftkey impacts our Note 3s with 4.4.4 and L.
(So sad to hope for holes in your phone so you can have freedom)
Edit:
https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/ ... Looks like it's all there to scoop up.
syserr said:
I'm hoping this exploit...
https://www.kb.cert.org/vuls/id/155412
in Swiftkey impacts our Note 3s with 4.4.4 and L.
(So sad to hope for holes in your phone so you can have freedom)
Edit:
https://www.nowsecure.com/blog/2015/06/16/remote-code-execution-as-system-user-on-samsung-phones/ ... Looks like it's all there to scoop up.
Click to expand...
Click to collapse
fingers crossed that it will be soon. I miss my root.
Just checked the "how to see if you are vulnerable" post/comment by a guy named Charlie (https://www.nowsecure.com/blog/2015...em-user-on-samsung-phones/#comment-2086888243)
If his method of checking is correct, NK1 would be considered vulnerable to this exploit. One step closer.
doesnt look like 5.0 has the vulnerability but from what ive read we can downgrade to nk1, hopefully
ncsuwolfs said:
doesnt look like 5.0 has the vulnerability but from what ive read we can downgrade to nk1, hopefully
Click to expand...
Click to collapse
In LP, it's actually at /system/app/SamsungIME/SamsungIME.apk
Euroca!
CONFIRMED! 4.4.4 NK1 is vulnerable, we can use this Exploit
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
xXArisXx said:
CONFIRMED! 4.4.4 NK1 is vulnerable, we can use this Exploit
Click to expand...
Click to collapse
@hsbadr any idea if you could implement this?
gr8nole said:
In LP, it's actually at /system/app/SamsungIME/SamsungIME.apk
Click to expand...
Click to collapse
Actually yes! Vulnerability available in Lollipop
Its an old phone try cyanogenmod installer
Sent from my SM-N910V using XDA Free mobile app
israfm said:
Actually yes! Vulnerability available in Lollipop
Click to expand...
Click to collapse
So what can we do with this vulnerability right now?
no one can use this ????????????? great
teejaymarx said:
@hsbadr any idea if you could implement this?
Click to expand...
Click to collapse
VZW Note 3 all Android versions (4.4.4 NJ6/NK1 & 5.0 OB6) are vulnerable. However, this gives SYSTEM (uid=1000) not ROOT (uid=0) access. SYSTEM user is capable of writing to many places on the file system, and this makes it easier to implement a weaponized ROOT exploit, if/when available.
hsbadr said:
VZW Note 3 all Android versions (4.4.4 NJ6/NK1 & 5.0 OB6) are vulnerable. However, this gives SYSTEM (uid=1000) not ROOT (uid=0) access. SYSTEM user is capable of writing to many places on the file system, and this makes it easier to implement a weaponized ROOT exploit, if/when available.
Click to expand...
Click to collapse
Do you know if this exploit is able to allow me to remove bloat ware for now, until full root is avail?
teejaymarx said:
Do you know if this exploit is able to allow me to remove bloat ware for now, until full root is avail?
Click to expand...
Click to collapse
You don't need root access to block bloatware; use this tool!
Related
As the title says, when can we expect root access using VROOT for our devices?
I know there are ways around it but it involves wiping/formatting data and reverting to the old firmware.
For those who have locked bootloaders and do not wish losing data and formatting, when can we expect a simple click & root method?
Ps. I'm gutted I updated to the latest 257 update. I don't see any major differences at all. Worst of all I've lost root and I'm not prepared to gain root access with current solutions...
Thanks xda deveoper users.
kanej2006 said:
As the title says, when can we expect root access using VROOT for our devices?
I know there are ways around it but it involves wiping/formatting data and reverting to the old firmware.
For those who have locked bootloaders and do not wish losing data and formatting, when can we expect a simple click & root method?
Ps. I'm gutted I updated to the latest 257 update. I don't see any major differences at all. Worst of all I've lost root and I'm not prepared to gain root access with current solutions...
Thanks xda deveoper users.
Click to expand...
Click to collapse
Well i'm not expecting anything soon. even DoomL0rd hasn't found the workaround. I was prepared though, so i moved the Titanium Backup data and restore them all (the games) and then backup them again with Helium app. So if you like to try, please use Helium app to do backup and then do the alternate root method. It will make it easier for you.
kanej2006 said:
As the title says, when can we expect root access using VROOT for our devices?
I know there are ways around it but it involves wiping/formatting data and reverting to the old firmware.
For those who have locked bootloaders and do not wish losing data and formatting, when can we expect a simple click & root method?
Ps. I'm gutted I updated to the latest 257 update. I don't see any major differences at all. Worst of all I've lost root and I'm not prepared to gain root access with current solutions...
Thanks xda deveoper users.
Click to expand...
Click to collapse
You don't need to wipe any data when reverting, upgrading.
Bad news guys, vRoot has been confirmed as an imei harvester, I'd get it off your systems ASAP.
http://forum.xda-developers.com/showthread.php?p=47228566
Sent from my C6833 using XDA Premium 4 mobile app
SweFox said:
You don't need to wipe any data when reverting, upgrading.
Click to expand...
Click to collapse
Good, I shall now revert to the previous firmware so I'm able to root. Currently unable to live without a rooted device. :laugh:
kanej2006 said:
Good, I shall now revert to the previous firmware so I'm able to root. Currently unable to live without a rooted device. :laugh:
Click to expand...
Click to collapse
I agree, Android without root aren't fun at all.
Just remember to untick these 3
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Some people might say it's better to wipe but I didn't and my phone works flawlessly. Not saying there can't be issues but it's worth a try.
SweFox said:
I agree, Android without root aren't fun at all.
Just remember to untick these 3
Some people might say it's better to wipe but I didn't and my phone works flawlessly. Not saying there can't be issues but it's worth a try.
Click to expand...
Click to collapse
Too late, lost all data. ****.
After realizing how much confusion there is about root and customizations for our precious Z Ultra. I decided to remain on stock ROM unrooted. Itś annoying for sure not having root permissions of my own device but I rather stay on square stock than scary shady root/rom. Just hoping to see some exploit that will give me a FULLY TRANSAPARENT root.
magnusaaa said:
After realizing how much confusion there is about root and customizations for our precious Z Ultra. I decided to remain on stock ROM unrooted. Itś annoying for sure not having root permissions of my own device but I rather stay on square stock than scary shady root/rom. Just hoping to see some exploit that will give me a FULLY TRANSAPARENT root.
Click to expand...
Click to collapse
I wouldn't get your hopes up. Finding an exploit is usually the first port of call for a new device. However every dev on here and the Z1 forum has already rooted and installed recovery. So there is no need for them to work out another method of rooting.
Even though tools like 'vRoot' are possibly suspect, 90% of people have used this method, and if its bad, then we can not do anything about it.
-For those that don't want to use that tool, and never have... then you may never have root access..
-For those that have used the vRoot tool or a similar app, and now have 'unrooted' to try and be safe... ... well there is no real point in that. Once rooted, if they have your info... then they have it. Can't be taken away.
What I think... is that they have not stored our information.... that it was only read.
There is no real reason to store IMEI numbers. Nothing can be gained unless they want to release fake Sony Xperia Z Ultras, with our IMEI numbers. and considering the Ultra and Z1 its a specific device for a specific purpose... it doesn't make sense.
For a Samsung S4... i could understand..
magnusaaa said:
After realizing how much confusion there is about root and customizations for our precious Z Ultra. I decided to remain on stock ROM unrooted. Itś annoying for sure not having root permissions of my own device but I rather stay on square stock than scary shady root/rom. Just hoping to see some exploit that will give me a FULLY TRANSAPARENT root.
Click to expand...
Click to collapse
You can root without vroot or kingoapp.
http://forum.xda-developers.com/showthread.php?t=2490613
I did it and it works.
magnusaaa said:
After realizing how much confusion there is about root and customizations for our precious Z Ultra. I decided to remain on stock ROM unrooted. Itś annoying for sure not having root permissions of my own device but I rather stay on square stock than scary shady root/rom. Just hoping to see some exploit that will give me a FULLY TRANSAPARENT root.
Click to expand...
Click to collapse
Backup TA then unlock bootloader and flash a trusted superuser app from custom recovery. Job Done.
Leechoonhwee said:
You can root without vroot or kingoapp.
http://forum.xda-developers.com/showthread.php?t=2490613
I did it and it works.
Click to expand...
Click to collapse
But you will lose your TA partition and your DRM keys if you unlock your bootloader before rooting
blueether said:
But you will lose your TA partition and your DRM keys if you unlock your bootloader before rooting
Click to expand...
Click to collapse
Yep... and if I had of done that... my device would have been a nice brick to start an expensive house.... ouch!
hamdogg said:
Yep... and if I had of done that... my device would have been a nice brick to start an expensive house.... ouch!
Click to expand...
Click to collapse
Have you gotten your ZU back now?
LordManhattan said:
Have you gotten your ZU back now?
Click to expand...
Click to collapse
No mate... average service!
They have had it just over two weeks. I sent an email and they said they will hurry the service center up.
FYI: www.buybuybox.com
Obviously wont be buying from them again.
hamdogg said:
No mate... average service!
They have had it just over two weeks. I sent an email and they said they will hurry the service center up.
FYI: www.buybuybox.com
Obviously wont be buying from them again.
Click to expand...
Click to collapse
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Take your helicopter (i know you have one behind some bushes) and kick some ass!
LordManhattan said:
Take your helicopter (i know you have one behind some bushes) and kick some ass!
Click to expand...
Click to collapse
I wonder if the airforce would mine if i used their latest and greatest??
hamdogg said:
I wonder if the airforce would mine if i used their latest and greatest??
Click to expand...
Click to collapse
What, we have an airforce again?
blueether said:
What, we have an airforce again?
Click to expand...
Click to collapse
yeah we have the NH90s... but only a few. They are a nice kit... but still made in 1979 so... yeah there's that
Dear All,
We just rooted the Note 3 Model number SM-N900T, version 4.4.2. please have a look at the attached image..
View attachment 2616246
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Here I made very simple guide to Root your Note 3, if am right this will work almost all the Note 3... 100% safe method..
Rooting Steps
1. Preferred adb tool on the computer, and have installed adb drivers..
You can install the driver thru the tool..There is option called USB in the tool click there and select option called Driver Scan this will find your phone driver, please enable the USB debugging on your phone before scanning.. USB Driver Scan feature to attempt to automatically construct and install a driver for your device. You do not need the Android SDK. IF not install the driver manual..
2 Please download the attached tool.. Once the Download is done please extract the same and kept it ready.... Mac and Linux user post over the thread I will update that too...
Windows Tool link ( http://bit.ly/1l58VcH )
3 on your phone Settings - Developer option - Enable the USB debugging
4 on your phone Settings - Security - Allow unknown source file install
5 Connect your phone to Computer, using usb cable.. (Wait for 30 seconds)
6 Open the extracted folder and double click the Impactor file..
7 Now click on Start this will start the process.. it will root your phone in 30seconds..
8 Reboot your phone, install the Root checker apk from google play store.. Verity the root access.
Credits - Giantpune.
If you wish buy me a Beer & Click Thanks button..
Invalid Image Attachment.
What do u mean by 100% safe method ? Knox tripping safe ?
How this going to affect Knox??
Added
Image Added...
This will not brick your phone at any cost..
nlatifolia said:
Invalid Image Attachment.
What do u mean by 100% safe method ? Knox tripping safe ?
Click to expand...
Click to collapse
Will it trip knox? Any info if it may work on the n9005?
Give a try
Bro you can give a try.... if am right it will
vash_stanped said:
Will it trip knox? Any info if it may work on the n9005?
Click to expand...
Click to collapse
jacksparao said:
Image Added...
This will not brick your phone at any cost..
Click to expand...
Click to collapse
If it's involving some kind of custom recoveries then I think at some point it could brick someone's phone. CMIIW.
Tried
I tried with many different image which we make for us... Truth I did the experiment to brick... but i'm not able to brick my phone..
If am right this tool is Safe...
nlatifolia said:
If it's involving some kind of custom recoveries then I think at some point it could brick someone's phone. CMIIW.
Click to expand...
Click to collapse
Can anyone confirm that it works on N9005?
You can try
You can give a try...
Extended2108 said:
Can anyone confirm that it works on N9005?
Click to expand...
Click to collapse
jacksparao said:
You can give a try...
Click to expand...
Click to collapse
what can happen in the worst case? Brick?
Thanks, so it is likely to work but also trip knox or it wont trip knox? I'm on the troublesome mj7 where root de la vega doesn't work without tripping knox flag
Signature bugs unavailable
I tried it on the SM900T running 4.4.2 and it didn't work. It said signature bugs unavailable.
Based on this
http://www.saurik.com/id/19 and http://www.cydiaimpactor.com/
but most probably new versions of android has this bug closed...
EDIT: 4.4.2 bugs closed as stated here http://forum.xda-developers.com/mot...cript-root-moto-x-root-script-locked-t2603051
Your right
The tool was working most of the android tools..
jcespi2005 said:
Based on this
http://www.saurik.com/id/19 and http://www.cydiaimpactor.com/
but most probably new versions of android has this bug closed...
EDIT: 4.4.2 bugs closed as stated here http://forum.xda-developers.com/mot...cript-root-moto-x-root-script-locked-t2603051
Click to expand...
Click to collapse
Why is the O.P avoiding the question of whether this will trip knox or not?
Sent from my SM-N9005 using xda app-developers app
supasye said:
Why is the O.P avoiding the question of whether this will trip knox or not?
Sent from my SM-N9005 using xda app-developers app
Click to expand...
Click to collapse
I'm willing to test 4.3 build MK2, I don't care about knox anymore.
I'll keep you posted.
EDIT Didn't work. Signature bugs unavailable.
root
I hope the tool I'll root your phone
oddbehreif said:
I'm willing to test 4.3 build MK2, I don't care about knox anymore.
I'll keep you posted.
EDIT Didn't work. Signature bugs unavailable.
Click to expand...
Click to collapse
I guess we have to wait for signature bugs to be supported?
mcook1670 said:
I guess we have to wait for signature bugs to be supported?
Click to expand...
Click to collapse
Unlikely. Once they've been patched they're not going to un-patch them.
Confirmed working root method made by chainfire.
OS Version: 4.4.2
Build:KOT49H.T337TUVU1ANF4
Model: SM-T337T
Kernel:3.4.0 date-jun 18
Download: http://download.chainfire.eu/462/CF-...mo-smt337t.zip
Instructions: http://autoroot.chainfire.eu/
This did trigger KNOX however SuperSU disabled it.
Towelroot does the same for the 337a without tripping knox bit. Did it not work for the 337t?
Unless its been updated, i tried about a week ago and and it wouldmt work on the 337t
Sent from my Nexus 5 using XDA Free mobile app
would reflashing stock bootloader and recovery reset the KNOX?
Sent from my Nexus 5 using XDA Free mobile app
HighRidas said:
would reflashing stock bootloader and recovery reset the KNOX?
Sent from my Nexus 5 using XDA Free mobile app
Click to expand...
Click to collapse
No, unfortunately once knox is tripped, it can't be reset. I'm pretty sure the 337 a and t are identical except for bloat and frequencies and I just used towelroot on mine today. Mines the a
I get "your device is not supported" what mod strings did you use Ive tried a few with no success. also, what kernel are you on ive read the some kernels (may 2014) worked but the one I have (jun 2014) did not
My kernel is here. Didn't use any special strings, just downloaded, installed and pushed the make it rain button.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I went into SuperSU after I rooted my SM-T330NU with CF-Auto-Root and it asked me if I wanted to disable knox - I said yes and it disabled it. I also installed Wanam Xposed and used the Security Hacks feature and Faked the system status to be set to "Official". I also deleted several of the knox system apps with Rom Toolbox Pro and it works great. I can still get OTA update from Samsung and no knox messages and knox is not tripped.
when t-mobile tab 4 was released it had a newer baseband n kernel than the other tab 4 devices, thats why towelroot doesn't work on it.
this was discuss in this thread, http://forum.xda-developers.com/tab-4/help/sm-t337t-looking-root-method-t2853724
Does this method alow install custom recovery on t330nu?
I used towelroot and got root access but no luck with a custom recovery such as cwm or twrp would this help or is there any way for custom recovery on t330nu?
Leonidas87 said:
Does this method alow install custom recovery on t330nu?
I used towelroot and got root access but no luck with a custom recovery such as cwm or twrp would this help or is there any way for custom recovery on t330nu?
Click to expand...
Click to collapse
I'm not aware of any recovery for any of the 8" Tab 4 models.
If you root and an recovery becomes available (someone needs to make it) you should be able to install it.
raitchison said:
I'm not aware of any recovery for any of the 8" Tab 4 models.
If you root and an recovery becomes available (someone needs to make it) you should be able to install it.
Click to expand...
Click to collapse
This method only works for the t337t. Chainfire makes all of his root methods by Model and uses stock recovery
8" recoveries should be on their way soon.
Source files have been found and recoveries are in the making.
Leonidas87 said:
Source files have been found and recoveries are in the making.
Click to expand...
Click to collapse
any updates for the recovery yet? Thank you inn advance
thealbundy said:
any updates for the recovery yet? Thank you inn advance
Click to expand...
Click to collapse
We have a few developers looking into it. We have distributed some necessary files for the device. Just need to be patient and work together. All is in motion as for a few days ago nothing was really in motion.
Everyone should stay positive, patient and in due time we should all be happy. All thanks and recognition will be made known upon completion. Thanks to everyone helping out great work so far.
Leonidas87 said:
We have a few developers looking into it. We have distributed some necessary files for the device. Just need to be patient and work together. All is in motion as for a few days ago nothing was really in motion.
Everyone should stay positive, patient and in due time we should all be happy. All thanks and recognition will be made known upon completion. Thanks to everyone helping out great work so far.
Click to expand...
Click to collapse
Thank you very much for this update. I can't wait till the custom recovery gets here for the t337t model
thealbundy said:
Thank you very much for this update. I can't wait till the custom recovery gets here for the t337t model
Click to expand...
Click to collapse
Any news for the custom recovery for the 8.0 yet?
pre4speed said:
Towelroot does the same for the 337a without tripping knox bit. Did it not work for the 337t?
Click to expand...
Click to collapse
Towelroot doesn't work on mine.
Sent from my SAMSUNG-SM-T337A using XDA Free mobile app
RootME for Nexus Devices
Old Picture from vers 1.0
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
RootME is a root program as the name suggests with your all Nexus devices can rooting. For example: Google Nexus 4/5/6/7/9/2013 and all Galaxy Nexus devices
Easy to Root.
Restore your Device?
Check this Thread: http://forum.xda-developers.com/showthread.php?t=2678390
Requirements:
Windows 7 / 8 / 8.1
Net Framework 4.0 "Here"
Download:
http://crymedia.de/?cry=downloads
You have a problem? reply here or use Contact
best regards Cryten
Website: www.crymedia.de
Projects: www.crymedia.de/?cry=projects
Facebook: www.facebook.com/CrytenMedia
This looks like the easiest method yet! Is this root method compatible with decrypting? Ik some people have been reporting that with certain root methods they lose root after decrypting and re rooting makes them re encrypt.
Xileforce said:
This looks like the easiest method yet! Is this root method compatible with decrypting? Ik some people have been reporting that with certain root methods they lose root after decrypting and re rooting makes them re encrypt.
Click to expand...
Click to collapse
I would also be interested in knowing this. I just decrypted and then rooted with Wugs NRT and it re-encrypted my device.
Looks like a nice way to root. I just had my Nexus 6 delivered a few hours ago. Sometime during this upcoming holiday weekend I will be unlocking the bootloader and rooting my new device. I might have to try out rootME. I'd like to hear some feedback from people that have used this method to gain root.
Astraeus85 said:
I would also be interested in knowing this. I just decrypted and then rooted with Wugs NRT and it re-encrypted my device.
Click to expand...
Click to collapse
If you decrypt then use fastboot to install twrp and flash SuperSU by chainfire you will stay unencrypted use the newest beta by chainfire.... Most of the root toolkits replace the kernel and it's back to encrypted that way
Sent from my Nexus 6 using Xparent BlueTapatalk 2
Astraeus85 said:
I would also be interested in knowing this. I just decrypted and then rooted with Wugs NRT and it re-encrypted my device.
Click to expand...
Click to collapse
Odd... After decrypting my device I then rooted and still shows that I'm Decrypted. You should try again
just tried this and it worked like a charm. great tool thanks for the hard work!!!
does no one trust OP or something? There are very few replies here...
jae2014 said:
does no one trust OP or something? There are very few replies here...
Click to expand...
Click to collapse
Lol
I was going to ask the samething
I rooted my phone the old school way...didn't use chainfires method or any tool kits.
jae2014 said:
does no one trust OP or something? There are very few replies here...
Click to expand...
Click to collapse
Possibly because most longterm nexus fans will root via ADB terminal on their PC and do it manually, also people still dont have devices yet.
Many download only and are too lazy to write an answer
Download counter: 17'433
best regards cryten
hutzdani said:
Possibly because most longterm nexus fans will root via ADB terminal on their PC and do it manually, also people still dont have devices yet.
Click to expand...
Click to collapse
That makes sense. I did find it kind of hard to buy my Nexus too.
Does bootloader need to be unlocked in order to use this root kit?
wessiide said:
Does bootloader need to be unlocked in order to use this root kit?
Click to expand...
Click to collapse
Yes. RootME root over CF-Root and this needed unlocked Bootloader.
just to let everyone know, nexus 6 is not listed as one of the rootable devices. check out screenshot. I've also downloaded the program but couldnt root my n6
khanh1289 said:
just to let everyone know, nexus 6 is not listed as one of the rootable devices. check out screenshot. I've also downloaded the program but couldnt root my n6
Click to expand...
Click to collapse
to add to this, i believe this installed a malware into my chrome. DO NOT INSTALL! I'm pretty sure about this one. Use CF auto root for fast and easy root.
hutzdani said:
Possibly because most longterm nexus fans will root via ADB terminal on their PC and do it manually, also people still dont have devices yet.
Click to expand...
Click to collapse
wrong. people use fastboot to root, not adb.
---------- Post added at 02:59 PM ---------- Previous post was at 02:55 PM ----------
Cryten said:
Yes. RootME root over CF-Root and this needed unlocked Bootloader.
Click to expand...
Click to collapse
root the device the right way, it takes about 4-5 minutes.
1. use fastboot while your in your bootloader and type.. fastboot oem unlock. this will unlock your bootloader.
2. fastboot flash a custom recovery.
3. flash the latest supersu in your new recovery.
4. reboot with root.
that's it, the right way.
Here we go
chris6278 said:
Here we go
Click to expand...
Click to collapse
where are we going? :silly: