Want to try out the Android 7.0 mini-game easter egg, but don't have Nougat yet? Check out the open source Neko Collector app, which brings the mini-game experience to all Android 4.0+ devices!
from xda-developers http://ift.tt/2dQ5vj0
via IFTTT
Want to try out the Android 7.0 mini-game easter egg, but don't have Nougat yet? Check out the open source Neko Collector app, which brings the mini-game experience to all Android 4.0+ devices!
If you're looking to run Android 7.0 on your original Moto X (that came with Android 4.2), XDA Senior Member Megatron007 has brought CM14 to the device. The bug list is pretty small, so check it out!
Google is constantly at war with hackers seeking to maliciously exploit security vulnerabilities in their products. Back in the middle of 2014, Google assembled a team of security analysts called 'Project Zero' to report zero-day exploits to the company so they can be patched before any nefarious third-party can take advantage of the undisclosed security hole. One such vulnerability, dubbed the 'Rowhammer' exploits, involves repeatedly accessing a row of memory to cause 'bit-flips' in adjacent rows of memory. This exploit occurs in some DRAM devices and can be used to gain read-write privileges to all of physical memory even within a user-space process.
Researchers from Carnegie Mellon and Intel Labs disclosed this bit-flip exploit in certain DRAM devices manufactured in 2012-2013. At the time, however, the researchers believed that Rowhammer was not readily exploitable due to it relying on "chance hardware faults" that were mostly repelled by adapting some advanced memory-management features. But in March of 2015, Google's Project Zero discussed possible methods of exploiting this DRAM vulnerability to gain kernel privileges, however they were unsure to what extent this vulnerability could be used on other machines or operating systems. It now appears that various Android devices from LG, Samsung, and Motorola are exploitable via a new proof-of-concept attack named 'Drammer.' The new attack demonstrates a reliable method of attaining root access from a user-space app without any permissions.
One of the security researchers responsible for the proof-of-concept, Victor van der Veen, states there isn't a "quick software update" that can protect users from these types of attacks. While the attack is not completely consistent on all of the tested devices, the success rate of the exploit is still alarming. So far, the researchers have stated they were able to root the Nexus 4, Nexus 5, LG G4, 2013 Moto G, 2014 Moto G, Galaxy S4, Galaxy S5, and the OnePlus One. To give you an idea of the exploit's consistency, the team states they were able to break into 12 out of 15 Nexus 5 smartphones that they tested. On the other hand, the team was able to successfully exploit only one out of two Samsung Galaxy S5 smartphones they could test.
The team has already disclosed the exploit to Google back in July of this year and were awarded $4,000 for their efforts. Since then, Google has been working on patching this critical vulnerability and informing Android OEMs on how to patch their devices. An update to patch this exploit is said to be included in the upcoming November security update. For those of you who have devices that will not be receiving the November security update, the researchers state that they will be publishing an application in the Play Store so you can test to see if your device is vulnerable.
The team has even uploaded a video to YouTube to demonstrate the hack happening on a Nexus 5 running Android 6.0.1 with the latest October security patches.
We've known for a while that Huawei is preparing to launch their flagship for the year, and that it will be called the Huawei Mate 9. We recently talked about how this is the perfect time for the company to introduce the smartphone to the market because of the issue Samsung has been having with the Galaxy Note 7. Huawei has already been taking some of Samsung's smartphone market share in China, and this launch will likely take more from them.
A couple of weeks ago Evan Blass leaked some small press renders that claimed to show the front of Huawei's upcoming smartphone. We didn't get to see much detail here since they were so small, but we did learn that Huawei was planning to launch two different variants of the device. The rumor indicated that they would be going the flat/curved route that Samsung has been doing with the Galaxy S series for a couple of years.
This weekend though, we learned some additional information about the Pro (curved) variant of the Huawei Mate 9. If the rumors are true, the Huawei Mate 9 Pro will have a 5.9″ 1440p display, Kirin 960 SoC, 4GB of RAM, storage ranging from 64GB to 256GB, Android 7.0 installed out of the box, it'll be Daydream VR ready, and a similar rear camera setup to what we saw earlier this year with the Huawei P9 (with improved sensors).
Later that day, Evan tweeted out some additional information about what his sources are telling him for this variant. He says the Mate 9/Pro will feature a 4X optical zoom thanks to its rear-facing camera setup. Not only that, but we're told the most expensive version of the Mate 9 Pro will be priced at $1,300. We saw a lot of complaints about how much Samsung decided to charge for the Galaxy Note 7, and saw more complaints about how much Google is charging for the Pixel and Pixel XL. So we ask you:
Do you think $1,300 is too much to pay for a smartphone that has 256GB of internal storage, top internals and a 4X optical zoom rear camera setup?
Over the years, LG has not built up the best reputation when it comes to manufacturer defects of their products. When the LG G3 was released, many people were having the plastic frame around their phone cracking in multiple locations. This likely happened from prying the plastic cover off the back to swap out a battery, but it could happen to others from a small drop even if it was in a protective case.
It took LG a while to publicly confirm this was a manufacturing defect, but after that people were still having trouble getting the company's customer support to admit it so they could get a replacement. Then there was the bootloop issue that happened to so many LG G4 customers since the device was launched. This time, LG still chooses to refuse replacements if there were any visible scuffs on the phone even though the issue was software-related and well-known.
We haven't seen any massive amount of reports about a bootloop issue with the LG V20, but we are starting to see another manufacturing defect. On the 19th of this month, someone in the /r/LGV20 subreddit talked about how the protective glass on their rear camera cracked for seemingly no reason, and it was only 5 hours after they had taken it out of the box. The next day we saw the same thing happen after some test scratches were done to the glass on the JerryRigEverything YouTube channel.
Yesterday there was another person from the /r/LGV20 subreddit say the same thing happened to theirs after they used the rear LED flashlight for 30 minutes on an airplane. So far, we haven't seen any reports from this in the LG V20 forums here on XDA, but it has sparked a discussion about the issue. So if you have an LG V20, be careful about the rear camera protective glass, and be sure to let us know if this happens to you.
As the BABBQ 16 comes to an end, we learned the sad news that this will be the last BABBQ. XDA has been a part of this yearly meet-up for the past 5 years, where we met everyone from software cooks to those enthusiasts willing to explore every corner. We've loved every moment of every year.
"This might be the end of the BABBQ, and possibly IDEAA, but the impact we've had will last for a very very long time"
The BABBQ has hosted thousands of people over its lifespan, with dozens of booths and camps from all sorts of groups — software developers, OEMs and hardware manufacturers, and Android lovers from every corner of the world. We've had our XDA hangout spot every year, where we've shared stories and interacted with the community through chats and giveaways. If you've ever been to one of our booths, we hope you had a good time!
It's sad to see the Big Barbecue come to an end, and it will be missed. We'll always have fond memories of the insightful lectures from industry figures, the fireside chats and the friends we made through the halls of whatever convention center we happened to meet at that year. Tricycle races, RC robots roaming around, the pool parties where nobody actually used the pool — and the meat, oh, that sweet, sweet barbecue at the closing of every gathering. If you've been here, you know how much fun it has been. It might be no more, but the BABBQ has brought Android's new-found motto to life every year: be together, not the same.
We invite you to take a trip down memory lane and to check out our experience at the BABBQ through the years in the videos below!
from xda-developers http://ift.tt/2eF2Hmv
via IFTTT
XDA is holding a contest to giveaway a NextBit Robin here at the Big Android BBQ. The contest has people trying their hand at BeerBox VR. This Google cardboard app simulates drunk vision while you move around. We asked people to try to roll a ball into a cup. Turns out to be much harder than it looks.
Big thanks to UMi for sponsoring us at the Big Android BBQ!
Check them out at umidigi.com