Sunday, March 8, 2009

Android hacked to run on real hardware


Google told us that we wouldn't see any Android devices until the end of the year, but a funny thing happens when you put up the entire SDK and an emulator for a platform -- all them crazy hackers start hacking. Apparently Android was natively booted on a Freescale-based dev board called the Armadillo 500 back in November, but the floodgates were really opened when a Hungarian group called Eu.Edge discovered that basically any device with an ARMv5TE chip could run Google's baby. Armed (heh!) with that information, tinkerers around the world have gotten a variety of Sharp devices running Android: the SL-C760, C3000M, SL-C3000 series, and the SL-6000 have all been confirmed running the OS. Hopefully that means we'll be seeing a lot more unofficial Android devices soon -- check a couple videos after the break.

Thursday, March 5, 2009

WiFi and Bluetooth tethering on Android

Many G1/ADP1 owners have been using the app Tetherbot to get internet access on their laptop via USB to the phone’s data connection. The app relied on the Android Debug Bridge to forward ports. It worked, but people wanted a solution better than a SOCKS proxy. The community figured out a way to create a properly NAT’d connection using iptables and then [moussam] rolled them up into easy to use applications. There’s one for setting up a PAN device on Bluetooth and another for adhoc WiFi networking. It requires you to have root on your phone, but hopefully you’ve achieved that and are already running the latest community firmware.

Debian on the G1 once again

[ghostwalker] dropped in on our previous Debian Android post to let us know that he had streamlined the install process. The first time around, it quickly became difficult to complete the process because firmware updates had taken away root access. Hackers have since figured out how to downgrade from RC30 and install BusyBox. All you need to do to put Debian on your phone is download the package from [ghostwalker] and then run the installer script. This isn’t technically a port since Debian already has ARM EABI support. What would you run on your phone if you had access to the entire Debian package tree? A video of Debian starting up is embedded below.

Read the rest of this entry »

Multitouch patched into Android


[Luke Hutchison] has come up with a rather clever hack to get multitouch support on the G1. He wrote a patch against the Synaptics touchscreen driver. When two fingers are placed, the driver reports the x/y of the midpoint and a radius for the size field. If only one finger is used, the size is reported as zero. The nice thing about this approach is that it’s backwards compatible; the extra data will be ignored by current apps. Unfortunately, Google’s Android team says that if multitouch is ever added, it would identify individual fingers and definitely not using this method.

T-Mobile G1 teardown


In our Dev Phone 1 excitement last week, we somehow overlooked phoneWreck’s teardown of the T-Mobile G1. The complex slider mechanism is certainly worth looking out. One of the major oddities they point out is the inclusion of two vibration motors. One is mounted next to the SIM on the mainboard. While the other is mounted in the frame next to the earpiece. We wonder what was gained/solved by using two. The phone also includes a digital compass module. We’d like a more detailed explanation of how the Xilinx CPLD is used. From this article in 2006, it seems HTC uses them to generate custom clock signals and switching off devices for power management.

Android adds A2DP, AVRCP Bluetooth and more

While working towards open-sourcing Android, the team continued to work on new features in their own private development branch. These have now been published publicly in the “cupcake” branch. There’s a lot of interesting new features and bug fixes included. We’ve got a rundown of many of the significant additions after the break.

Read the rest of this entry »

Hardware-unlocked Android G1 for sale

Google has new program to sell Android phones directly to developers. The Android Dev Phone 1 is both SIM-unlocked and hardware-unlocked. SIM-unlocked means you can use it on any GSM carrier you want. Hardware-unlocked means you can run any system you want on the phone, not just officially signed ones. No more need to worry about security patches taking away your root access.

The device is $399. You will need to purchase it through the Android Market as a registered developer (a $25 fee). We wonder how long before the unsigned bootloader starts getting flashed to T-Mobile phones.

Two new Android phones have surfaced recently which may prove just as friendly: the Kogan Agora Pro and the QiGi i6.

UPDATE: While shipping is free in US, it is incredibly expensive everywhere else. Yes, we bought one.

Google explains Android patches


Google has been trickling out info about what they’re actually fixing in the G1 firmware updates. Before RC29, users were able to bypass the phone lock using safe mode. RC29 also brought WebKit up to date, presumably patching the bug [Charlie Miller] found. RC30 takes care of root console problem. Unfortunately there are very few details as to what or how particular items were broken. This release method leaves much to be desired; having the official Google Groups" href="http://groups.google.com/group/android-security-announce">Android Security Announcements group be the absolute last place to get security news is asinine.