Wednesday, March 16, 2016

ANY help on finding a root exploit/Any suggestions welcomed.

So currently I have begin porting AW from the Gear 2 device and before I put to much work in it, I'd love to find a working root method or exploit and any help would be appreciated. COME ON, Let's get this watch going! :rolleyes::rolleyes:

UPDATE: Just noticed DEP(data execution prevention) Is NOT enabled in Tizen so that seems like a fair try and gain. So we should be able to activate Shellshock on boot, But I've never done this for a watch and certainly not Tizen! Wish me luck, any help would be amazing!


from xda-developers http://ift.tt/22o2API
via IFTTT

No comments:

Post a Comment