Linked by Thom Holwerda on Wed 6th Oct 2010 22:20 UTC
PDAs, Cellphones, Wireless While we rail on Apple for its closed and restrictive policies regarding its iOS, with Apple you at least know what you're getting into. When you buy a mobile phone running Android, many do so because of its open and more free nature than the competing platforms - so you can imagine the surprise when the hackers at xda-developers found out the brand-new T-Mobile G2 has a hardware rootkit that will always restore the phone's original operating system upon installing a different ROM. HTC says it doesn't know of any such feature, and points towards the carrier (or Google).
Thread beginning with comment 444244
To read all comments associated with this story, please click here.
Comment by bile
by bile on Thu 7th Oct 2010 03:00 UTC
bile
Member since:
2005-07-08

"Still, it's sad that once again, the device you buy is actually not yours."

Yes it is. You can do what you please with the phone... but HTC, Google and T-Mobile are under no obligation to provide you with any particular service if you wish to modify it or in this case to enable you to modify easily.

If you want an easily hacked phone buy the one marketed as such: the Nexus One.

Reply Score: 1

RE: Comment by bile
by Thom_Holwerda on Thu 7th Oct 2010 08:45 in reply to "Comment by bile"
Thom_Holwerda Member since:
2005-06-29

Yes it is. You can do what you please with the phone... but HTC, Google and T-Mobile are under no obligation to provide you with any particular service if you wish to modify it or in this case to enable you to modify easily.


But they also don't have the right to block you from modifying your OWN device. Sure, they can kill support and kick you from their service (and even that is debatable in Europe), but they can't prevent you. That's dirty and evil.

Reply Parent Score: 2

RE[2]: Comment by bile
by Timmmm on Thu 7th Oct 2010 11:19 in reply to "RE: Comment by bile"
Timmmm Member since:
2006-07-25

There's no evidence that they have. As other people have said, the main purpose of this layered file-system is to protect the data from accidental damage and to provide a reliable way to restore the phone to its original condition.

The fact that it makes custom modifications harder is probably an unfortunate side effect.

Reply Parent Score: 2

RE[2]: Comment by bile
by chmeee on Thu 7th Oct 2010 12:41 in reply to "RE: Comment by bile"
chmeee Member since:
2006-01-10

There's nothing stopping you from taking a soldering iron or JTAG programmer to the device.

Reply Parent Score: 1

RE: Comment by bile
by andydread on Thu 7th Oct 2010 20:11 in reply to "Comment by bile"
andydread Member since:
2009-02-02


If you want an easily hacked phone buy the one marketed as such: the Nexus One.


The Nexus One is no longer available. So where in the marketplace can one find an Android phone that to date does not go to lengths to block the user's freedom?

Reply Parent Score: 2