How did this device movement start? A process that would forever alter the way superdevices are perceived and how these tools of the elite hackers made its way into every wannabee hackers HDD. What started out as a complex process that involved tons of code has evolved with the device, at that time, the iPhone, a device worthy of such a challenge. With some knowledge and luck, everyday people were able to free their phone, and start the illegal uproar that
Now shifting to Android, the root of all, well roots. This mobile OS was welcoming hacker communities the way a light attracted a mosquito. Open source was Google's policy, which would not stick well with the plethora of manufacturers lined up. But back to the root. Sometimes more complicated, this allowed hackers to do what they dreamed, complete personalization. Besides the point of doing things like free tethering, something Google would put into its OS in the Froyo update, users could literally customize their devices based on the actual OS, and soon, ports would come along, shooting once ancient phones into the 21.01st century. Using rooting tools like SuperOneClick, you would get control of your phone, back it up using TitaniumBackup, and install a new ROM via ClockWorkRecovery, apps every rooted owner has. This almost always led to a massive improvement in performance, putting the process of rooting one Android device as common as a practice of going to bed or waking up.
Fast foward to today, and you now realize how hacking your device is now a common practice, a custom, in todays world. Even Windows Phone 7 devices are starting to get bigger with unlocking your phone, just on a much smaller scale compared to Apple and Google. What does this mean for the future? Will companies stop giving in and embrace its darkside, or will the battle continue as both sides continue benefiting each other.
No comments:
Post a Comment