Yesterday, we were shocked to learn that Dan Rosenberg, a developer and security researcher, has found an exploit that would allow users to unlock the bootloaders of several Motorola phones. The phones confirmed to be supported were the Motorola ATRIX HD, Motorola DROID RAZR HD and MAXX HD, and the Motorola DROID RAZR M. That list hasn’t changed overnight, unfortunately. Users are urged not to try this method if they own any other phone as doing so could damage their phone irreparably.
This .zip file is what you’re looking for, and here’s what you’ll need to do with it:
- Extract the entire contents of the zip file.
- If you are using Windows, ensure you have installed the latest Motorola USB drivers available for your phone.
- Ensure your device has been rooted and you have a working installation of “su”.
- Ensure USB Debugging mode is enabled on your device.
- If you are using Windows, navigate to the extracted directory and execute “run.bat”. If you are using Linux or OS X, navigate to the extracted directory in a terminal and execute “./run.sh”.
Dan Rosenberg also posted full insight into his research and the process which allowed him to discover the exploit over at Azimuth Security. It’s a long technical read, but if you’re up for it and interested in seeing how the tightest bootloader in the game was overtaken by the brains of this developer be sure to head over there.
Remember that anything you do to your device as a result of this modification or any other modification is your own responsibility. No one’s going to be obligated to buy you a new device if you happen to find it transformed into a decepticon. If you understand that warning and the possible repercussions of the operation then be sure to give it a try and see if you can finally free the chains your device has been shackled to for so long.