Attend XDA's Second Annual Developer Conference, XDA:DevCon 2014!
5,805,161 Members 52,482 Now Online
XDA Developers Android and Mobile Development Forum

[Q] How to install from unknown sources without ADB?

Tip us?
 
mkhopper
Old
#1  
mkhopper's Avatar
Senior Member - OP
Thanks Meter 11
Posts: 167
Join Date: Nov 2009
Default [Q] How to install from unknown sources without ADB?

So, by going into the settings menu of the FTV and toggling the ADB Debug flag, this allows for installing via a push from ADB.
The text that is displayed when changing this value also says that by enabling the setting, it allows for package installs from unknown sources.

Is this not quite the case though?
Using ES File Manager, when selecting an apk package located in the downloads folder on the device, the message shown in the attached screenshot appears.

Since there's no way to do so from the front-end, I am assuming that we will need root to change the flag to truly allow installing from any source?
Any possible way to do this without root?
Attached Thumbnails
Click image for larger version

Name:	IMG_20140523_184946.jpg
Views:	148
Size:	54.1 KB
ID:	2760898  
 
deanemj
Old
#2  
Member
Thanks Meter 13
Posts: 78
Join Date: May 2014
Quote:
Originally Posted by mkhopper View Post
So, by going into the settings menu of the FTV and toggling the ADB Debug flag, this allows for installing via a push from ADB.
The text that is displayed when changing this value also says that by enabling the setting, it allows for package installs from unknown sources.

Is this not quite the case though?
Using ES File Manager, when selecting an apk package located in the downloads folder on the device, the message shown in the attached screenshot appears.

Since there's no way to do so from the front-end, I am assuming that we will need root to change the flag to truly allow installing from any source?
Any possible way to do this without root?
Yeah, this isn't currently possible for the public. There is a root exploit(s) already developed but they have not been released yet. The developer, jcase, said he will release an exploit on the same day the upcoming Fire TV update is pushed (the exploit will not be compatible with the update so if you want it you'll need to follow the instructions in the other thread for blocking OTA updates).
 
Chahk
Old
#3  
Chahk's Avatar
Senior Member
Thanks Meter 162
Posts: 1,256
Join Date: Apr 2009
Location: New York
Quote:
Originally Posted by mkhopper View Post
Any possible way to do this without root?
Are you having issues with ADB? We can probably help you get those resolved.
Galaxy S4 GPe (I9505G/jgedlte) - Stock (4.4.4), rooted, Xposed. Recovery: CWM 6.0.4.7.
Moto X GSM (SIM-unlocked) - stock 4.4.3.
Acer A500 tablet - ROM: OmniROM 4.4.2 V12 | Recovery: TWRP-based REV 2.0 beta2
LG G Pad 8.3 GPe (V510) - stock 4.4.4.
Pebble Steel - ROM: stock 2.3.
Amazon Fire TV - stock.
 
mkhopper
Old
#4  
mkhopper's Avatar
Senior Member - OP
Thanks Meter 11
Posts: 167
Join Date: Nov 2009
Quote:
Originally Posted by Chahk View Post
Are you having issues with ADB? We can probably help you get those resolved.
Thanks, but no. I use the automatic tool to push packages with no problems. I was just looking for other methods of package installation that could be done directly while on the FTV.
 
Chahk
Old
#5  
Chahk's Avatar
Senior Member
Thanks Meter 162
Posts: 1,256
Join Date: Apr 2009
Location: New York
Quote:
Originally Posted by mkhopper View Post
Thanks, but no. I use the automatic tool to push packages with no problems. I was just looking for other methods of package installation that could be done directly while on the FTV.
Not at this time. Amazon disabled side-loading of APKs from the device itself. Root would be the only way to get around that.
Galaxy S4 GPe (I9505G/jgedlte) - Stock (4.4.4), rooted, Xposed. Recovery: CWM 6.0.4.7.
Moto X GSM (SIM-unlocked) - stock 4.4.3.
Acer A500 tablet - ROM: OmniROM 4.4.2 V12 | Recovery: TWRP-based REV 2.0 beta2
LG G Pad 8.3 GPe (V510) - stock 4.4.4.
Pebble Steel - ROM: stock 2.3.
Amazon Fire TV - stock.
 
Kramar111
Old
#6  
Junior Member
Thanks Meter 2
Posts: 9
Join Date: Feb 2014
Quote:
Originally Posted by mkhopper View Post
Thanks, but no. I use the automatic tool to push packages with no problems. I was just looking for other methods of package installation that could be done directly while on the FTV.
http://forum.xda-developers.com/show....php?t=2715315

Sent from my MZ617 using XDA Premium 4 mobile app
The Following 2 Users Say Thank You to Kramar111 For This Useful Post: [ Click to Expand ]
 
tarvoke
Old
#7  
tarvoke's Avatar
Member
Thanks Meter 23
Posts: 99
Join Date: Mar 2011
Location: Slightly Outside America
Quote:
Originally Posted by Kramar111 View Post



several days ago it occurred to me to alternatively use sshd for terminal access, because:

-a) I feel a little unsafe leaving adb wifi enabled all the time (ok it's only a small thing to turn it on and off, but still) - and for security reasons there is no way to enable/disable it programmatically e.g. from a script/shell/terminal/app (well theoretically this is not exactly true, but practically it is)
-2) some people (i.e. me) would like to do shell/terminal remotely sometimes, rather than on the AFTV (and other people don't have/want a keyboard)

ssh access makes a great alternative to Term.apk, but the problem is:

- Term.apk and/or (pick your favorite android ssh server) don't have permission to run e.g. "pm install foo.apk" - it will fail. (btw 'pm' is a great command, take a look sometime at all the options. it shares a lot of functions as the adb command itself. 'am' is another fun command...)

- so, the hilarious workaround of enabling adb wifi, "adb connect", and then finally "adb shell" or "adb install" etc., is still required. (b/c the adb user is in the 'shell' group, among others - giving it permission to run /system/bin/pm) - oh well.


for random reference:
Code:
127|shell@android:/ $ id
uid=2000(shell) gid=2000(shell) groups=1004(input),1007(log),1009(mount),1011(adb),1015(sdcard_rw),1028(sdcard_r),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats)
shell@android:/ $ exit
u0_a9@android:/ $ id
uid=10009(app_9) gid=10009(app_9) groups=1015(sdcard_rw),1028,3003(inet),50009(app_40009)
(also note it appears the adb shell user might possibly have 'mount' abilities, but since the /dev/block/sd* nodes permissions' are really locked up, who knows...)
KFTV: The Quest for Kindle, OUYA (kitkat!), GOGHVMU (titanium-froze 200+ apks. much better now), Qualcomm GSP 1600 (Global*Star LEO)

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes


XDA Forums Added for the First Batch of Android One Devices!

Just yesterday, we talked about the highly anticipated launch of the first batch … more

XDA Xposed Tuesday: DonkeyGuard, Don’t Be a Donkey, Control Your Device – XDA Developer TV

Some applications ask for the world … more

Use Facebook Pictures as a LWP with Facebook View

One of the best things that Android has always offeredits users is the ability to tailor … more

Share Your Thoughts Anonymously with A Minimalist Social Network

Nowadays, almost everyone has a second life onthe Internet. Among the best … more