And back on topic..............
These secret strings don't appear to be in the system apk files which were extracted from the AT&T Backflip. Or, at least, I can't get these instructions to work properly, as the perl script fails with an "Out of memory" error. So, I used aapt and apktool to snoop around in the strings the hard way, and no such luck.
**EDIT** Never mind, I found two .apks with strings: Settings.apk and VoiceDialer.apk
Settings.apk:
<data android:scheme="android_secret_code" android:host="4636">
VoiceDialer.apk:
<data android:scheme="android_secret_code" android:host="8351">
<data android:scheme="android_secret_code" android:host="8350">
/**EDIT**
[System Dump]Motorola Backflip Blur_Version.0.1.1199.MB300.ATT.en.US
Still picking away at this thing. I noticed that Setup.apk has the
system account ownership/UID sharing, and
android.permission.WRITE_SECURE_SETTINGS permission. If I am able to hack it into setting ro.debuggable to ON, wouldn't it then allow adb root?
Will
apktools allow me to tamper with and recompile a new Setup.apk?
Will the phone allow me to adb uninstall the stock Setup.apk?
Will the phone allow me to install/reinstall the modified Setup.apk?
So many questions.. *still hacking, poking, prodding..* I'll post results and anything I find here and also on backflipforums.
--Weasel5i2