FORUMS

[App] [26.04.2011][v1.2] GingerBreak APK (root for GingerBread)

9,957 posts
Thanks Meter: 67,471
 
By Chainfire, Senior Moderator / Senior Recognized Developer - Where is my shirt? on 21st April 2011, 04:57 PM
Post Reply Subscribe to Thread Email Thread
8th June 2011, 08:42 AM |#781  
Senior Member
Flag Selangor
Thanks Meter: 173
 
More
doesn't work on Desire HD 2.3.3...
 
 
8th June 2011, 09:22 AM |#782  
Dousan's Avatar
Senior Member
Flag Copenhagen
Thanks Meter: 191
 
More
It doesn't work with any phone on 2.3.3 as of yet. We will need an updated version (1.3) to root again. The exploit got closed. When a new loophole is found we can all root on 2.3.3.

Regards Dousan...
The Following User Says Thank You to Dousan For This Useful Post: [ View ]
8th June 2011, 01:27 PM |#783  
Petarsson's Avatar
Senior Member
Thanks Meter: 16
 
More
Quote:
Originally Posted by Dousan

It doesn't work with any phone on 2.3.3 as of yet.

ähm, that's not the whole truth, it did actually work on my nexus s with 2.3.3! but no longer, when 2.3.4. came up...
so, hope there will be an update!!!

ps: sry for thanking you, missed the "quote"-button
8th June 2011, 01:48 PM |#784  
Junior Member
Flag Ft. Wayne
Thanks Meter: 0
 
More
Quote:
Originally Posted by Dousan

It doesn't work with any phone on 2.3.3 as of yet. We will need an updated version (1.3) to root again. The exploit got closed. When a new loophole is found we can all root on 2.3.3.

Regards Dousan...

Well that sucks, although I'm sure it won't be long before another comes out
8th June 2011, 07:27 PM |#785  
ryocoon's Avatar
Senior Member
Flag San Jose
Thanks Meter: 21
 
More
Quote:
Originally Posted by Nurdz

Well that sucks, although I'm sure it won't be long before another comes out

Won't be long... Well that is relative. They need to find a new exploit method. This is not just shift-bit and re-release. I would imagine that the new exploit might get included in one-click methods, but maybe not named GingerBreak (unless the same team develops the new exploit also).

In the meantime, I know the hole is closed on 2.3.2 for the US Verizon SonyEricsson Xperia Play (which is pretty much stock in most ways). Same way it was closed with the 2.3.3 release for same said phone in other countries on GSM instead of VZW's CDMA. I, too, am looking forward to the next exploit to try. I've tried 14 different exploits and even attempted a little poking here and there myself based on other's code methods to try it, and nothing gives so far. It is just a matter of time, but that time always seems terribly long when you are waiting in anticipation.
Last edited by ryocoon; 8th June 2011 at 07:30 PM.
8th June 2011, 08:17 PM |#786  
Dousan's Avatar
Senior Member
Flag Copenhagen
Thanks Meter: 191
 
More
Quote:
Originally Posted by Petarsson

ähm, that's not the whole truth, it did actually work on my nexus s with 2.3.3! but no longer, when 2.3.4. came up...
so, hope there will be an update!!!

ps: sry for thanking you, missed the "quote"-button

Lol have tried that a few times, they should move the thanks button to the far right

Didn't know, thought it was on the 2.3.3 update itself the exploit got closed.

Regards Dousan...
8th June 2011, 09:27 PM |#787  
db_darryl's Avatar
Senior Member
Flag Birmingham, UK
Thanks Meter: 20
 
More
Quote:
Originally Posted by ryocoon

Won't be long... Well that is relative. They need to find a new exploit method. This is not just shift-bit and re-release. I would imagine that the new exploit might get included in one-click methods, but maybe not named GingerBreak (unless the same team develops the new exploit also).

In the meantime, I know the hole is closed on 2.3.2 for the US Verizon SonyEricsson Xperia Play (which is pretty much stock in most ways). Same way it was closed with the 2.3.3 release for same said phone in other countries on GSM instead of VZW's CDMA. I, too, am looking forward to the next exploit to try. I've tried 14 different exploits and even attempted a little poking here and there myself based on other's code methods to try it, and nothing gives so far. It is just a matter of time, but that time always seems terribly long when you are waiting in anticipation.

Waiting in anticipation indeed! There has been no word from the developers of this exploit on this forum to even state it is still a work in progress unfortunately. Would be great if somebody could pick up where they left off but looks as though I'm going to need to root using a different method although I liked the simplicity of this particular method and also the root/unroot method.
9th June 2011, 04:29 AM |#788  
Junior Member
Thanks Meter: 13
 
More
Trying to run the APK in Docomo SH-12C
I bought a 3D Android device of Docomo SH-12C. The 3D display is amazing and interesting. However, I can not root it with GingerBreak V1.2. It ran longer than 10 minutes in the phone. Can someone tell me the reason why? Or, is it an issue with the hardware? Many thanks for you!
9th June 2011, 08:08 PM |#789  
chadhoard's Avatar
Senior Member
Flag Valparaiso
Thanks Meter: 22
 
More
I have an LG Ally with 2.2.2. I run this and get a forced closed. What am I doing wrong?
10th June 2011, 04:01 AM |#790  
ryocoon's Avatar
Senior Member
Flag San Jose
Thanks Meter: 21
 
More
Quote:
Originally Posted by chadhoard

I have an LG Ally with 2.2.2. I run this and get a forced closed. What am I doing wrong?

You are running a Froyo (2.2.x) version of the OS. This is for Gingerbread (2.3.x) version of the OS (although I hear that some have gotten it to work on 3.x, HoneyComb).

You would more likely be better suited running PSNeuter, Exploid, or RageInTheCage. Try out "SuperOneClick" which has a few exploits to try via a tethered connection and ADB.
10th June 2011, 01:12 PM |#791  
Junior Member
Thanks Meter: 0
 
More
Unhappy
i have try many time rooting on my desire S but failed...

Read More
Post Reply Subscribe to Thread

Tags
gingerbreak

Guest Quick Reply (no urls or BBcode)
Message:
Previous Thread Next Thread