It is certainly possible that this is a hoax or an April Fools' prank. There was a similar one on twitter last year just a few days before April 1st, when someone claimed that they had cracked the then newly released PC game Assassin's Creed II (which had Ubisoft's new DRM which required users to be constantly connected to the internet to play the game). They kept posting status updates about their "progress" and on April 1st they finally posted a download link which turned out to be some malware. They later claimed that it was harmless since it would be detected and deleted by antivirus software on the users' computers. People were pissed initially but soon forgot about that prank since a few days later someone really did manage to bypass Ubisoft's DRM.
Anyway, the "proved wrong", "proven wrong", etc. that koushik and kabaldan have been adding to their posts suggests that they are themselves not 100% sure whether this is fake or not.
And if it really is a prank, then it is a very well executed one since many major Android blogs have picked it up.
Also, I noticed that in nenolod's Sholes signing key leak explained
page, he has mentioned Codegroup Descriptor Table
as the full form of CDT (which just sounds right). Whereas, in this and-developers.com page
about Milestone partitions, they have mentioned the full form as CDT as Code Description Table
with a question mark at the end. From this, it seems
like nenolod knows what he is talking about. As I said, if it is a prank, it certainly is a very well executed one. He certainly had me fooled for a while but now I am not so sure what to believe. I think there is still a slight chance that this is real but there is a greater chance that this is fake. I guess I will find out on April 1st (or maybe not, if he chickens out and decides to keep quiet).
If this is indeed a prank, nenolod should be prepared for an a** kicking