Ok so a couple of things to note here.
First off it is about a 2% chance that you can just flash a custom recovery. There was a phone recently where the recovery partition had no verification check. With that being said it would be a big over sight. The next thing is that with Hashcode already working on a qualcomm kexec and SS I would be very supprised to see it not work, or there not be a strap method. As for root, if I'm not mistaken, and i could be, but Chainfire relies on you having an unlocked bootloader, as his image just has an init script in the recovery to boot, change ro.secure to false and then flashback the old recovery. With this being said THIS WILL NOT WORK WITH LOCKED DEVICES. If the bootloader allows for a unsigned kernel recovery to boot you can do it, or if it allows for stacksmashing you can do it, but those are two very iffy things. As for a root on this device, its more then likely going to have to come from a security tag that has been created in the
linux kernel, that allows unverified code to run.
Second off I think there's something important to point out here, and I'm going to post it back to the days where there was no android. As of right now we have achieved a semi unlocked state (see loki and SS) however this is much like Musclenerd and geohotz grabbing the source code and finding injection points, the big difference was when geohotz found the holygrail, an architecture level exploit. What this translates into our world is much harder since the iPhone has one chip and we have... well Qualcomm, TI, and Samsung to name some. With this being said, and I know its easier said then done, but I think we are going to need a Qualcomm level exploit to really unlock all of these phones. We have seen in the recent couple of days that there are interrupts early on in the boot chain, see rumrunner, are not impossible. The reality is that our holy grail lies in one of two places, a leek, which in reality is more likely to happen since the other option is not always possible, or a base level exploit. The thing to keep in mind is that it too geohotz 2 years to discover the A4 hole, and he was just one man. While a community is much bigger, I urge everyone looking for exploits on new phones to realize that YOU SHOULD NEVER BUY A PHONE THAT YOU DON'T LIKE STOCK.
Hope you all are enjoying your GN3. They really are a great device with or without an unlock!!!
On a side note:
Apparently Chainfire's method helped designgears root the AT&T version. This took about 3 days. Good news!
http://forum.xda-developers.com/showthread.php?t=2472760
The reason for this is it seems there is a leek there that is allowing him to run a script that flashes over files to the FS. Look at:
As usual, a big shout out to my anonymous source for the file hook-ups!
This means that he most likely has some sort of System dump that is signed and has RO.secure disabled. If you look there's actually a full 2.2 GB image that you have to download and flash, meaning that it most likely has something that allows for root, and not actually an exploit.