Classic Gear S2.
SO, After researching and getting my life together these last 30 or so minutes I have come to the conclusion MAYBE their is hope for us classic users. Ill begin the process of downloading the Gear 2's* androidwear port and try the root process they have in there threads! Hopefully I can gain root and begin porting but it should boot mainly do to the fact we have the exactly same processors. So wish me luck and if I make process I will surely update everyone and if I can really get something after downloading the source of there device I will make another thread!
UPDATE: So I am no professional and any collaboration would help but I think I found how I am going to initiate a root exploit and anyone with any knowledge and ability in WEB APP, and maybe would like to find a way/app that does not include the CSP security measure as much would be appreciated or maybe if you or anyone has another suggestion for gaining root as i have never had to find an exploit, I have only ever built and ported.
UPDATE 2: Just noticed DEP(data execution prevention) Is NOT enabled in Tizen so that seems like a fair try and gain. So we should be able to activate Shellshock on boot, But I've never done this for a watch and certainly not Tizen! Wish me luck, any help would be amazing!
UPDATE 3: SO I talked to a great developer who informed me the route to take and it's a long road. But he has some of it done and maybe reading what he has and the more or less will help me. But I know where to start and I will attempt that today.
UPDATE 4: Kernel is going GREAT with the help I got from a certain amazing developer! Now until I find a root exploit I cannot test the kernel, But it seems EXTREMLY promising!!
SO, After researching and getting my life together these last 30 or so minutes I have come to the conclusion MAYBE their is hope for us classic users. Ill begin the process of downloading the Gear 2's* androidwear port and try the root process they have in there threads! Hopefully I can gain root and begin porting but it should boot mainly do to the fact we have the exactly same processors. So wish me luck and if I make process I will surely update everyone and if I can really get something after downloading the source of there device I will make another thread!
UPDATE: So I am no professional and any collaboration would help but I think I found how I am going to initiate a root exploit and anyone with any knowledge and ability in WEB APP, and maybe would like to find a way/app that does not include the CSP security measure as much would be appreciated or maybe if you or anyone has another suggestion for gaining root as i have never had to find an exploit, I have only ever built and ported.
UPDATE 2: Just noticed DEP(data execution prevention) Is NOT enabled in Tizen so that seems like a fair try and gain. So we should be able to activate Shellshock on boot, But I've never done this for a watch and certainly not Tizen! Wish me luck, any help would be amazing!
UPDATE 3: SO I talked to a great developer who informed me the route to take and it's a long road. But he has some of it done and maybe reading what he has and the more or less will help me. But I know where to start and I will attempt that today.
UPDATE 4: Kernel is going GREAT with the help I got from a certain amazing developer! Now until I find a root exploit I cannot test the kernel, But it seems EXTREMLY promising!!
Last edited: