Before the dazzling Samsung Galaxy S3 could reach the palms of customers, the handset has got rooted by Android developer Chainfire.
The developer too, has not received the Galaxy S3 yet but he has developed the root exploit virtually on the firmware that was leaked to him. The process needs repacking the kernel with a modified adb binary and then installing SuperUser manually. The process is not that difficult so if Samsung doesn’t make any changes in its kernel before it ships the handsets, you will be able to get the administrative access of your brand new device.
The developer hasn’t released the “insecure” kernel yet because he fears it is traceable to the to the person that leaked it.
Trackback from your site.