Give us G2 root T-Mobile!

I bet you guys have heard the recent new on t-mobile’s G2 temporary root issue. Let me just quote part of what they have defended on their side:

Code-Level Modifications to the G2

As pioneers in Android-powered mobile devices, T-Mobile and HTC strive to support innovation.  The T-Mobile G2 is a powerful and highly customizable Android-powered smartphone, which customers can personalize and make their own, from the look of their home screen to adding their favorite applications and more.

The HTC software implementation on the G2 stores some components in read-only memory as a security measure to prevent key operating system software from becoming corrupted and rendering the device inoperable. There is a small subset of highly technical users who may want to modify and re-engineer their devices at the code level, known as “rooting,” but a side effect of HTC’s security measure is that these modifications are temporary and cannot be saved to permanent memory.  As a result the original code is restored.

Seriously, I didn’t expect this from HTC at least knowing that their smartphones so far have been pretty easily rooted. I hate the fact that these Android hardware creators give “we-are-protecting-you” reasons just to force their users not to root the phones. If protection really was a concern, instead of blocking root access, why don’t they just insert a “boot recovery” option? An option that will let the users to choose whether they want to return the phone into its stock level or load the custom ROM they are currently running. THAT is what I call “protecting”. By forcing your own bloatwares and force disallowing root is just a scheme to push your crapware to the users and giving them no options but to have them on their phone.

I still believe that if Android phones can unleash their monsters within, its just with root access. We have developers like cyanogen, PaulOBrien and many others who are way better in customizing the UI compared the ones that come stock with the sets – and we have been proven with this over and over and over again. I still don’t get it why these companies will not just give up and let the root community do their thing.

Print
  1. harnam aulakh
    #1 written by harnam aulakh (2 years ago)

    Hacking

  2. You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

  3. Comment Feed for this Post
Go to Top