Monday Amazon began shipping its Kindle Fire tablet to consumers, yet the device has already found itself painfully ripped apart and rooted just two days later -- now that's a welcoming committee!
The rooted aspect arrives by way of "death2all110" who managed to accomplish the process by using both SuperOneCLick 2.2 and the Android SDK.
"To get adb going you must already have the sdk on your machine and used it," the user writes. "Goto: %USERPROFILE%\.android and edit the adb_usb.ini and add [0x1949] to the end of the file and save. Then go into where you have the sdk at and open the google-usb_driver folder and edit android_winusb.inf and add [this code] to the [Google.NTx86] section and [Google.NTamd64] section."
Root access should allow the Android developer community to create custom ROMs for Amazon's new tablet, maybe even bring Android 4.0.1 Ice Cream Sandwich to the device now that it's gone open source. Hardware really shouldn’t be an issue given that the new OS theoretically merges the smartphone 2.x version and the tablet 3.x version together under one roof, eliminating fragmentation.
In addition to the rooting, Tuesday brought reports that Kindle Fire owners can install apps not sold on Amazon's Appstore by following a list of steps similar to how death2all110 rooted the device. The instructions are for Mac, but they can be easily converted over to PC. Here's the list:
(Note: You'll need to install and run the Android SDK at least once)
- On the Kindle Fire Settings screen, go to "Device" and turn On "Allow Installation of Application From Unknown Sources"
- Plug your Kindle Fire into your Mac
- Open ~/.android/adb_usb.ini with your favorite text editor
- Add the value "0x1949" to the end of the file and save it.
- You’ll need to restart the adb server process to get it to re-read that file. Do that with "adb kill-server".
- Run "adb devices" and you should see the attached device.
Act Local Media reports that 0x1949 is the Vendor ID for Lab126, Amazon's Skunkworks that develops all their hardware devices.