Amazon needlessly limits the functionality of your unregistered Kindle Paperwhite, such as disabling the Collections and Wikipedia widget features.
To unlock all of your Kindle's functionality you either have to register (and grant them access to juicy analytics) or trick the Kindle into thinking it's registered.
The following process is only for developers who are comfortable with SSH, SCP, and the possibility of bricking their devices. Someone better than myself can make this into a more streamlined process. I've only done this on my own Kindle Paperwhite Wi-Fi running 5.2.0 (1729740065).
Like previous versions, the /var/local/java/prefs/reginfo file must be populated with your account credentials. This file can be created locally and sent to your Kindle via SSH/scp.
Unlike previous versions Amazon will remotely unregister your Kindle whenever it phones home, which happens periodically and whenever you connect to Wi-Fi. To prevent this I've added iptables rules that run as soon as an interface is brought up. Note that I've created a blacklist of individual IPs...I currently believe that this list isn't comprehensive, and more work needs to be done by developers to add to it or create a more robust solution.
Twobob and knc1 replied with some excellent comments on this procedure. Notably the individual IP addresses can be replaced with ranges of IPs, which will all but guarantee the device will never communicate with Amazon's update servers, and there's an existing iptables configuration file that can be used as the target for iptables-save.
I've updated the relevant steps to include these better procedures.
0. Pray to your personal God that you don't create a foolish iptables rule that locks you out of USB networking.
2. Enable USB networking and set your SSH password
3. Go into airplane mode
4. Plug in USB and connect. You'll have to set your IP address to something in the 192.168.15.x range (not 254)
5. Create a reginfo file on your local computer that fits the following template:
#Tue Oct 09 08:30:44 GMT+12:56 2012
6. Push this to your device over scp. The destination directory is /var/local/java/prefs/
scp reginfo firstname.lastname@example.org:/var/local/java/prefs/
You must also prevent your Kindle from deleting this file! (It loves to delete the fake registration information whenever it can.)
In the SSH session, run:
chmod 444 /var/local/java/prefs/reginfo
chown root:root /var/local/java/prefs/reginfo
chattr +i /var/local/java/prefs/reginfo
The chattr sets a flag that marks the file as immutable...it cannot be changed unless you run chattr -i.
7. Reboot and verify that your Kindle thinks it's registered. Don't proceed if this step doesn't work.
It's now necessary to prevent your Kindle from phoning home with Amazon's servers.
8. Enable USB networking again and SSH into the device
9. Start adding iptables rules in the shell. If at this point you totally screw up, you can reboot and your changes won't be saved.
iptables -I inserts a rule and iptables -D deletes one.
Thanks to knc1 and Twobob for the IP address ranges!
iptables -I OUTPUT -m iprange --dst-range 22.214.171.124-126.96.36.199 -j DROP
iptables -I OUTPUT -m iprange --dst-range 188.8.131.52-184.108.40.206 -j DROP
iptables -I OUTPUT -m iprange --dst-range 220.127.116.11-18.104.22.168 -j DROP
iptables -I OUTPUT -m iprange --dst-range 22.214.171.124-126.96.36.199 -j DROP
iptables -I OUTPUT -m iprange --dst-range 184.72.0-188.8.131.52 -j DROP
iptables -I OUTPUT -m iprange --dst-range 184.108.40.206-220.127.116.11 -j DROP
iptables -I OUTPUT -m iprange --dst-range 18.104.22.168-22.214.171.124 -j DROP
iptables -I OUTPUT -m iprange --dst-range 126.96.36.199-188.8.131.52 -j DROP
These commands instruct your Kindle's firewall to silently drop all outbound requests to those destinations. Again, there may be other Amazon auth servers that will have to be discovered via trial and error.
10. Run iptables -L and verify that these entries exist. Run something like
iptables -D OUTPUT -m iprange --dst-range 184.108.40.206-220.127.116.11 -j DROP
if you want to remove a rule.
11. In the SSH session run iptables-save (first by itself to verify that it spits out a list of rules) then run:
iptables-save > /etc/sysconfig/iptables
This produces a file that contains the current state of your firewall, and it will be automatically loaded.
iptables-save > /etc/iptables.conf
This produces a file that contains the current state of your firewall, and can be loaded to restore this state.
We're going to instruct the Kindle to load these rules whenever it connects to a network.
12. Set the permissions on that file by running these commands in your SSH shell:
chmod 644 /etc/iptables.conf
chown root:root /etc/iptables.conf
13. Create a local file called iptables:
# Note: if bad rules are inadvertently (or purposely) saved it could block
# access to the server except via a local shell.
# Paths verified only on Kindle 5.2.0
test -x $RESTORE || exit 0
test -x $STAT || exit 0
# Check permissions and ownership (rw------- for root)
if test `$STAT --format="%a" $IPSTATE` -ne "600"; then
echo "Permissions for $IPSTATE must be 600 (rw-------)"
# Since only the owner can read/write to the file, we can trust that it is
# secure. We need not worry about group permissions since they should be
# zeroed per our previous check; but we must make sure root owns it.
if test `$STAT --format="%u" $IPSTATE` -ne "0"; then
echo "The superuser must have ownership for $IPSTATE (uid 0)"
# Now we are ready to restore the tables
$RESTORE < $IPSTATE
14. On your local machine, use scp to push this file to the Kindle, in the directory /etc/network/if-pre-up.d/iptables:
scp iptables email@example.com:/etc/network/if-pre-up.d/
The scripts inside that directory are run whenever an interface is activated. Thus your "iptables" script will be executed automatically, and your firewall will revert to the state you've saved in /etc/iptables.conf.
Thus, you can see that if you want to make future changes to your firewall, you must update the iptables.conf file using
iptables-save > /etc/iptables.conf
15. In your SSH session, set the permissions on the iptables file:
chmod 755 /etc/network/if-pre-up.d/iptables
chown root:root /etc/network/if-pre-up.d/iptables
16. Finally, turn airplane mode off and connect to a WiFi network.
17. Verify that your Kindle still appears to be registered. If step 7 worked but your Kindle has now de-registered, it's because it's chosen a new Amazon auth server. If you wish to help this hack you may now:
in your SSH session. Find any "ESTABLISHED" connections to suspicious-looking IPs.
b. Block these IP addresses with iptables. If all is well (you didn't lock yourself out) update your saved firewall rules.
c. Reboot. If it worked, please post the IP address(es) you added here!
Your Kindle now believes it's registered, and it's prevented from discovering the truth thanks to the Kindle's firewall.