View Single Post
Old 10-07-2014, 08:04 AM   #16
knc1
Going Viral
knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.
 
knc1's Avatar
 
Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
Quote:
Originally Posted by zxczxc View Post
once you connect with the serial cable, and get the password, and have root access, is 'rooting'/jailbreaking the device easy/simple - the same everytime?
since, from what i understand, this is not an exploit, so, once you actually give yourself root permissions how can you keep it that way?
"rooting" and "jailbreaking" is not the same (at least here, for Kindles).

On a Kindle you don't "give yourself root permissions" -

We at Mobileread, refer to releasing the Kindle from the jail of being able to only install packages signed by Amazon as "Jailbreaking".

Once you have installed our public key certificate in the Kindle's certificate store it is "(Mobileread) Jailbroken".
It remains that way until the certificate is removed.

The O.P. here will probably hand copy the certificate using commands on the serial port operator's console -
Then install the most recent USBnetworking snapshot -
Remove the serial port connection -
And then close up the device.

After that, just access the device over the network with Telnet or SSH.
knc1 is offline   Reply With Quote