Sony Google TV

The folks over at GTV Hacker have released a root exploit for Sony Google TVs.  The NSZ-GT1 Eagle (that's the Blu-ray player) and the Asura stand alone TVs can use this method, requiring only some software modifications and a little wizardry with the remote -- no soldering or other hardware modification is needed. Devices running the latest 3.2 Honeycomb firmware are required, and the detailed instructions will have you running a custom kernel that brings a number of new features:

  • Modified flash plugin with random per box flash string for Content Provider Bypass.
  • Crippled update feature to prevent box from receiving automatic updates.
  • Completely RW system, cache, and rootfs partitions
  • Full ADB Root
  • Removed signature checks on kernel / init scripts / init binary
  • A few other surprises.
  • BETA: Enable NTFS Support for Sony Google TV devices

In layman's terms, this means that your GTV is rooted with full write permissions to the file system, won't auto-update and break things, uses a desktop identity for site that use flash to play streaming video (like Hulu), and has some sort of surprises for us. We like surprises.

As mentioned, the process doesn't require any hardware modification. That doesn't mean it's easy, and the instructions look like this is something you'll want to carefully read. You'll be downgrading the software and exploiting it via some image files you burn to four individual USB thumb drives. Once complete, you'll be able to boot your GTV normally and the thumb drives are no longer required. Of course, any warranty is gone the minute you start doing these sorts of shenanigans, so keep that in mind. If you're the curious type, head to the source link and have a look. 

Source: GTV Hacker

 

Reader comments

Sony Google TV rooted to allow unsigned kernels, no soldering required

1 Comment