Willster419
The Casio Smartphone Guru
I just wanted to let you guys know that this phone can now be safely rooted, once some features are installed/enabled.
there are two ways for rooting currently available. The scripting exploit and the fastboot exploit. the scripting exploit is good if you want a quick root and don't plan to do any developing. However, for those that want to develop/always have a fallback, follow this:
turn on adb from settings
enable bypass booting (see rasta's thread)
go to fastboot.
install GNM recovery.img and Monkeytools modded boot.img.
nandroid backup
use rooting option.
(optional) install a rom and/or updates/themes
nandroid backup again.
then you will be all set. this is what i had on my phone, and i got it once accidentally to the point of no return. the "/system" was wiped! I can verify this because i went to "adb pull /system" and there was nothing. adb devices showed my "1234567890abcd" device. lol. thankfully, monkeytools enabled adb service in his boot.img, so i was able to adb reboot recovery. because of GNM recovery.img, i could restore a nandroid.
alternativly, you can do the script exploit, and then comence the following porcedure, skipping the rooting part. this phone should be much more open to devs now, just in time for the casio commando 2
i will eithor post a series of screenshots or make a youtube vid on the fastboot exploit and safe developing checklist.
there are two ways for rooting currently available. The scripting exploit and the fastboot exploit. the scripting exploit is good if you want a quick root and don't plan to do any developing. However, for those that want to develop/always have a fallback, follow this:
turn on adb from settings
enable bypass booting (see rasta's thread)
go to fastboot.
install GNM recovery.img and Monkeytools modded boot.img.
nandroid backup
use rooting option.
(optional) install a rom and/or updates/themes
nandroid backup again.
then you will be all set. this is what i had on my phone, and i got it once accidentally to the point of no return. the "/system" was wiped! I can verify this because i went to "adb pull /system" and there was nothing. adb devices showed my "1234567890abcd" device. lol. thankfully, monkeytools enabled adb service in his boot.img, so i was able to adb reboot recovery. because of GNM recovery.img, i could restore a nandroid.
alternativly, you can do the script exploit, and then comence the following porcedure, skipping the rooting part. this phone should be much more open to devs now, just in time for the casio commando 2
i will eithor post a series of screenshots or make a youtube vid on the fastboot exploit and safe developing checklist.