This morning, the following was posted on the GTVHacker blog…
Hello Universe, welcome back. It’s been a while since our last post due to a lack of new Google TV hardware and developments. When we have free time we tend to look at other interesting opportunities that come our way and recently we came into just such a situation when we found ourselves auditing multiple Roku devices.
The entire GTVHacker team has put a lot of work into this release and we hope the Roku community enjoys it. We invite others to continue our work and are happy to share progress made while we work to further leverage the current exploits before a patch is released. In the mean time, if you have a second generation Roku, root it. And if you don’t, buy one quick!
A new poster to the Roku fan forum announced that the GTVHacker had exploited a security hole on the Roku streamer and that some of the devices could be permanently rooted. A short time later, discussions of the exploit were purged from the fan site.
- Roku Forums • View topic – Is it possible to gain root access in Roku_1/2
- Roku Forums • View topic – Is it possible to gain root access in Roku_2/2
- Roku Forums • View topic – Roku player software cracked open…root to run XBMC
- GTVHacker Article
- GTVHacker: How to Root Your Roku
- Engadget Article
Apparently, you can control updates to your Roku by restricting access to austin.sw.roku.com and giga.sw.roku.com on your router (add those two sites to its list of blocked sites).
I have not tested any of this. If you choose to, you may violate Roku’s ToS or damage your streamer, so proceed with caution and at your own risk.