I got my Shift today. The existing root exploit for other Froyo devices work just fine on this one. I initially tested with `rageagainstthecage-arm5.bin`, without success- the phone has to be rebooted before you can `adb shell` into it again.
I then tried with z4root and it worked fine. The Superuser app must be installed first, install and run z4root. I set it to do the temporary root- on screen it said it worked but shell was still $. Ran it again, this time superuser access was requested on screen. Once granted it went fine. I was then able to remount /system and copy busybox and su to /system/bin.
Happy to see Google not patching these exploits, thanks!
I then tried with z4root and it worked fine. The Superuser app must be installed first, install and run z4root. I set it to do the temporary root- on screen it said it worked but shell was still $. Ran it again, this time superuser access was requested on screen. Once granted it went fine. I was then able to remount /system and copy busybox and su to /system/bin.
Happy to see Google not patching these exploits, thanks!