Android ’s new 1.1 update does n’t include multitouch because Google is scared of Apple . We are not , however , and nor should you be - come after our guide to get iPhone - like multitouch browsing on your G1 decent now .
As rag yesterday , this update will also give you all the new Android 1.1 microcode feature , so if you have n’t obtain your over - the - air update from T - Mobile yet , wait no more and pursue our scout . And on top of the added multitouch features , the hack ROM you ’re start to install will also let in ready to hand theme access to your G1 for further hacking .
Many thanks in particular to the common people at thexda - developers forum , the # 1 hangout for HTC phone tweakers on the web .

What You ’ll Need :
• Your G1
• USB cord

•JFv1.41_RC33.zip - an Android RC33 ROM With Multitouch assembled by a nice chap that goes by the name of JesusFreke .
• An oldRC29 ROM(with root entree microbe )
• An Androidrecovery image

• A micro - South Dakota notice lecturer ( maybe , if you mess up things up )
• TheAndroid SDK(for installing more multitouch demos )
permit ’s get take up :

Downgrade Your Android Software to Gain Root Access
Even though Android is open source , access to the root user is incapacitate by nonpayment , so you still have to solve to get source access . To do that you have to exploit a well publicized bug in an earlier Android build that well allows you to slip into source access easily .
Note : In doing this , you will lose everything you have economize to your phone . Your synced Google Account info will of course stay put , but you ’ll mislay your installed apps , text messages , and anything you have on your South Dakota card . Searching “ relief ” in the Android Market will chair you to apps that can backup your SMS messages and other files .

1 . Your phone is likely run either the RC30 ( 1.0 ) or the new RC33 ( 1.1 ) version of the Android package ( you may check under options - > About earpiece - > Build number ) . RC29 is the one with the hemipteran , so you ’ll need todownload that lodge here(grabthis oneif you ’re in the UK , and perhaps look for out aUK - specific templet , as we ’re sing North American language here and I do n’t need you to bruise your speech sound ) .
2 . Reformat your phone ’s South Dakota wag to the FAT32 format .
3 . Rename the download Indian file to exactly this : DREAIMG.NBH in all caps for the extension phone and the filename . It matter . It will still show up with a lowercase extension in the bootloader , but that ’s OK , as long as the filing cabinet you discharge on your South Dakota board was distinguish properly , you wo n’t get a FAIL .

4 . drop off the downloaded and rename RC29 file onto your Mount Rushmore State card via USB , power your sound off , and then power it back on while defy down the television camera push . This will bring you into the bootloader . crusade the power push button to start out the update , which will pass over your phone and instal the old package .
5 . When it ’s done you should get a declaration of winner . After that , score the trackball button ( recognize as the “ action mechanism push ” in the darker time out of the G1 ’s bootloader ) and then weightlift Call , Menu and closing simultaneously to boot into your downgraded G1 . You ’ll see that you ’re starting from scratch .
6 . Sign in to your Google business relationship and then grab the “ Telnet ” app from the market . You ’ll require this to overwork your newly gained root approach .

refresh your G1 With a Multitouch - enable ROM
Now that you have not only the permit but the impulse to do naughty thing with root admission , it ’s time to deploy the updated Android file .
These are assemble by a nice chap that pass by the name of JesusFreke on various phone - hacking forum . He ’s the one , primarily , who made all this multi - touching on the G1 possible .

1 . Grab Le Freke’sRC33 v1.41 ROM(the one with multitouch good baked in ) and rename it from “ JFv1.41_RC33.zip ” to “ update.zip”-all lowercase - and re-create it to your South Dakota batting order .
2 . Alsograb this tweaked “ recovery.img”file and also simulate it to your SD card . Eject your SD card from your screen background and disconnect the USB cable when you ’re done .
3 . Now that you ’re in the exploit - y RC29 version , your phone will start responding to various Linux commands you type on the keyboard no matter what you find to be doing in Android at the fourth dimension . Fun ! What you need to typecast to get root admission is :

UPDATE : Due to some HTML outlandishness , this instruction did n’t show up properly before . What you have to do here is press the enter key twice , then typewrite “ telnetd ” ( no quotation ) and then hit enter once more . Sorry for the confusion :
[ enter ] [ enter ] telnetd [ enter ]
You may find yourself in some odd place in the OS , but it does n’t matter - if done correctly , a telnet server should be running in the backdrop on your phone .

4 . open up up the Telnet app you download from the Market , type in “ localhost ” in the corner if it ’s not there already , and tap “ link up to server . ” You ’ll see some uncanny American Standard Code for Information Interchange characters , but all should be well . To prove , type this in at the prompt ( check that you ’ve eject your SD card from your computer and detached the USB cable ):
ls /sdcard
You should see the names of the files you copy ( if you do n’t , adjudicate step 3 and 4 again ) .

5 . Now it ’s time for some more command line magic . You ’ll call for to type four more commands to mount the file system in a writeable State Department , modify to the system directory , copy the recovery.img file from your South Dakota bill to your headphone ’s /system directory , and flash the recovery simulacrum , in that order :
mount -o remount , rw /dev / mental block / mtdblock3 /system
cd /system

cat /sdcard / recovery.img > recovery.img
flash_image retrieval recovery.img
You wo n’t get any response from any of these commands other than a slight pause before the next prompting come along - that means you ’ve done everything correctly . If you get any erroneous belief substance , check for typos and try again .

6 . Power down your phone , then power it back on again . One power cycle is ask to nail the conjuring trick .
7 . Power down your phone AGAIN . And now , while off , start it up by holding the domicile release along with Power ; your phone will enter into retrieval modality , which unremarkably usher a precaution icon with a speech sound , but will in this case stream a clump of Linux code on the screen . await for that to calm down , and you will gain the read-only storage flash screen of Mr. Freke ’s invention . If all looks safe , press Alt+S to dart your ROM , then press Home+Back when propel to resume into your multitouch - enabled G1 .
8 . spread out up the web web browser , and hear the ol’ pinch - to - soar gesture . Hey , what ’s that ? Zooming ! It ’s not illumine tight at the moment , but I ’d say it still beats pressing positive and minus button to zoom .
![]()
While Mr. JesusFreke is creditworthy for packaging this up for consumption , we can thank Mr. Luke Hutchison for the actual multitouch steganography . His blog sheds more sixth sense on the body politic of the multitouch execution you ’re now playing with , and illustrates how it will before long amend . But have ’s play some more .
Download More Multitouch - Enabled Apps
In the flashed read-only memory you just installed , only the WebKit web browser has been pull off to accept multitouch input . But your merriment sha n’t stop there . Hutchison has allow a few more demo apps - admit a bare Google Maps app , photo internet browser and fun Multitouch visualiser . you’re able to download them all in .apk bundle format fromhis site .

To put in an APK software package via the Android SDK , make certain you ’ve enable “ Unknown sources ” under options - > Applications , then followthese educational activity for Windowsor , for Mac :
1 . start the Terminal and navigate to the directory where you unzip the Android SDK ( you could auto - filling the Unix path to any file or directory in Finder by tangle it to the cursor point in Terminal ):
cd

2 . Then , with your phone plug in via USB , eccentric :
./tools / adb install
3 . After the “ Success ” message , voila , the app is now on your phone .
And that ’s about it ! Enjoy multitouch browsing , and for more Android hacking on the G1 , learn out these sites :
reference
•AndroidWiki
•XDA Developers Wiki
•XDA Developers Forum
AndroidcellphonesGoogleguidesHow Tot - mobile g1tethering
Daily Newsletter
Get the best technical school , skill , and culture newsworthiness in your inbox daily .
News from the future , delivered to your present tense .