Kobo had hackers in mind when it made the Kobo Aura H2O

Kobo had hackers in mind when it made the Kobo Aura H2O

We recently echoed a leak of some new eReaders by Kobo, it seems that in a few weeks we will have them on the street, so many of us are crawling the entire web in order to find something new about Pika and Alyssum. One of these trackers has not found anything about these eReaders but if something very curious about the Kobo Aura H2O, a way to hack the eReader that could change the interest of the eReader.

If you remember in this post On how to convert a Kobo eReader into an android tablet, one essential thing was to insert an android image into a microsd card that had to replace the main image. Another system was similar but instead we had to run out of the external microsd card reader.

What was found recently in the reports about the Kobo Aura H2O is that the internal microsd card is not soldered to the board as in previous models but is a microsd card inserted in a slot. This gives owners a lot of freedom and, needless to say, hackers, since anyone who wants to insert an Android or Ubuntu image can do so without changing the eReader software or losing data or device warranty.

The Kobo Aura H2O's storage device is tuned for hackers

This seems silly that has been overlooked by many, is actually something important because it not only allows hackers to make modifications in the reader but also implies that Kobo itself is in a way consenting to such developments being made.

A short time ago I was lucky enough to be able to see and examine the Tagus Lux 2015 an eReader that was based on Android and that if you had root access, you could install any reading app, from the Casa del Libro to that of Amazon. I think that with the Kobo Aura H2o you can do the same, but What will Kobo get out of it?


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Celery said

    Could it be that common sense has entered him and he has realized that putting doors to the field is an immature and disrespectful behavior towards your clients? Could it be that if you manufacture what you want, you will win, although at present it seems that the brands are against the customer and not for the customer? Could it be that what customers ask for is also good for her? Could it be that we are not all crazy? ...