"Give it time." It's something many mums have uttered to their frustrated youth, and it's something that's also uttered amongst the hacker crowd each time a new device emerges. In the case of Google's $35 Chromecast, it took but a couple of days for the HDMI streaming stick to be exploited. Granted, Google's never been one to keep its biggest software projects under lock and key, but for those looking to tinker a bit with their new toy, GTVHacker has the goods. The exploit package has thus far been used to confirm that the software within is not Chrome OS -- it's described by the aforesaid site as "a modified Google TV release, but with all of the Bionic / Dalvik stripped out and replaced with a single binary for Chromecast." Those interested in giving it a go themselves can test their luck here, while the timid among us can hop on past the break for a video.
Chromecast bootloader exploit surfaces, opens up plenty of possibilities (video)
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission. All prices are correct at the time of publishing.