No device is safe from Dan Rosenberg. Most famous for his earlier Motorola DROID exploits unlocking the bootloader of devices previously thought to be unhackable, the man has found another exploit that affects a staggering amount of devices.
At the Blackhat 2014 conference, Rosenberg demonstrated this exploit by unlocking the bootloader of a Moto X on stage. However, this exploit affects pretty much any device with a Snapdragon processor that has not been patched. Devices like the Galaxy S 4, Galaxy Note 3, HTC One (M7), LG G2, Nexus 4, Nexus 5 and many more are still vulnerable.
But since he published this exploit a month ago, some manufacturers have started patching devices. The Galaxy S5 and One (M8) are both safe, and other devices could be safe as well. With security updates constantly rolling out with minimal details in the changelog, many of our devices could be safe now.
This really isn’t a method of unlocking bootloaders for the hackers, as Rosenberg hasn’t released any sort of tools to do it with. However, developers might create some tools to unlock your bootloader before the exploit is patched. But it’s pretty crazy that a processor manufacturer ended up having such a big security hole put into every device made with its hardware.