Hacking on the Amazon Kindle 4 Non-Touch model.
| UNFORTUNATELY, THIS NOTICE SEEMS TO BE NECESSARY: This page is not a "cookbook", and it does NOT contain "recipes" that you should follow without thinking.
This page contains technical descriptions for a complex device. If you follow the procedures outlined below (especially the more technical ones), you should AT LEAST have a rough understanding of what you are doing, and be able to describe the expected result. If you don't know what to expect, then it's likely that you don't know what you are actually doing, so it might be better to refrain from doing it in the first place.
 K4 index
Index of the K4 category threads, posts and off-site resources.
The jailbreak itself does not yet allow you to do much. In fact, it only installs an additional "developer" key on the device, allowing for the installation of additional packages via the Kindle's own update mechanism.
This method works on Kindle 4 version 4.0.0 through 4.1.0.
Carefully read all of the instructions below, and follow them only after you have read everything and are sure what to do.Universal method
- Download and unzip the jailbreak.
- Plug in the Kindle and copy data.tar.gz and ENABLE_DIAGS to the Kindle's USB drive's root
- Safely remove the USB cable and restart the Kindle (Menu -> Settings -> Menu -> Restart)
- Once the device restarts into diagnostics mode, select "D) Exit, Reboot or Disable Diags" (using the 5-way keypad)
- Select "R) Reboot System" and "Q) To continue"
- Wait about 20 seconds: you should see the Jailbreak screen for a while, and the device should then restart normally
- After the Kindle restarts, you should see a new book titled "You are Jailbroken", if you see this, the jailbreak has been successful.
What's next? Well, check the Index for misc stuff (custom screen savers? fonts?), but for more fun stuff, you'll want to gain SSH access to this thing. You have two possibilities, one of them depending on the age of your device:
If you have a silver Kindle (the one that came out in fall 2011), there's a good chance the SSH server installed on the diags partition is still working:
- Jot down your Kindle S/N (from the Settings menu).
- Plug in the Kindle and create a blank file named ENABLE_DIAGS in the Kindle's USB drive's root
- Safely remove the USB cable and restart the Kindle (Menu -> Settings -> Menu -> Restart). It should reboot in diagnostics mode.
- Plug in the USB cable and go to usb networking: Misc individual diagnostics -> Utilities -> Enable USBnet -> Exit. This will enable network access to your Kindle via USB.
- For Windows users: You'll probably need to install a specific driver, if Windows fail to autodetect everything. This .inf file should do the job (except on Windows XP, see the next paragraph).
- For Windows XP only: In your PC a new device will appear: "RNDIS\Ethernet card", with VID_0525 & PID_A4A2. The driver for this device can be found here, with its accompanying .inf file.
- For Mac OS: Navigate to your network settings (System Preferences -> Network). Select "RNDIS/Ethernet Gadget" from the left side panel. Choose ‘manual’ from the IPv4 drop-down menu.
- Setup your new network interface: IP 192.168.15.201 Subnet 255.255.255.0 (ifconfig usb0 192.168.15.201 on Linux).
- Connect to email@example.com using your favorite SSH client (Mac OS users can use Terminal, type ssh firstname.lastname@example.org). If you unbricked your Kindle with an image from one of our debricking threads, chances are the password will be mario.
- If it isn't, you have a few choices: with your S/N in hand,
- And you're in :)
- When you done, press Right a few times and go to 'Exit, Reboot or Disable Diags' -> 'Disable Diagnostics'
If you don't (SSH on diags is disabled on newer devices, like all Black Kindles from fall 2012), or if you prefer to have an SSH access from the main system (along with a few other nifty features, like SSH over WiFi), install the USBNet hack.
 Debricking / Un-demoing / Flashing firmware
The recommended tool for debricking and un-demoing Kindle 4 is a Linux LiveCD/LiveUSB called Kubrick.
For other possibilities and information take a look into the "Simple debricking..." thread.