Whilst I will gracefully accept your thanks for assisting you with setting up the dependencies on OSX, the terminal work, and the OSX compiled rkflashtool, I must make it clear that all credits for the method of rooting the hudl remain with Paul O'Brien.
A guide for others on how to root their hudl from a "stock" OSX build would be extremely welcome however I suggest we leave the releasing of the OSX rkflashtool to Paul O'Brien, who i know has this in hand, for the sake of continuity :)
Unsure of the build version, basically got the hudl home a couple of hours ago.. (first android device, however ive been jailbreaking iOS devices for about 5 years), havent updated the firmware to "version 1.2" to be safe, I decided to sniff the update procedure in wireshark (requests to device.mobile.tesco.com and d21u4yd4ydm3pd.cloudfront.net seem interesting) attempting to spoof the update procedure into exiting without finding an update on the server however its all TLS encrypted :( Also tried exploring the filesystem with gMTP but its correctly sandboxed.. therefore i have a q
1) is it ok to download the initial update to the device, so i can actually use the bloody thing before rooting it? :)
Other than that let me know how/when you want me to test it