Rooting (Android)

Last updated

Rooting [1] is the process by which users of Android devices can attain privileged control (known as root access) over various subsystems of the device, usually smartphones and tablets. Because Android is based on a modified version of the Linux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or macOS.

Contents

Rooting is often performed to overcome limitations that carriers and hardware manufacturers put on some devices. Thus, rooting gives the ability (or permission) to alter or replace system applications and settings, run specialized applications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. On some devices, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system.

Root access is sometimes compared to jailbreaking devices running the Apple iOS operating system. However, these are different concepts: Jailbreaking is the bypass of several types of Apple prohibitions for the end user, including modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved (not available on the App Store) applications via sideloading, and granting the user elevated administration-level privileges (rooting). Many vendors such as HTC, Sony, OnePlus, Asus, Xiaomi, and Google explicitly provide the ability to unlock devices, and even replace the operating system entirely. [1] [2] [3] [4] Similarly, the ability to sideload applications is typically permissible on Android devices without root permissions. Thus, it is primarily the third aspect of iOS jailbreaking (giving users administrative privileges) that most directly correlates to Android rooting.

Rooting is distinct from SIM unlocking and bootloader unlocking. The former allows removing the SIM card lock on a phone, while the latter allows rewriting the phone's boot partition (for example, to install or replace the operating system). [5]

Overview

Rooting lets all user-installed applications run privileged commands typically unavailable to the devices in the stock configuration. Rooting is required for more advanced and potentially dangerous operations including modifying or deleting system files, removing pre-installed applications, and low-level access to the hardware itself (rebooting, controlling status lights, or recalibrating touch inputs.) A typical rooting installation also installs the Superuser application, which supervises applications that are granted root or superuser rights by requesting approval from the user before granting said permissions. A secondary operation, unlocking the device's bootloader verification, is required to remove or replace the installed operating system.

In contrast to iOS jailbreaking, rooting is not needed to run applications distributed outside of the Google Play Store, sometimes called sideloading. The Android OS supports this feature natively in two ways: through the "Unknown sources" option in the Settings menu and through the Android Debug Bridge. However, some US carriers, including AT&T, have prevented the installation of applications not on the Play Store in firmware, [6] although several devices are not subject to this rule, including the Samsung Infuse 4G; [7] AT&T lifted the restriction on most devices by the middle of 2011. [8]

As of 2011, the Amazon Kindle Fire defaults to the Amazon Appstore instead of Google Play, though like most other Android devices, Kindle Fire allows sideloading of applications from unknown sources, [9] and the "easy installer" application on the Amazon Appstore makes this easy. Other vendors of Android devices may look to other sources in the future. Access to alternate apps may require rooting but rooting is not always necessary.

Advantages

Screenshot of Magisk on a Samsung Galaxy phone, an application to manage root access in Android Magisk 26.4 screenshot.png
Screenshot of Magisk on a Samsung Galaxy phone, an application to manage root access in Android

Advantages of rooting include the possibility for complete control over the appearance, feel, and behaviour of the device. As a superuser has access to the device's system files, all aspects of the operating system can be customized with the only real limitation being the level of coding expertise. [10] Immediately expectable advantages of rooted devices include the following: [11] [12]

Disadvantages

Some disadvantages of rooting include:

Rooting allows the user to obtain privileged access to a phone. It does not allow a user to install a new OS (custom firmware or custom ROM) or recovery image, and it doesn't allow a phone that is locked to a certain carrier to be used on another one. Related operations allow these.

Bootloader unlock

Bootloader unlocking is sometimes a first step used to root the device; however, it is not the same as rooting the device. [24] Most devices come with a locked bootloader, which prevents users from installing a new boot image, which is often flashed when rooting a device or using a custom ROM. [25] The bootloader runs on device start-up and is in charge of loading the operating system on the phone. [26] It is generally in charge of verifying that phone system information hasn't been tampered with and is genuine. Nonetheless, people still perform this operation, as unlocking the bootloader allows users to install custom ROMs. [27]

The first step to do this is to generally to set up OEM unlocking, [28] and then to follow manufacturer specific instructions. [24] Not all devices can be bootloader unlocked, and some can only be unlocked with an exploit which usually needs a privilege escalation bug in order to remove software locks, which includes most LG V20 models and Verizon-sold Google Pixel devices. [29] [30]

The process of unlocking the bootloader might involve a factory reset, erasing all user data, third-party applications, and configuration. [31] [32]

SIM unlock

SIM unlocking allows a phone that is locked to a certain carrier to be used on a different carrier. The instructions vary per device and carrier, but this might be done by first requesting the carrier to unlock the phone or purchasing an unlock code online. [33]

Methods

Some rooting methods involve the use of a command prompt and a development interface called the Android Debug Bridge (also known as ADB), while other methods may use existing vulnerabilities in devices. Due to similarly modeled devices often having a multitude of changes, rooting methods for one device when used for a different variant can result in bricking the device.

"Systemless root" is a variant of rooting in which the underlying device file system is not modified. Systemless root uses various techniques to gain root access without modifying the system partition of a device. Some root applications may include a "hiding" function, which makes attempts to mask the effects and results of rooting, often by whitelisting certain applications for the root or blocking access to affected files. [34] Systemless rooting has the advantage of not triggering the software-based version of SafetyNet, an Android feature that works by monitoring changes to system files and is used by applications such as Google Pay to detect whether a device has been tampered with such as by rooting. However, hardware-backed SafetyNet versions may be triggered by systemless rooting, as well as in unrooted devices shipped without Google Mobile Services (GMS). [35] [36] [37] [38] [39]

The distinction between "soft rooting" through a security vulnerability and "hard-rooting" by flashing a su binary executable varies from exploit to exploit, and manufacturer to manufacturer. Soft-rooting requires that a device be vulnerable to privilege escalation, or replacing executable binaries. Hard-rooting is supported by the manufacturer, and it is generally only exposed for devices the manufacturer allows. [40] If a phone can be soft-rooted, it is also inherently vulnerable to malware. [40]

Rooting through exploits

The process of rooting varies widely by manufacturer and device but sometimes includes exploiting one or more security bugs in the firmware (i.e., in the version of the Android OS installed on) of the device. [40] Once an exploit is discovered, a custom recovery image that will skip the digital signature check of firmware updates can be flashed. Then a modified firmware update that typically includes the utilities needed to run apps as root can be installed. For example, the su binary (such as an open-source one paired with the Superuser [41] or SuperSU application [42] ) can be copied to a location in the current process' PATH (e.g., /system/xbin/) and granted executable permissions with the chmod command. A third-party supervisor application, like Superuser or SuperSU, can then regulate and log elevated permission requests from other applications. Many guides, tutorials, and automatic processes exist for popular Android devices facilitating a fast and easy rooting process.

The process of rooting a device may be simple or complex, and it even may depend upon serendipity. For example, shortly after the release of the HTC Dream (HTC G1), it was discovered that anything typed using the keyboard was being interpreted as a command in a privileged (root) shell. Although Google quickly released a patch to fix this, a signed image of the old firmware leaked, which gave users the ability to downgrade and use the original exploit to gain root access. Installable apps have managed to unlock immediate root access on some early 2010s Samsung smartphones. This has also been referred to as "one-click rooting". [43]

A security researcher, Grant Hernandez, demonstrated a use-after-free exploit in Binder, Android's IPC framework, to gain root privileges. [44] This exploit, tagged CVE-2019-2215, was alleged to be sold by the NSO Group. [45]

Rooting through manufacturer

Some manufacturers, including Xiaomi, OnePlus, and Motorola, provide official support for unlocking the bootloader, allowing for rooting without exploiting a vulnerability. [46] However, the support may be limited only to certain phones – for example, LG released its bootloader unlock tool only for certain models of its phones. [47] Also, a manufacturer could discontinue bootloader unlocking support, as was the case with LG [48] and Huawei. [49]

The Google Nexus and Pixel line of devices can have their bootloader unlocked by simply connecting the device to a computer while in bootloader mode and running the Fastboot protocol with the command fastboot oem unlock on older devices, [50] or fastboot flashing unlock on newer devices. [51] After a warning is accepted, the bootloader is unlocked, so a new system image can be written directly to flash without the need for an exploit. Additionally, Pixel phones sold via certain carriers like Verizon disallow bootloader unlocking, [52] while others such as T-Mobile require a phone to be paid off and SIM unlocked before the bootloader can be unlocked. [53]

Difficulties

In the past, many manufacturers have tried to make non-rootable phones with more elaborate protections (like the Droid X), but exploits are usually still found eventually. There may be no root exploit available for new, or outdated phones. [54]

Industry reaction

Until 2010, tablet and smartphone manufacturers, as well as mobile carriers, were mainly unsupportive of third-party firmware development. Manufacturers had expressed concern about improper functioning of devices running unofficial software [55] and related support costs. Moreover, firmware such as OmniROM and CyanogenMod sometimes offer features for which carriers would otherwise charge a premium, such as tethering. Due to that, technical obstacles such as locked bootloaders and restricted access to root permissions have commonly been introduced in many devices. For example, in late December 2011, Barnes & Noble and Amazon.com, Inc. began pushing automatic, over-the-air firmware updates, 1.4.1 to Nook Tablets and 6.2.1 to Kindle Fires, that removed one method to gain root access to the devices. The Nook Tablet 1.4.1 update also removed users' ability to sideload apps from sources other than the official Barnes & Noble app store (without modding). [56] [57]

However, as community-developed software began to grow popular in the late 2009 to early 2010, [58] [59] and following a statement by the Copyright Office and Librarian of Congress (US) allowing the use of "jailbroken" mobile devices, [60] [61] manufacturers and carriers have softened their position regarding CyanogenMod and other unofficial firmware distributions. Some manufacturers, including HTC, [62] Samsung, [63] Motorola [64] and Sony, [65] actively provide support and encourage development.

In 2011, the need to circumvent hardware restrictions to install unofficial firmware lessened as an increasing number of devices shipped with unlocked or unlockable bootloaders, similar to the Nexus and Pixel series of phones. Device manufacturer HTC has announced that it will support aftermarket software developers by making the bootloaders of all new devices unlockable. [55] However, carriers, such as Verizon and more recently AT&T, have continuously blocked OEMs from releasing retail devices with unlocked bootloaders, opting instead for "developer edition" devices that are only sold unsubsidized and off-contract. These are similar in practice to Nexus devices, but for a premium and with no contract discounts. More recently, since 2019, AT&T has allowed Pixel devices to have unlockable bootloaders once a device is paid off and SIM unlocked. [66]

In 2014, Samsung released a security feature called Knox, which verifies whether system and boot files were modified. If custom firmware was flashed, the eFuse is set to 0x1, permanently voiding the warranty and disabling Knox-enabled features such as Samsung Pay. [67] Additionally, certain Samsung devices lack the ability to flash custom software, namely Samsung phones and tablets released in North America after 2015, with an exception for devices lacking a cellular modem, [68] although there are exploits that can unlock the bootloader on some affected devices running older One UI versions. [69]

Legality

International treaties have influenced the development of laws affecting rooting. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against digital rights management (DRM) circumvention. The American implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as rooting. The 2001 European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as to run alternative software, [70] but member states vary on the implementation of the directive.

Australia

In 2010, Electronic Frontiers Australia said that it is unclear whether rooting is legal in Australia, and that anti-circumvention laws may apply. [71] These laws were strengthened by the Copyright Amendment Act 2006.

Canada

In November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with digital locks, with exceptions including software interoperability. [72] Rooting a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.

There had been several efforts from 2008 to 2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive, [73] but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly broad Copyright Act amendments could prohibit. [74]

European Union

The Free Software Foundation Europe argues that it is legal to root or flash any device. According to the European Directive 1999/44/EC, replacing the original operating system with another does not void the statutory warranty that covers the hardware of the device for two years unless the seller can prove that the modification caused the defect. [75]

United Kingdom

The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Rooting may be a form of circumvention covered by that law, but this has not been tested in court. [70] [76] Competition laws may also be relevant. [77]

India

India's copyright law permits circumventing DRM for non-copyright-infringing purposes. [78] [79] Indian Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012. [80] India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty. [78] [79]

New Zealand

New Zealand's copyright law allows the circumvention of technological protection measure (TPM) as long as the use is for legal, non-copyright-infringing purposes. [81] [82] This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.

Singapore

Rooting might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court. [83]

United States

The Unlocking Consumer Choice and Wireless Competition Act guarantees that consumers can unlock or let others unlock their phones. Under the Digital Millennium Copyright Act (DMCA) rooting was illegal in the United States except by exemption. The U.S. Copyright Office granted an exemption to this law "at least through 2015". [84]

In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit rooting. [85] [86] In their ruling, the Library of Congress affirmed on July 26, 2010, that rooting is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.

On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset". However, the U.S. Copyright office refused to extend this exemption to tablets, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects. [87] [88] [89] The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013. [88]

Tim Wu, a professor at Columbia Law School, argued in 2007 that jailbreaking is "legal, ethical, and just plain fun". [90] Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA. [91] Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so. [90] In 2010 and 2012, the U.S. Copyright Office approved exemptions to the DMCA that allow users to root their devices legally. [92] It is still possible to employ technical countermeasures to prevent rooting or prevent rooted phones from functioning. [93] It is also unclear whether it is legal to traffic in the tools used to make rooting easy. [93]

See also

Notes

  1. /sys/class/power_supply/battery/siop_level is a shorthand symbolic link to that system file.

Related Research Articles

A SIM lock, simlock, network lock, carrier lock or (master) subsidy lock is a technical restriction built into GSM and CDMA mobile phones by mobile phone manufacturers for use by service providers to restrict the use of these phones to specific countries and/or networks. This is in contrast to a phone that does not impose any SIM restrictions.

<span class="mw-page-title-main">Privilege escalation</span> Gaining control of computer privileges beyond what is normally granted

Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application or user with more privileges than intended by the application developer or system administrator can perform unauthorized actions.

Boot ROM is a piece of read-only memory (ROM) that is used for booting a computer system. It contains instructions that are run after the CPU is reset to the reset vector, and it typically loads a bootloader. There are two types of boot ROM: a mask boot ROM that cannot be changed afterwards and a writable boot ROM such as an EEPROM or a flash memory chip.

Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen-based mobile devices such as smartphones and tablets. Android has historically been developed by a consortium of developers known as the Open Handset Alliance, but its most widely used version is primarily developed by Google. First released in 2008, Android is the world's most widely used operating system; the latest version, released on October 15, 2024, is Android 15.

<span class="mw-page-title-main">Nexus One</span> 2010 Android smartphone by HTC

The Nexus One is an Android smartphone designed and manufactured by HTC as Google's first Nexus smartphone. The Nexus became available on January 5, 2010, and features the ability to transcribe voice to text, an additional microphone for dynamic noise suppression, and voice guided turn-by-turn navigation to drivers.

iOS Mobile operating system by Apple

iOS is a mobile operating system developed by Apple exclusively for its mobile devices. It was unveiled in January 2007 for the first-generation iPhone, which launched in June 2007. Major versions of iOS are released annually; the current stable version, iOS 18, was released to the public on September 16, 2024.

<span class="mw-page-title-main">HTC Dream</span> Android smartphone designed by HTC introduced in 2008

The HTC Dream is a smartphone developed by HTC. First released in September 2008 for $179 with a 2-year contract to T-Mobile, the Dream was the first commercially released device to use the Linux-based Android operating system, which was purchased and further developed by Google and the Open Handset Alliance to create an open competitor to other major smartphone platforms of the time, such as Symbian, BlackBerry OS, and iPhone OS. The operating system offers a customizable graphical user interface, integration with Google services such as Gmail, a notification system that shows a list of recent messages pushed from apps, and Android Market for downloading additional apps. This operating system's debut would later be followed by the Samsung Galaxy i7500, the first in what would become the long-running Samsung Galaxy series.

<span class="mw-page-title-main">Digital Millennium Copyright Act</span> United States copyright law

The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998, by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users.

iOS jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by Apple on devices running iOS and iOS-based operating systems. It is typically done through a series of kernel patches. A jailbroken device typically permits root access within the operating system and provides the right to install software unavailable through the App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.

The Android Dev Phone (ADP) is a SIM-unlocked and bootloader unlocked Android device that is designed for advanced developers. While developers can use regular consumer devices purchased at retail to test and use their apps, some developers may choose not to use a retail device, preferring an unlocked or no-contract device.

<span class="mw-page-title-main">CyanogenMod</span> Discontinued open-source mobile operating system

CyanogenMod is a discontinued open-source operating system for mobile devices, based on the Android mobile platform. Developed between 2009 and 2016, it was free and open-source software based on the official releases of Android by Google, with added original and third-party code, and based on a rolling release development model. Although only a subset of total CyanogenMod users elected to report their use of the firmware, on 23 March 2015, some reports indicated that over 50 million people ran CyanogenMod on their phones. It was also frequently used as a starting point by developers of other ROMs.

<span class="mw-page-title-main">Hacking of consumer electronics</span>

The hacking of consumer electronics is a common practice that users perform to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer, programming, and electronics hobbyists.

<span class="mw-page-title-main">Nexus S</span> 2010 smartphone by Google and Samsung

The Nexus S is a smartphone co-developed by Google and Samsung and manufactured by Samsung Electronics for release in 2010. It was the first smartphone to use the Android 2.3 "Gingerbread" operating system, and the first Android device to support Near Field Communication (NFC) in both hardware and software.

<span class="mw-page-title-main">Samsung Captivate Glide</span> Smartphone with Slide keyboard

The Samsung Captivate Glide (SGH-i927) as it is called in the United States, and sold as the Samsung Galaxy S Glide (SGH-i927R) in Canada, is the first physical QWERTY Galaxy S class smartphone running under the Android operating system to be released by Samsung for AT&T (US) and Rogers Wireless (Canada).

Samsung Knox is a proprietary security and management framework pre-installed on most Samsung mobile devices. Its primary purpose is to provide organizations with a toolset for managing work devices, such as employee mobile phones or interactive kiosks. Samsung Galaxy hardware, as well as software such as Secure Folder and Samsung Wallet, make use of the Knox framework.

<span class="mw-page-title-main">Unlocking Consumer Choice and Wireless Competition Act</span>

The Unlocking Consumer Choice and Wireless Competition Act is a United States public law that repeals a rulemaking determination by the United States Copyright Office that left it illegal for people to unlock their cellphones.

Custom firmware, also known as aftermarket firmware, is an unofficial new or modified version of firmware created by third parties on devices such as video game consoles, mobile phones, and various embedded device types to provide new features or to unlock hidden functionality. In the video game console community, the term is often written as custom firmware or simply CFW, referring to an altered version of the original system software inside a video game console such as the PlayStation Portable, PlayStation 3, PlayStation Vita/PlayStation TV, PlayStation 4, Nintendo 3DS, Wii U and Nintendo Switch. Installing custom firmware on some devices requires bootloader unlocking.

<span class="mw-page-title-main">Bootloader unlocking</span> Process of disabling secure device booting

Bootloader unlocking is the process of disabling the bootloader security that makes secure boot possible. It can make advanced customizations possible, such as installing custom firmware. On smartphones, this can be a custom Android distribution or another mobile operating system. Some bootloaders are not locked at all and some are locked, but can be unlocked with a command or with assistance from the manufacturer. Some do not include an unlocking method and can only be unlocked through a software exploit.

The booting process of Android devices starts at the power-on of the SoC and ends at the visibility of the home screen, or special modes like recovery and fastboot. The boot process of devices that run Android is influenced by the firmware design of the SoC manufacturers.

Thor is a communication protocol which is mainly used to communicate with the Bootloader of Samsung devices to make it write files into various partitions of the device. It is also possible to list the partitions or to reboot the phone through this protocol.

References

  1. 1 2 "HTC Bootloader Unlock Instructions". htcdev.com. Archived from the original on 27 October 2014. Retrieved 26 October 2014.
  2. "Official Bootloader Unlock instructions". sonymobile.com. Archived from the original on 2014-07-07. Retrieved 2021-08-26.
  3. "How to unlock bootloader on OnePlus smartphones". Archived from the original on 2022-03-10. Retrieved 2012-05-12.
  4. "#unlocking-the-bootloader Google instructions on bootloader unlocking". source.android.co.m. Archived from the original on 21 May 2011. Retrieved 26 October 2014.
  5. "Difference between Rooting, SIM Unlocking & Bootloader Unlocking". www.c-sharpcorner.com. Archived from the original on 2021-02-05. Retrieved 2020-10-01.
  6. "The Official AT&T FAQs". Wireless.att.com. Archived from the original on October 1, 2011. Retrieved December 18, 2011.
  7. "Samsung INFUSE 4G capable of side-loading apps, accessing Amazon Appstore". MobileBurn. May 7, 2011. Archived from the original on May 18, 2013. Retrieved December 18, 2011.
  8. Mike Luttrell (May 19, 2011). "AT&T customers can finally use Amazon's Appstore". TG Daily. Archived from the original on October 29, 2012. Retrieved July 27, 2012.
  9. Austin Krause (December 8, 2011). "How to Enable Sideloading on the Kindle Fire". groovyPost. Retrieved July 27, 2012.
  10. "What Is Rooting Android Phone? Advantages And Disadvantages". Root Mygalaxy. Archived from the original on 18 June 2016. Retrieved 22 November 2014.
  11. "Five Reasons Why Everyone Should "Root" Their Android". Review Lagoon. 30 August 2012. Archived from the original on 6 January 2015. Retrieved 6 January 2015.
  12. Whitson Gordon (10 August 2013). "Top 10 Reasons to Root Your Android Phone". Lifehacker. Gawker Media. Archived from the original on 6 January 2015. Retrieved 6 January 2015.
  13. "Advantages of Rooting Your Android Device". spyappsmobile.com. Archived from the original on 6 October 2014. Retrieved 3 October 2014.
  14. "Scoped Storage in Android Q forces developers to use SAF, which sucks". xda-developers. 2019-05-31. Archived from the original on 2021-04-28. Retrieved 12 June 2021.
  15. "The best task manager apps for Android". Android Authority. 2020-07-11. Archived from the original on 2021-06-13. Retrieved 13 June 2021.
  16. "Android Media Server troši puno baterije. Kako popraviti? |". srbodroid.com (in Croatian). 2013-12-26. Archived from the original on 2021-07-16. Retrieved 2021-07-16.
  17. "How to Downgrade an Android App If You Don't Like the Update". Make Tech Easier. 2016-09-16. Archived from the original on 2021-03-05. Retrieved 12 June 2021.
  18. "Limit charge rate above/below a fixed charge threshold, temperature etc. · Issue #23 · sriharshaarangi/BatteryChargeLimit". GitHub. 2017-08-10. Archived from the original on 2021-06-10. Retrieved 10 June 2021.
  19. "How to Set a Custom Battery Charge Limit in Android device?". Get Droid Tips. 7 September 2020. Archived from the original on 19 July 2021. Retrieved 19 July 2021.
  20. "Does Rooting or Unlocking Void Your Android Phone's Warranty?". How To Greek. 20 June 2017. Retrieved 29 August 2022.
  21. "Huawei shuts down bootloader unlock program". PhoneArena. 2018-05-25. Archived from the original on 2018-05-27. Retrieved 2022-08-29.
  22. "Letter From Verizon to FCC Details Their Stance on Bootloaders". DroidLife. 2012-02-29. Retrieved 2022-08-29.
  23. Siddiqui, Aamir (2016-10-19). "Android SafetyNet Now Reportedly Tripped by Unlocked Bootloaders". XDA Developers. Retrieved 2024-03-24.
  24. 1 2 Congleton, Nicholas. "Easily Unlock Your Android Bootloader With Fastboot". Lifewire. Archived from the original on 2020-10-23. Retrieved 2020-10-01.
  25. "Locking/Unlocking the Bootloader". Android Open Source Project. Archived from the original on 2020-09-24. Retrieved 2020-10-01.
  26. "Overview". Android Open Source Project. Archived from the original on 2020-10-07. Retrieved 2020-10-01.
  27. "What is the bootloader?". Android Central. 2012-01-03. Archived from the original on 2020-10-07. Retrieved 2020-10-01.
  28. "How to Enable OEM Unlocking on Android [OEM Unlock]". The Custom Droid. 2018-03-12. Archived from the original on 2020-10-20. Retrieved 2020-10-01.
  29. "dePixel8 by beaups". Sunshine. 2016-10-20. Archived from the original on 2016-10-31. Retrieved 2023-05-31.
  30. "LG V20 DirtySanta Bootloader unlock and Root guide". XDA. 2016-12-14. Archived from the original on 2020-12-24. Retrieved 2023-05-31.
  31. "Unlock Bootloader - Open Devices - Sony Developer World". developer.sony.com. Archived from the original on 2021-06-10. Retrieved 2021-06-10.
  32. "Unlock Bootloader on Samsung Galaxy Phones and Tablets - A Complete Guide". The Custom Droid. 2021-04-03. Archived from the original on 2021-06-10. Retrieved 2021-06-10.
  33. "How Does Unlocking SIM Cards Work?". Small Business - Chron.com. Archived from the original on 2020-10-01. Retrieved 2020-10-01.
  34. "How to play Pokémon GO (0.37+) on a rooted Android with Magisk". Android Police. 11 September 2016. Archived from the original on 21 May 2017. Retrieved 19 May 2017.
  35. Hager, Ryne (June 29, 2020). "Google's dreaded SafetyNet hardware check has been spotted in the wild". AndroidPolice.com. Archived from the original on August 25, 2021. Retrieved August 26, 2021.
  36. Hoffman, Chris (July 11, 2017). "SafetyNet Explained: Why Android Pay and Other Apps Don't Work on Rooted Devices". How-To Geek. Archived from the original on November 11, 2020. Retrieved August 26, 2021.
  37. "How to (maybe) bypass SafetyNet hardware attestation on devices with an unlocked bootloader". XDA. January 30, 2021. Archived from the original on April 25, 2021. Retrieved August 26, 2021.
  38. "How to Install Magisk on your Android Phone". XDA. August 17, 2021. Retrieved August 26, 2021.
  39. Summerson, Cameron (September 15, 2017). "How to Root Your Android Phone with Magisk (So Android Pay and Netflix Work Again)". How-To Geek. Archived from the original on February 28, 2021. Retrieved August 26, 2021.
  40. 1 2 3 Zhang, Hang; She, Dongdong; Qian, Zhiyun (2015-01-01). "Android Root and its Providers". Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. CCS '15. New York, NY, USA: ACM. pp. 1093–1104. doi:10.1145/2810103.2813714. ISBN   9781450338325. S2CID   7650341.
  41. "ChainsDD/su-binary". GitHub. Archived from the original on 2017-02-26. Retrieved 2016-10-08.
  42. "How to Root Your Android Phone with SuperSU and TWRP". Archived from the original on 2016-10-07. Retrieved 2016-10-08.
  43. "How to Use Framaroot to Root Android Devices". www.coolmuster.com. 2017-05-16. Retrieved 8 February 2022.
  44. "Tailoring CVE-2019-2215 to Achieve Root". hernan.de. 15 October 2019. Archived from the original on 29 December 2022. Retrieved 29 December 2022.
  45. Stone, Maddie (21 Nov 2019). "Bad Binder: Android In-The-Wild Exploit". Google Project Zero. Archived from the original on 22 November 2019.
  46. "Everything you need to know about rooting your Android". Android Central. 2016-06-06. Archived from the original on 2016-10-17. Retrieved 2016-10-08.
  47. "LG Releases Its Long Promised Bootloader Unlock Tool, But It Currently Only Supports The G4 For The EU Open Market (H815)". Android Police. 2015-06-02. Archived from the original on 2016-09-30. Retrieved 2016-10-08.
  48. "LG will shut down its bootloader unlocking service on December 31". XDA Developers. 2021-12-06. Archived from the original on 2022-04-28. Retrieved 2022-05-12.
  49. "Huawei shuts down bootloader unlock program". PhoneArena. 2018-05-25. Archived from the original on 2018-05-27. Retrieved 2022-05-12.
  50. "Building for devices". Google Git. Google Inc. Archived from the original on 10 December 2015. Retrieved 9 December 2015.
  51. "Locking/Unlocking the Bootloader". Android Source. Google Inc. Retrieved 18 January 2023.
  52. "Pixel OEM Unlocking Support". Verizon Forums. Verizon. 20 February 2020. Archived from the original on 3 September 2021. Retrieved 12 May 2022.
  53. "Is the T-Mobile Pixel 6/pro bootloader unlockable?". Reddit. 6 November 2021. Archived from the original on 6 November 2021. Retrieved 12 May 2022.
  54. "Everything You Need to Know About Rooting Your Android Phone". Lifehacker.com. 4 September 2013. Archived from the original on 2014-02-26. Retrieved 2014-02-26.
  55. 1 2 "Unlock Bootloader". Archived from the original on November 1, 2011. Retrieved October 30, 2011.
  56. Smith, Peter (December 21, 2011). "Kindle Fire and Nook Tablet both get 'upgraded' with reduced functionality". ITworld. Archived from the original on January 8, 2012. Retrieved January 10, 2012.
  57. Verry, Tim (December 21, 2011). "Kindle Fire and Nook Tablet Receive Root Access Killing Software Updates". PC Perspective. Archived from the original on August 15, 2012. Retrieved January 10, 2012.
  58. Jason Perlow (January 18, 2011). "CyanogenMod CM7: Teach your old Droid New Tricks". ZDNet. Archived from the original on January 7, 2012. Retrieved January 4, 2012.
  59. "MIUI firmware is "popular"". AndroidAndMe. August 16, 2011. Archived from the original on January 14, 2012. Retrieved January 4, 2012.
  60. Sadun, Erica (July 26, 2010). "LoC rules in favor of jailbreaking". Tuaw.com. Archived from the original on October 30, 2012. Retrieved January 4, 2012.
  61. "Statement of the Librarian of Congress Relating to Section 1201 Rulemaking". Library of Congress. December 1, 2012. Archived from the original on November 16, 2018. Retrieved November 7, 2018.
  62. "HTC's bootloader unlock page". Htcdev.com. Archived from the original on October 19, 2012. Retrieved January 4, 2012.
  63. "CyanogenMod supported by Samsung, gives away Galaxy S2 to devs". ITMag. Archived from the original on January 5, 2015. Retrieved 9 December 2015.
  64. "Motorola Offers Unlocked Bootloader Tool". Techcrunch.com. October 24, 2011. Archived from the original on July 7, 2017. Retrieved January 4, 2012.
  65. Dahlström, Karl-Johan. "Sony Ericsson supports independent developers". Sony Mobile Communications. Archived from the original on 10 December 2015. Retrieved 9 December 2015.
  66. "AT&T Pixel 6 Bootloader: Unlockable?". Reddit. 17 May 2022. Retrieved 29 August 2022.
  67. "All you wanted to know about KNOX Void Warranty 0x1". 2018-12-30. Archived from the original on 2018-12-30. Retrieved 2020-08-27.
  68. "Galaxy S7 Bootloader Lock Explained: You Might Not Get AOSP After All". 2016-03-13. Retrieved 2023-07-05.
  69. "Bootloader Unlock for Samsung US/Canada Devices". 2021-01-08. Retrieved 2023-07-05.
  70. 1 2 Duncan Geere (July 28, 2010). "Investigation: Is it legal to jailbreak a UK iPhone?". Wired UK. Archived from the original on October 31, 2012. Retrieved October 26, 2012.
  71. Rosalyn Page (August 5, 2010). "Could jailbreaking your iPhone land you in jail?". PC & Tech Authority. Archived from the original on October 21, 2013. Retrieved January 21, 2013.
  72. Michael Geist (November 7, 2012). "Canadian Copyright Reform In Force: Expanded User Rights Now the Law". michaelgeist.ca. Archived from the original on November 9, 2012. Retrieved November 13, 2012.
  73. "Canada's C-11 Bill and the Hazards of Digital Locks Provisions". Electronic Frontier Foundation. February 10, 2012. Archived from the original on October 17, 2012. Retrieved October 17, 2012.
  74. The Canadian Press (October 13, 2011). "Phone 'jailbreaking' allows users to hack their phone". CTV News. Archived from the original on November 7, 2012. Retrieved October 17, 2012.
  75. Matija Šuklje. "Does rooting your device (e.g. an Android phone) and replacing its operating system with something else void your statutory warranty if you are a consumer?". Archived from the original on 10 August 2014. Retrieved 26 October 2014.
  76. Jim Martin (March 14, 2012). "How to jailbreak your iPhone: Unleash the full potential of your iPhone". PC Advisor. Archived from the original on December 22, 2012. Retrieved January 21, 2013.
  77. Warwick Ashford (July 30, 2010). "iPhone jailbreaking is 'okay under EU law'". Computer Weekly. Electronics Weekly. Archived from the original on August 26, 2021. Retrieved January 21, 2013.
  78. Pranesh Prakash (May 23, 2012). "Analysis of the Copyright (Amendment) Bill 2012". Centre for Internet and Society. Archived from the original on May 26, 2012. Retrieved November 10, 2012.
  79. Michael Geist (April 10, 2008). "New Zealand's Digital Copyright Law Demonstrates Anti-Circumvention Flexibility". Michael Geist. Archived from the original on April 19, 2012. Retrieved October 26, 2012.
  80. Stephen Bell (September 30, 2011). "Law changes required before NZ ratifies ACTA". ComputerWorld New Zealand. Archived from the original on September 30, 2011. Retrieved October 26, 2012.
  81. Kenny Chee (August 12, 2010). "iPhone jailbreak may be legal here, but... But there will be certain legal provisions". DigitalOne. AsiaOne. Archived from the original on August 15, 2010. Retrieved November 10, 2012.
  82. "Is It Illegal To Unlock a Phone? The Situation is Better - and Worse - Than You Think | Electronic Frontier Foundation". Eff.org. 2013-01-28. Archived from the original on 2013-11-02. Retrieved 2014-02-26.
  83. "Copyright office provides exemption to DMCA". United States Copyright Office. February 12, 2009. Archived from the original on August 6, 2009. Retrieved July 17, 2009.
  84. Declan McCullagh (July 26, 2010). "Feds say mobile-phone jailbreaking is OK". Politics and Law. CNET. Archived from the original on October 7, 2011. Retrieved October 26, 2011.
  85. 1 2 Timothy B. Lee (October 25, 2012). "Jailbreaking now legal under DMCA for smartphones, but not tablets". Ars Technica. Archived from the original on October 27, 2012. Retrieved October 26, 2012.
  86. "New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past". Android Police. 26 October 2012. Archived from the original on October 30, 2012. Retrieved October 31, 2012.
  87. 1 2 Tim Wu (October 4, 2007). "The iPhone Freedom Fighters". Technology. Slate. Archived from the original on September 24, 2011. Retrieved October 26, 2011.
  88. "Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for" (PDF). Archived (PDF) from the original on July 10, 2010. Retrieved September 11, 2010.
  89. David Goldman (July 26, 2010). "Jailbreaking iPhone apps is now legal". CNN Money. Archived from the original on August 30, 2010. Retrieved September 11, 2010.
  90. 1 2 "Transcript of "Jailbreak?" (July 30, 2010)". On The Media. July 30, 2010. Archived from the original on July 31, 2010. Retrieved September 11, 2010.