Rooting (Android)
Rooting (Android)
[1]
El rooteo es el proceso mediante el cual los usuarios de dispositivos Android pueden
obtener control privilegiado (conocido como acceso root ) sobre varios subsistemas del
dispositivo, generalmente teléfonos inteligentes y tabletas . Dado que Android se basa en una
versión modificada del kernel de Linux , el rooteo de un dispositivo Android otorga acceso a
permisos administrativos ( de superusuario ) similares a los de Linux o cualquier otro sistema
operativo tipo Unix, como FreeBSD o macOS .
El rooteo se realiza a menudo para superar las limitaciones que los operadores y fabricantes
de hardware imponen a algunos dispositivos. Por lo tanto, permite a los usuarios modificar o
reemplazar aplicaciones y configuraciones del sistema , ejecutar aplicaciones especializadas
("apps") que requieren permisos de administrador o realizar otras operaciones inaccesibles
para un usuario normal de Android . En algunos dispositivos, el rooteo también puede facilitar
la eliminación y el reemplazo completo del sistema operativo, generalmente con una versión
más reciente del sistema operativo actual.
Root access is sometimes compared to jailbreaking on devices running the Apple iOS
operating system. However, these are different concepts: jailbreaking is the bypass of several
types of Apple prohibitions for the end user, including modifying the operating system
(enforced by a "locked bootloader"), installing non-officially approved (not available on the App
Store) applications via sideloading, and granting the user elevated administration-level
privileges (rooting). Many vendors such as HTC, Sony, OnePlus, Asus, Xiaomi, and Google
explicitly provide the ability to unlock devices and even replace the operating system
entirely.[1][2][3][4] Similarly, the ability to sideload applications is typically permissible on
Android devices without root permissions. Thus, it is primarily the third aspect of iOS
jailbreaking (giving users administrative privileges) that most directly correlates with Android
rooting.
Rooting is distinct from SIM unlocking and bootloader unlocking. The former allows for the
removal of the SIM card lock on a phone, while the latter allows rewriting the phone's boot
partition (for example, to install or replace the operating system).[5]
Overview
Rooting lets all user-installed applications run privileged commands typically unavailable to
the devices in the stock configuration. Rooting is required for more advanced and potentially
dangerous operations including modifying or deleting system files, removing pre-installed
applications, and low-level access to the hardware itself (rebooting, controlling status lights,
or recalibrating touch inputs.) A typical rooting installation also installs the Superuser
application, which supervises applications that are granted root or superuser rights by
requesting approval from the user before granting said permissions. A secondary operation,
unlocking the device's bootloader verification, is required to remove or replace the installed
operating system.
In contrast to iOS jailbreaking, rooting is not needed to run applications distributed outside of
the Google Play Store, sometimes called sideloading. The Android OS supports this feature
natively in two ways: through the "Unknown sources" option in the Settings menu and through
the Android Debug Bridge. However, some US carriers, including AT&T, have prevented the
installation of applications not on the Play Store in firmware,[6] although several devices are
not subject to this rule, including the Samsung Infuse 4G;[7] AT&T lifted the restriction on most
devices by the middle of 2011.[8]
As of 2011, the Amazon Kindle Fire defaults to the Amazon Appstore instead of Google Play,
though like most other Android devices, Kindle Fire allows sideloading of applications from
unknown sources,[9] and the "easy installer" application on the Amazon Appstore makes this
easy. Other vendors of Android devices may look to other sources in the future. Access to
alternate apps may require rooting but rooting is not always necessary.
Advantages
Advantages of rooting include the possibility for complete control over the appearance, feel,
and behaviour of the device. As a superuser has access to the device's system files, all aspects
of the operating system can be customized with the only real limitation being the level of
coding expertise.[10] Immediately expectable advantages of rooted devices include the
following:[11][12]
Support for theming, allowing everything to be visually changed from the color and type of
the battery status indicator to the boot animation that appears while the device is booting,
the status bar, control menu, virtual on-screen navigation buttons, and more.
Full control of the kernel, which, for example, allows overclocking and underclocking the
CPU and GPU.
Full application control, including the ability to fully back up, restore, or batch-edit
applications, or to remove bloatware that comes pre-installed on some phones.
Custom automated system-level processes through the use of third-party applications.[13]
Ability to install software (such as Xposed, Magisk, SuperSU, BusyBox, etc.) that allows
additional levels of control on a rooted device or management of root access.
Access to more Unix shell commands, both standalone and through Android Debug Bridge.
Disadvantages
On certain brands such as Samsung and Motorola, rooting can void one's warranty.[20]
If used incorrectly, rooting can cause stability issues with the software or hardware. If the
issues are purely software-based, unrooting the phone can often resolve these issues.
Certain devices, including those from Huawei[21] and any brand sold by Verizon[22] lack the
ability to be easily rooted, unless a privilege escalation exploit is found in the device's
operating system version.
Android SafetyNet API is tripped so some apps will not work or won't be shown on the Play
Store.[23]
Related concepts
Rooting allows the user to obtain privileged access to a phone. It does not allow a user to
install a new OS (custom firmware or custom ROM) or recovery image, and it doesn't allow a
phone that is locked to a certain carrier to be used on another one. Related operations allow
these.
Bootloader unlock
Bootloader unlocking is sometimes a first step used to root the device; however, it is not the
same as rooting the device.[24] Most devices come with a locked bootloader, which prevents
users from installing a new boot image, which is often flashed when rooting a device or using
a custom ROM.[25] The bootloader runs on device start-up and is in charge of loading the
operating system on the phone.[26] It is generally in charge of verifying that phone system
information hasn't been tampered with and is genuine. Nonetheless, people still perform this
operation, as unlocking the bootloader allows users to install custom ROMs.[27]
The first step to do this is to generally to set up OEM unlocking,[28] and then to follow
manufacturer specific instructions.[24] Not all devices can be bootloader unlocked, and some
can only be unlocked with an exploit which usually needs a privilege escalation bug in order to
remove software locks, which includes most LG V20 models and Verizon-sold Google Pixel
devices.[29][30]
The process of unlocking the bootloader might involve a factory reset, erasing all user data,
third-party applications, and configuration.[31][32]
SIM unlock
SIM unlocking allows a phone that is locked to a certain carrier to be used on a different
carrier. The instructions vary per device and carrier, but this might be done by first requesting
the carrier to unlock the phone or purchasing an unlock code online.[33]
Methods
Some rooting methods involve the use of a command prompt and a development interface
called the Android Debug Bridge (also known as ADB), while other methods may use existing
vulnerabilities in devices. Due to similarly modeled devices often having a multitude of
changes, rooting methods for one device when used for a different variant can result in
bricking the device.
"Systemless root" is a variant of rooting in which the underlying device file system is not
modified. Systemless root uses various techniques to gain root access without modifying the
system partition of a device. Some root applications may include a "hiding" function, which
makes attempts to mask the effects and results of rooting, often by whitelisting certain
applications for the root or blocking access to affected files.[34] Systemless rooting has the
advantage of not triggering the software-based version of SafetyNet, an Android feature that
works by monitoring changes to system files and is used by applications such as Google Pay
to detect whether a device has been tampered with such as by rooting. However, hardware-
backed SafetyNet versions may be triggered by systemless rooting, as well as in unrooted
devices shipped without Google Mobile Services (GMS).[35][36][37][38][39]
The distinction between "soft rooting" through a security vulnerability and "hard-rooting" by
flashing a su binary executable varies from exploit to exploit, and manufacturer to
The process of rooting varies widely by manufacturer and device but sometimes includes
exploiting one or more security bugs in the firmware (i.e., in the version of the Android OS
installed on) of the device.[40] Once an exploit is discovered, a custom recovery image that will
skip the digital signature check of firmware updates can be flashed. Then a modified firmware
update that typically includes the utilities needed to run apps as root can be installed. For
example, the su binary (such as an open-source one paired with the Superuser[41] or
SuperSU application[42]) can be copied to a location in the current process' PATH (e.g.,
/system/xbin/ ) and granted executable permissions with the chmod command. A third-
party supervisor application, like Superuser or SuperSU, can then regulate and log elevated
permission requests from other applications. Many guides, tutorials, and automatic processes
exist for popular Android devices facilitating a fast and easy rooting process.
The process of rooting a device may be simple or complex, and it even may depend upon
serendipity. For example, shortly after the release of the HTC Dream (HTC G1), it was
discovered that anything typed using the keyboard was being interpreted as a command in a
privileged (root) shell. Although Google quickly released a patch to fix this, a signed image of
the old firmware leaked, which gave users the ability to downgrade and use the original
exploit to gain root access. Installable apps have managed to unlock immediate root access
on some early 2010s Samsung smartphones. This has also been referred to as "one-click
rooting".[43]
Some manufacturers, including OnePlus and Motorola, provide official support for unlocking
the bootloader, allowing for rooting without exploiting a vulnerability.[46] However, the support
may be limited only to certain phones – for example, LG released its bootloader unlock tool
only for certain models of its phones.[47] Also, a manufacturer could discontinue bootloader
unlocking support, as was the case with LG[48] and Huawei.[49]
The Google Nexus and Pixel line of devices can have their bootloader unlocked by simply
connecting the device to a computer while in bootloader mode and running the Fastboot
protocol with the command fastboot oem unlock on older devices,[50] or fastboot
flashing unlock on newer devices.[51] After a warning is accepted, the bootloader is
unlocked, so a new system image can be written directly to flash without the need for an
exploit. Additionally, Pixel phones sold via certain carriers like Verizon disallow bootloader
unlocking,[52] while others such as T-Mobile require a phone to be paid off and SIM unlocked
before the bootloader can be unlocked.[53]
Difficulties
In the past, many manufacturers have tried to make non-rootable phones with more elaborate
protections (like the Droid X), but exploits are usually still found eventually. There may be no
root exploit available for new, or outdated phones.[54]
Industry reaction
Until 2010, tablet and smartphone manufacturers, as well as mobile carriers, were mainly
unsupportive of third-party firmware development. Manufacturers had expressed concern
about improper functioning of devices running unofficial software[55] and related support
costs. Moreover, firmware such as OmniROM and CyanogenMod sometimes offer features for
which carriers would otherwise charge a premium, such as tethering. Due to that, technical
obstacles such as locked bootloaders and restricted access to root permissions have
commonly been introduced in many devices. For example, in late December 2011, Barnes &
Noble and Amazon.com, Inc. began pushing automatic, over-the-air firmware updates, 1.4.1
to Nook Tablets and 6.2.1 to Kindle Fires, that removed one method to gain root access to the
devices. The Nook Tablet 1.4.1 update also removed users' ability to sideload apps from
sources other than the official Barnes & Noble app store (without modding).[56][57]
However, as community-developed software began to grow popular in the late 2009 to early
2010,[58][59] and following a statement by the Copyright Office and Librarian of Congress (US)
allowing the use of "jailbroken" mobile devices,[60][61] manufacturers and carriers have
softened their position regarding CyanogenMod and other unofficial firmware distributions.
Some manufacturers, including HTC,[62] Samsung,[63] Motorola[64] and Sony,[65] actively provide
support and encourage development.
In 2011, the need to circumvent hardware restrictions to install unofficial firmware lessened as
an increasing number of devices shipped with unlocked or unlockable bootloaders, similar to
the Nexus and Pixel series of phones. Device manufacturer HTC has announced that it will
support aftermarket software developers by making the bootloaders of all new devices
unlockable.[55] However, carriers, such as Verizon and more recently AT&T, have continuously
blocked OEMs from releasing retail devices with unlocked bootloaders, opting instead for
"developer edition" devices that are only sold unsubsidized and off-contract. These are similar
in practice to Nexus devices, but for a premium and with no contract discounts. More recently,
since 2019, AT&T has allowed Pixel devices to have unlockable bootloaders once a device is
paid off and SIM unlocked.[66]
In 2014, Samsung released a security feature called Knox, which verifies whether system and
boot files were modified. If custom firmware was flashed, the eFuse is set to 0x1, permanently
voiding the warranty and disabling Knox-enabled features such as Samsung Pay.[67]
Additionally, certain Samsung devices lack the ability to flash custom software, namely
Samsung phones and tablets released in North America after 2015, with an exception for
devices lacking a cellular modem,[68] although there are exploits that can unlock the
bootloader on some affected devices running older One UI versions.[69]
Legality
International treaties have influenced the development of laws affecting rooting. The 1996
World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the
treaties to enact laws against digital rights management (DRM) circumvention. The American
implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for
establishing exemptions for non-copyright-infringing purposes such as rooting. The 2001
European Copyright Directive implemented the treaty in Europe, requiring member states of
the European Union to implement legal protections for technological protection measures.
The Copyright Directive includes exceptions to allow breaking those measures for non-
copyright-infringing purposes, such as to run alternative software,[70] but member states vary
on the implementation of the directive.
Australia
In 2010, Electronic Frontiers Australia said that it is unclear whether rooting is legal in
Australia, and that anti-circumvention laws may apply.[71] These laws were strengthened by
the Copyright Amendment Act 2006.
Canada
In November 2012, Canada amended its Copyright Act with new provisions prohibiting
tampering with digital locks, with exceptions including software interoperability.[72] Rooting a
device to run alternative software is a form of circumventing digital locks for the purpose of
software interoperability.
There had been several efforts from 2008 to 2011 to amend the Copyright Act (Bill C-60, Bill
C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-
11 that were more restrictive,[73] but those bills were set aside. In 2011, Michael Geist, a
Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that
overly broad Copyright Act amendments could prohibit.[74]
European Union
The Free Software Foundation Europe argues that it is legal to root or flash any device.
According to the European Directive 1999/44/EC, replacing the original operating system with
another does not void the statutory warranty that covers the hardware of the device for two
years unless the seller can prove that the modification caused the defect.[75]
United Kingdom
The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection
measures legal for the purpose of interoperability but not copyright infringement. Rooting
may be a form of circumvention covered by that law, but this has not been tested in
court.[70][76] Competition laws may also be relevant.[77]
India
New Zealand
New Zealand's copyright law allows the circumvention of technological protection measure
(TPM) as long as the use is for legal, non-copyright-infringing purposes.[81][82] This law was
added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment
Act 2008.
Singapore
Rooting might be legal in Singapore if done to provide interoperability and not circumvent
copyright, but that has not been tested in court.[83]
United States
The Unlocking Consumer Choice and Wireless Competition Act guarantees that consumers
can unlock or let others unlock their phones. Under the Digital Millennium Copyright Act
(DMCA) rooting was illegal in the United States except by exemption. The U.S. Copyright
Office granted an exemption to this law "at least through 2015".[84]
In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright
Office explicitly recognized an exemption to the DMCA to permit rooting.[85][86] In their ruling,
the Library of Congress affirmed on July 26, 2010, that rooting is exempt from DMCA rules
with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed
every three years or else they expire.
On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting
of smartphones continues to be legal "where circumvention is accomplished for the sole
purpose of enabling interoperability of [lawfully obtained software] applications with computer
programs on the telephone handset". However, the U.S. Copyright office refused to extend this
exemption to tablets, arguing that the term "tablets" is broad and ill-defined, and an
exemption to this class of devices could have unintended side effects.[87][88][89] The Copyright
Office also renewed the 2010 exemption for unofficially unlocking phones to use them on
unapproved carriers, but restricted this exemption to phones purchased before January 26,
2013.[88]
Tim Wu, a professor at Columbia Law School, argued in 2007 that jailbreaking is "legal, ethical,
and just plain fun".[90] Wu cited an explicit exemption issued by the Library of Congress in
2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the
ability of subscribers to switch to other carriers, a business decision that has nothing
whatsoever to do with the interests protected by copyright" and thus do not implicate the
DMCA.[91] Wu did not claim that this exemption applies to those who help others unlock a
device or "traffic" in software to do so.[90] In 2010 and 2012, the U.S. Copyright Office approved
exemptions to the DMCA that allow users to root their devices legally.[92] It is still possible to
employ technical countermeasures to prevent rooting or prevent rooted phones from
functioning.[93] It is also unclear whether it is legal to traffic in the tools used to make rooting
easy.[93]
See also
References
8. Mike Luttrell (May 19, 2011). "AT&T customers can finally use Amazon's Appstore" (http://
www.tgdaily.com/mobility-brief/56057-att-customers-can-finally-use-amazons-appstor
e) . TG Daily. Archived (https://web.archive.org/web/20121029232954/http://www.tgdail
y.com/mobility-brief/56057-att-customers-can-finally-use-amazons-appstore) from
the original on October 29, 2012. Retrieved July 27, 2012.
9. Austin Krause (December 8, 2011). "How to Enable Sideloading on the Kindle Fire" (http://
www.groovypost.com/howto/enable-sideloading-kindle-fire-android-tablet/) .
groovyPost. Retrieved July 27, 2012.
11. "Five Reasons Why Everyone Should "Root" Their Android" (https://web.archive.org/web/2
0150106122337/http://reviewlagoon.com/five-reasons-why-everyone-should-root-their
-android/) . Review Lagoon. 30 August 2012. Archived from the original (http://reviewla
goon.com/five-reasons-why-everyone-should-root-their-android/) on 6 January 2015.
Retrieved 6 January 2015.
12. Whitson Gordon (10 August 2013). "Top 10 Reasons to Root Your Android Phone" (https://
lifehacker.com/top-10-reasons-to-root-your-android-phone-1079161983) . Lifehacker.
Gawker Media. Archived (https://web.archive.org/web/20150106002414/http://lifehacke
r.com/top-10-reasons-to-root-your-android-phone-1079161983) from the original on
6 January 2015. Retrieved 6 January 2015.
16. "Android Media Server troši puno baterije. Kako popraviti? |" (https://srbodroid.com/devel
opment/uputstva/android-media-server-trosi-puno-baterije-kako-popraviti/) .
srbodroid.com (in Croatian). 2013-12-26. Archived (https://web.archive.org/web/202107
16133915/https://srbodroid.com/development/uputstva/android-media-server-trosi-pu
no-baterije-kako-popraviti/) from the original on 2021-07-16. Retrieved 2021-07-16.
17. "How to Downgrade an Android App If You Don't Like the Update" (https://www.maketec
heasier.com/downgrade-android-app/) . Make Tech Easier. 2016-09-16. Archived (http
s://web.archive.org/web/20210305040636/https://www.maketecheasier.com/downgrad
e-android-app/) from the original on 2021-03-05. Retrieved 12 June 2021.
18. "Limit charge rate above/below a fixed charge threshold, temperature etc. · Issue #23 ·
sriharshaarangi/BatteryChargeLimit" (https://github.com/sriharshaarangi/BatteryCharge
Limit/issues/23) . GitHub. 2017-08-10. Archived (https://web.archive.org/web/2021061
0003905/https://github.com/sriharshaarangi/BatteryChargeLimit/issues/23) from the
original on 2021-06-10. Retrieved 10 June 2021.
19. "How to Set a Custom Battery Charge Limit in Android device?" (https://www.getdroidtip
s.com/custom-battery-charge-limit-android/) . Get Droid Tips. 7 September 2020.
Archived (https://web.archive.org/web/20210719214056/https://www.getdroidtips.com/
custom-battery-charge-limit-android/) from the original on 19 July 2021. Retrieved
19 July 2021.
20. "Does Rooting or Unlocking Void Your Android Phone's Warranty?" (https://www.howtoge
ek.com/240417/does-rooting-or-unlocking-void-your-android-phones-warranty/) .
How To Greek. 20 June 2017. Retrieved 29 August 2022.
21. "Huawei shuts down bootloader unlock program" (https://www.phonearena.com/news/h
uawei-honor-bootloader-unlock-discontinued_id105187) . PhoneArena. 2018-05-25.
Archived (https://web.archive.org/web/20180527194004/https://www.phonearena.com/
news/huawei-honor-bootloader-unlock-discontinued_id105187) from the original on
2018-05-27. Retrieved 2022-08-29.
22. "Letter From Verizon to FCC Details Their Stance on Bootloaders" (https://www.droid-life.
com/2012/02/29/letter-from-verizon-to-fcc-details-their-stance-on-bootloaders/7) .
DroidLife. 2012-02-29. Retrieved 2022-08-29.
23. Siddiqui, Aamir (2016-10-19). "Android SafetyNet Now Reportedly Tripped by Unlocked
Bootloaders" (https://www.xda-developers.com/android-safetynet-now-reportedly-trip
ped-by-unlocked-bootloaders/) . XDA Developers. Retrieved 2024-03-24.
24. Congleton, Nicholas. "Easily Unlock Your Android Bootloader With Fastboot" (https://ww
w.lifewire.com/how-to-unlock-bootloader-android-phone-4689186) . Lifewire.
Archived (https://web.archive.org/web/20201023094354/https://www.lifewire.com/how-
to-unlock-bootloader-android-phone-4689186) from the original on 2020-10-23.
Retrieved 2020-10-01.
32. "Unlock Bootloader on Samsung Galaxy Phones and Tablets - A Complete Guide" (http
s://www.thecustomdroid.com/samsung-galaxy-bootloader-unlock-guide/) . The
Custom Droid. 2021-04-03. Archived (https://web.archive.org/web/20210610002838/htt
ps://www.thecustomdroid.com/samsung-galaxy-bootloader-unlock-guide/) from the
original on 2021-06-10. Retrieved 2021-06-10.
34. "How to play Pokémon GO (0.37+) on a rooted Android with Magisk" (http://www.android
police.com/2016/09/11/guide-play-pokemon-go-0-37-rooted-android-magisk/) .
Android Police. 11 September 2016. Archived (https://web.archive.org/web/20170521183
754/http://www.androidpolice.com/2016/09/11/guide-play-pokemon-go-0-37-rooted-
android-magisk/) from the original on 21 May 2017. Retrieved 19 May 2017.
35. Hager, Ryne (June 29, 2020). "Google's dreaded SafetyNet hardware check has been
spotted in the wild" (https://www.androidpolice.com/2020/06/29/googles-dreaded-safet
ynet-hardware-check-has-been-spotted-in-the-wild/?amp) . AndroidPolice.com.
Archived (https://web.archive.org/web/20210825012953/https://www.androidpolice.co
m/2020/06/29/googles-dreaded-safetynet-hardware-check-has-been-spotted-in-the-
wild/?amp) from the original on August 25, 2021. Retrieved August 26, 2021.
36. Hoffman, Chris (July 11, 2017). "SafetyNet Explained: Why Android Pay and Other Apps
Don't Work on Rooted Devices" (https://www.howtogeek.com/241012/safetynet-explain
ed-why-android-pay-and-other-apps-dont-work-on-rooted-devices/amp/) . How-To
Geek. Archived (https://web.archive.org/web/20201111085644/https://www.howtogeek.
com/241012/safetynet-explained-why-android-pay-and-other-apps-dont-work-on-roo
ted-devices/amp/) from the original on November 11, 2020. Retrieved August 26, 2021.
37. "How to (maybe) bypass SafetyNet hardware attestation on devices with an unlocked
bootloader" (https://www.xda-developers.com/bypass-safetynet-hardware-attestation-
unlocked-bootloader-magisk-module/amp/) . XDA. January 30, 2021. Archived (https://
web.archive.org/web/20210425090025/https://www.xda-developers.com/bypass-safety
net-hardware-attestation-unlocked-bootloader-magisk-module/amp/) from the
original on April 25, 2021. Retrieved August 26, 2021.
39. Summerson, Cameron (September 15, 2017). "How to Root Your Android Phone with
Magisk (So Android Pay and Netflix Work Again)" (https://www.howtogeek.com/312404/h
ow-to-root-your-android-phone-with-magisk/) . How-To Geek. Archived (https://web.
archive.org/web/20210228195824/https://www.howtogeek.com/312404/how-to-root-y
our-android-phone-with-magisk/) from the original on February 28, 2021. Retrieved
August 26, 2021.
40. Zhang, Hang; She, Dongdong; Qian, Zhiyun (2015-01-01). "Android Root and its
Providers". Proceedings of the 22nd ACM SIGSAC Conference on Computer and
Communications Security. CCS '15. New York, NY, USA: ACM. pp. 1093–1104.
doi:10.1145/2810103.2813714 (https://doi.org/10.1145%2F2810103.2813714) .
ISBN 9781450338325. S2CID 7650341 (https://api.semanticscholar.org/CorpusID:765034
1) .
42. "How to Root Your Android Phone with SuperSU and TWRP" (https://www.howtogeek.co
m/115297/how-to-root-your-android-why-you-might-want-to/) . Archived (https://we
b.archive.org/web/20161007131535/http://www.howtogeek.com/115297/how-to-root-y
our-android-why-you-might-want-to/) from the original on 2016-10-07. Retrieved
2016-10-08.
43. "How to Use Framaroot to Root Android Devices" (https://www.coolmuster.com/android-
root/framaroot-guide.html) . www.coolmuster.com. 2017-05-16. Retrieved 8 February
2022.
45. Stone, Maddie (21 Nov 2019). "Bad Binder: Android In-The-Wild Exploit" (https://archive.t
oday/20191122171606/https://googleprojectzero.blogspot.com/2019/11/bad-binder-an
droid-in-wild-exploit.html) . Google Project Zero. Archived from the original (https://goo
gleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html) on 22
November 2019.
46. "Everything you need to know about rooting your Android" (http://m.androidcentral.com/
root) . Android Central. 2016-06-06. Archived (https://web.archive.org/web/2016101710
0215/http://m.androidcentral.com/root) from the original on 2016-10-17. Retrieved
2016-10-08.
47. "LG Releases Its Long Promised Bootloader Unlock Tool, But It Currently Only Supports
The G4 For The EU Open Market (H815)" (http://www.androidpolice.com/2015/06/02/lg-r
eleases-its-long-promised-bootloader-unlock-tool-but-it-currently-only-supports-the-
g4-for-the-eu-open-market-h815/) . Android Police. 2015-06-02. Archived (https://we
b.archive.org/web/20160930172021/http://www.androidpolice.com/2015/06/02/lg-relea
ses-its-long-promised-bootloader-unlock-tool-but-it-currently-only-supports-the-g4-f
or-the-eu-open-market-h815/) from the original on 2016-09-30. Retrieved
2016-10-08.
48. "LG will shut down its bootloader unlocking service on December 31" (https://www.xda-d
evelopers.com/lg-bootloader-unlocking-shut-down-december-31/) . XDA Developers.
2021-12-06. Archived (https://web.archive.org/web/20220428215524/https://www.xda-
developers.com/lg-bootloader-unlocking-shut-down-december-31/) from the original
on 2022-04-28. Retrieved 2022-05-12.
54. "Everything You Need to Know About Rooting Your Android Phone" (https://lifehacker.co
m/5789397/the-always-up+to+date-guide-to-rooting-any-android-phone) .
Lifehacker.com. 4 September 2013. Archived (https://web.archive.org/web/20140226053
654/http://lifehacker.com/5789397/the-always-up+to+date-guide-to-rooting-any-andr
oid-phone) from the original on 2014-02-26. Retrieved 2014-02-26.
56. Smith, Peter (December 21, 2011). "Kindle Fire and Nook Tablet both get 'upgraded' with
reduced functionality" (http://www.itworld.com/mobile-wireless/234809/kindle-fire-and-
nook-tablet-both-get-upgraded-reduced-functionality) . ITworld. Archived (https://we
b.archive.org/web/20120108015721/http://www.itworld.com/mobile-wireless/234809/ki
ndle-fire-and-nook-tablet-both-get-upgraded-reduced-functionality) from the
original on January 8, 2012. Retrieved January 10, 2012.
57. Verry, Tim (December 21, 2011). "Kindle Fire and Nook Tablet Receive Root Access Killing
Software Updates" (http://pcper.com/category/tags/update) . PC Perspective. Archived
(https://web.archive.org/web/20120815131453/http://pcper.com/category/tags/updat
e) from the original on August 15, 2012. Retrieved January 10, 2012.
58. Jason Perlow (January 18, 2011). "CyanogenMod CM7: Teach your old Droid New Tricks"
(https://www.zdnet.com/article/cyanogenmod-cm7-teach-your-old-droid-new-trick
s/) . ZDNet. Archived (https://web.archive.org/web/20120107050441/http://www.zdnet.
com/blog/perlow/cyanogenmod-cm7-teach-your-old-droid-new-tricks/15574) from
the original on January 7, 2012. Retrieved January 4, 2012.
60. Sadun, Erica (July 26, 2010). "LoC rules in favor of jailbreaking" (https://web.archive.org/w
eb/20121030023251/http://www.tuaw.com/2010/07/26/library-of-congress-rules-in-fav
or-of-jailbreaking/) . Tuaw.com. Archived from the original (http://www.tuaw.com/2010/
07/26/library-of-congress-rules-in-favor-of-jailbreaking/) on October 30, 2012.
Retrieved January 4, 2012.
61. "Statement of the Librarian of Congress Relating to Section 1201 Rulemaking" (https://w
ww.copyright.gov/1201/2010/Librarian-of-Congress-1201-Statement.html) . Library of
Congress. December 1, 2012. Archived (https://web.archive.org/web/20181116022214/h
ttps://www.copyright.gov/1201/2010/Librarian-of-Congress-1201-Statement.html)
from the original on November 16, 2018. Retrieved November 7, 2018.
67. "All you wanted to know about KNOX Void Warranty 0x1" (https://web.archive.org/web/20
181230130548/http://omegadroid.net/wanted-knox-void-warranty-0x1/) . 2018-12-30.
Archived from the original (http://omegadroid.net/wanted-knox-void-warranty-0x1/)
on 2018-12-30. Retrieved 2020-08-27.
68. "Galaxy S7 Bootloader Lock Explained: You Might Not Get AOSP After All" (https://www.x
da-developers.com/galaxy-s7-bootloader-lock-explained-you-might-not-get-aosp-aft
er-all/) . 2016-03-13. Retrieved 2023-07-05.
70. Duncan Geere (July 28, 2010). "Investigation: Is it legal to jailbreak a UK iPhone?" (https://
www.wired.co.uk/news/archive/2010-07/28/investigation-is-it-legal-to-jailbreak-a-uk-i
phone) . Wired UK. Archived (https://web.archive.org/web/20121031034914/http://ww
w.wired.co.uk/news/archive/2010-07/28/investigation-is-it-legal-to-jailbreak-a-uk-ipho
ne) from the original on October 31, 2012. Retrieved October 26, 2012.
71. Rosalyn Page (August 5, 2010). "Could jailbreaking your iPhone land you in jail?" (http://w
ww.pcauthority.com.au/News/223713,could-jailbreaking-your-iphone-land-you-in-jail.a
spx) . PC & Tech Authority. Archived (https://web.archive.org/web/20131021010517/htt
p://www.pcauthority.com.au/News/223713,could-jailbreaking-your-iphone-land-you-in-
jail.aspx) from the original on October 21, 2013. Retrieved January 21, 2013.
72. Michael Geist (November 7, 2012). "Canadian Copyright Reform In Force: Expanded User
Rights Now the Law" (https://web.archive.org/web/20121109182709/http://www.michael
geist.ca/content/view/6692/125) . michaelgeist.ca. Archived from the original (http://w
ww.michaelgeist.ca/content/view/6692/125/) on November 9, 2012. Retrieved
November 13, 2012.
73. "Canada's C-11 Bill and the Hazards of Digital Locks Provisions" (https://www.eff.org/dee
plinks/2012/02/canadas-c-11-bill-and-hazards-digital-locks-provisions) . Electronic
Frontier Foundation. February 10, 2012. Archived (https://web.archive.org/web/20121017
235618/https://www.eff.org/deeplinks/2012/02/canadas-c-11-bill-and-hazards-digital-l
ocks-provisions) from the original on October 17, 2012. Retrieved October 17, 2012.
74. The Canadian Press (October 13, 2011). "Phone 'jailbreaking' allows users to hack their
phone" (http://www.ctvnews.ca/phone-jailbreaking-allows-users-to-hack-their-phone-
1.707707) . CTV News. Archived (https://web.archive.org/web/20121107105637/http://
www.ctvnews.ca/phone-jailbreaking-allows-users-to-hack-their-phone-1.707707)
from the original on November 7, 2012. Retrieved October 17, 2012.
75. Matija Šuklje. "Does rooting your device (e.g. an Android phone) and replacing its
operating system with something else void your statutory warranty if you are a
consumer?" (http://fsfe.org/freesoftware/legal/flashingdevices.en.html) . Archived (http
s://web.archive.org/web/20140810185926/https://fsfe.org/freesoftware/legal/flashingde
vices.en.html) from the original on 10 August 2014. Retrieved 26 October 2014.
76. Jim Martin (March 14, 2012). "How to jailbreak your iPhone: Unleash the full potential of
your iPhone" (http://www.pcadvisor.co.uk/how-to/apple/3344366/how-jailbreak-your-ip
hone/) . PC Advisor. Archived (https://web.archive.org/web/20121222040110/http://ww
w.pcadvisor.co.uk/how-to/apple/3344366/how-jailbreak-your-iphone/) from the
original on December 22, 2012. Retrieved January 21, 2013.
77. Warwick Ashford (July 30, 2010). "iPhone jailbreaking is 'okay under EU law' " (http://www.
electronicsweekly.com/Articles/30/07/2010/49177/iphone-jailbreaking-is-okay-under-e
u-law.htm) . Computer Weekly. Electronics Weekly. Archived (https://web.archive.org/w
eb/20210826190006/https://www.electronicsweekly.com/news/business/information-te
chnology/iphone-jailbreaking-is-okay-under-eu-law-2010-07/) from the original on
August 26, 2021. Retrieved January 21, 2013.
78. Pranesh Prakash (April 29, 2010). "Technological Protection Measures in the Copyright
(Amendment) Bill, 2010" (http://cis-india.org/a2k/blog/analysis-copyright-amendment-
bill-2012/tpm-copyright-amendment) . Centre for Internet and Society. Archived (http
s://web.archive.org/web/20120920045947/http://cis-india.org/a2k/blog/analysis-copyri
ght-amendment-bill-2012/tpm-copyright-amendment) from the original on
September 20, 2012. Retrieved November 10, 2012.
79. Nate Anderson (April 22, 2010). "India's copyright proposals are un-American (and that's
bad)" (https://arstechnica.com/tech-policy/2010/04/indias-copyright-proposals-are-un-
american-and-thats-bad/) . Ars Technica. Archived (https://web.archive.org/web/20121
203011221/http://arstechnica.com/tech-policy/2010/04/indias-copyright-proposals-are
-un-american-and-thats-bad/) from the original on December 3, 2012. Retrieved
November 10, 2012.
80. Pranesh Prakash (May 23, 2012). "Analysis of the Copyright (Amendment) Bill 2012" (htt
p://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012) . Centre for
Internet and Society. Archived (https://web.archive.org/web/20120526223828/http://cis-
india.org/a2k/blog/analysis-copyright-amendment-bill-2012) from the original on May
26, 2012. Retrieved November 10, 2012.
81. Michael Geist (April 10, 2008). "New Zealand's Digital Copyright Law Demonstrates Anti-
Circumvention Flexibility" (https://web.archive.org/web/20120419083000/http://www.mi
chaelgeist.ca/content/view/2829/125/) . Michael Geist. Archived from the original (htt
p://www.michaelgeist.ca/content/view/2829/125/) on April 19, 2012. Retrieved
October 26, 2012.
82. Stephen Bell (September 30, 2011). "Law changes required before NZ ratifies ACTA" (http
s://web.archive.org/web/20110930234801/http://computerworld.co.nz/news.nsf/news/l
aw-changes-required-before-nz-ratifies-acta) . ComputerWorld New Zealand. Archived
from the original (http://computerworld.co.nz/news.nsf/news/law-changes-required-bef
ore-nz-ratifies-acta) on September 30, 2011. Retrieved October 26, 2012.
83. Kenny Chee (August 12, 2010). "iPhone jailbreak may be legal here, but... But there will be
certain legal provisions" (https://web.archive.org/web/20100815122823/http://www.digit
alone.com.sg/news/article/12884) . DigitalOne. AsiaOne. Archived from the original (htt
p://www.digitalone.com.sg/news/article/12884) on August 15, 2010. Retrieved
November 10, 2012.
84. "Is It Illegal To Unlock a Phone? The Situation is Better - and Worse - Than You Think |
Electronic Frontier Foundation" (https://www.eff.org/is-it-illegal-to-unlock-a-phone) .
Eff.org. 2013-01-28. Archived (https://web.archive.org/web/20131102064726/https://ww
w.eff.org/is-it-illegal-to-unlock-a-phone) from the original on 2013-11-02. Retrieved
2014-02-26.
86. Declan McCullagh (26 de julio de 2010). "Los federales afirman que el jailbreaking de
teléfonos móviles está bien" (http://news.cnet.com/8301-13578_3-20011661-38.html)
. Política y Derecho . CNET. Archivado (https://web.archive.org/web/20111007193710/htt
p://news.cnet.com/8301-13578_3-20011661-38.html) desde el original el 7 de octubre
de 2011. Consultado el 26 de octubre de 2011 . (http://news.cnet.com/8301-13578_3-20
011661-38.html) (https://web.archive.org/web/20111007193710/http://news.cnet.co
m/8301-13578_3-20011661-38.html)
88. Timothy B. Lee (25 de octubre de 2012).«El jailbreak ya es legal bajo la DMCA para
smartphones, pero no para tablets» (https://arstechnica.com/tech-policy/2012/10/jailbre
aking-now-legal-under-dmca-for-smartphones-but-not-tablets/) . Ars
Technica.Archivado (https://web.archive.org/web/20121027192318/http://arstechnica.co
m/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphones-but-not-
tablets/) del original el 27 de octubre de 2012.Consultado el 26 de octubre de 2012. (htt
ps://arstechnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-sma
rtphones-but-not-tablets/) (https://web.archive.org/web/20121027192318/http://arst
echnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphone
s-but-not-tablets/)
89. "Las nuevas exenciones de la DMCA permiten rootear teléfonos (pero no tabletas); los
desbloqueos no autorizados serán cosa del pasado" (http://www.androidpolice.com/201
2/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-ph
one-unlocks-will-be-a-thing-of-the-past/) . Android Police. 26 de octubre de 2012.
Archivado (https://web.archive.org/web/20121030123310/http://www.androidpolice.co
m/2012/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unappro
ved-phone-unlocks-will-be-a-thing-of-the-past/) desde el original el 30 de octubre de
2012. Consultado el 31 de octubre de 2012 . (http://www.androidpolice.com/2012/10/26/
new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-phone-unl
ocks-will-be-a-thing-of-the-past/) (https://web.archive.org/web/20121030123310/htt
p://www.androidpolice.com/2012/10/26/new-dmca-exemptions-allow-rooting-phones-
but-not-tablets-unapproved-phone-unlocks-will-be-a-thing-of-the-past/)
90. Tim Wu (4 de octubre de 2007)."Los luchadores por la libertad del iPhone" (http://www.sla
te.com/id/2175304/) .Tecnología. Slate.Archivado (https://web.archive.org/web/201109
24084544/http://www.slate.com/id/2175304) desde el original el 24 de septiembre de
2011.Consultado el 26 de octubre de 2011. (http://www.slate.com/id/2175304/) (http
s://web.archive.org/web/20110924084544/http://www.slate.com/id/2175304)
92. David Goldman (26 de julio de 2010). «Haz jailbreak a las aplicaciones de iPhone ahora es
legal» (https://money.cnn.com/2010/07/26/technology/iphone_jailbreaking/) . CNN
Money. Archivado (https://web.archive.org/web/20100830035354/http://money.cnn.co
m/2010/07/26/technology/iphone_jailbreaking/) del original el 30 de agosto de 2010.
Consultado el 11 de septiembre de 2010 . (https://money.cnn.com/2010/07/26/technolo
gy/iphone_jailbreaking/) (https://web.archive.org/web/20100830035354/http://money.
cnn.com/2010/07/26/technology/iphone_jailbreaking/)
93. "Transcripción de "¿Fuga de la cárcel?" (30 de julio de 2010)" (https://web.archive.org/we
b/20100731150659/http://www.onthemedia.org/transcripts/2010/07/30/03) . En los
medios. 30 de julio de 2010. Archivado desdeel original (http://www.onthemedia.org/tran
scripts/2010/07/30/03) el 31 de julio de 2010.Consultado el 11 de septiembre de 2010.
(https://web.archive.org/web/20100731150659/http://www.onthemedia.org/transcripts/
2010/07/30/03) (http://www.onthemedia.org/transcripts/2010/07/30/03)