How to tell if a Samsung Galaxy Amp Prime is rooted? - Security Discussion

Hello, this is my first post-I searched and there are a lot of discussions re: rooting, but I decided to post because my issue is a little different.
I have been having hacking issues for awhile-my iPhone was jailbroken remotely-oftentimes, I get a flat "that's impossible," but that's what people at Apple's "genius bar" told me-I didn't come up with it/know what jailbreaking was. A couple laptops were hacked as well as a wifi hotspot router. That's some history.
I have reason to believe my phone has been compromised, considering all I just mentioned. I have a file folder and an example of what I'll find is files dated as from 1969, a file called "lp_extraction_php" (my last pass account was also hacked) and lots of files about sql injections. I am assuming, and I don't know much at all and for that I apologize, but that if my phone has been compromised like my iPhone was, it would have been rooted. I have no idea how to do that/don't know if I'd want to because it may be beyond my non-existent skill level to keep up with. Most of the posts I saw about rooting were from people who were trying to, not from people wondering if someone else has done it already. I have Cricket and they might as well not have customer service for how helpful they have been.
How would I start to tell if my device is rooted, keeping in mind that it may already be compromised and I may need to take extra precaution or go about it differently than an experienced user on a clean device who is trying to change things? (On my iPhone, I thought I was downloading facebook for example, and apparently it wasn't really facebook. It looked 100% legit. So I am a little paranoid about downloading apps). Any advice at all is appreciated!!! Let me know if I can clarify anything.

well 1st off if your rooted you would be able to delete/move/rename system apps/folders and files (with any root file browser). you could use an app such as "root checker" - https://play.google.com/store/apps/details?id=com.joeykrim.rootcheck&hl=en
fear a life un-lived , not death

Related

[Q] The iPhone Has Been Tracking Where You Go

I can't post links yet. Just Google: iPhone tracking your location
This has already been posted once, but because it is a big deal I wanted to draw more attention to it. As most of the people on XDA run rooted phones and custom ROMs, I would like to know if our favorite ROM developers have happened upon anything "interesting" regarding location data baked into stock ROMs/AOSP ROMs/Cyanogen (God forbid), or any other suspicious behavior.
I don't want to see people freaking out, or pointless jokes about tin foil hats, I'm interested in a discussion regarding our Android devices and location data and the storage of that data.
We all know that Google tracks our searches and some location data in order to provide targeted advertising. This is fine, because I would much rather see an advertisement for a 2012 concept car or screenshots from TES:Skyrim instead of something Macy's or Vagisil related. I'm more concerned about unauthorized people gaining access to this data. If I need to get rid of my Droid X with Fission 2.5.7 to protect my younger siblings or my fiancée or my future child, I want to make that decision with HARD DATA to back it up.
~NDK
[EDIT: Mods may move this if necessary, but my question is really directed towards developers and their (much deeper) understanding of Android and how it operates.]
Lookout keeps me safe.
Androidboy35961 said:
Lookout keeps me safe.
Click to expand...
Click to collapse
It may keep your phone safe, yes. Allowing Lookout to track my phone was convenient for a while, but I realized that in 4 years of smartphone ownership I had never lost my phone do to my invention of the ASSPAT. That's right, the Automated Self Search for Phone And Things. I do it every time I leave the house! Anyway, Lookout ended up being just another useless app that added nothing to my Android experience and subtracted battery life. (Although I saw minimal battery life change and actually liked that app.)
On topic, please ask your dev if they have ever happened upon anything suspicious in digging through the Android file structure.
Androidboy35961 said:
Lookout keeps me safe.
Click to expand...
Click to collapse
really? how sure can you be abt that? you know that any app that has root rights can do practically anyth to your phone don't you?

Barclay's Apps (Banking + Pingit)

Many of you know that barlcays apps will not working on rooted handsets.
There are a number of work around's to resolve this issue, but it seams with every time they update there software, they also fix the loop holes.
Anyway let me get to the point.
I went mental, i guess you could say writing a thousand word email complaining and explaining how a rooted phone is more secure than an un-rooted phone, is a bit to far.....
Anyway i got a phone call from the development team at barclays, where i stressed my points further, they basicly said, they read the forums etc, and can see that a number of us are unhappy and still fail to understand why barclays apps are banned from rooted devices and other banks app are not....
They also said that they are looking into getting the app ,on rooted phones(but cant guarantee anything). (I kinda told them a jail broken IPhone is as about as secure as leaving your wallet on the floor) so i dont think they will be enabling for Jailbroken IPhone users just yet haha.
Sick of people controlling us if we want to root our phones and (an according to them) run the risk of loosing our bank details then thats our choice, thats almost like barclays saying, everyone leave your wallets at home because there is a chance you could loose it or get mugged!
So yeah i hope they fix this for us rooted bankers
Would appreciate a comment or two if you use the app (Just in case they ever stumble across this)
======Edit======
Maybe this needs to be moved outside of HOX since its a android related topic - Sorry didnt think
I'm with you
They are just losing business by not enabling in on rooted phones... some people have got it to work on rooted phones if you search a bit,.
But come on Barclays!! My other banking apps work fine.
When i purposely login to the halifax app and then disable the internet the window shows a link
to the content for online banking and appends a "jailbroken=yes" to its url android or ios is the same appendage.
but it still runs though...

[Q] I am worried: Infected/bad binaries here on XDA?

I'm not accusing anyone for anything. I am simply worried about all the different updates, ROMs, zips, binaries, hacks, etc. here on XDA.
I also understand that XDA cannot take any whatsoever responsibility what their users do and create. Everything that comes from these forums are used at each and everyones own risk.
What makes me worried is: It's so easy for anyone to hide "bad code" in commonly used binaries and bundle them with ROMs and updates, and noone will be the wiser.
Why now?
Well. I did install a nice "super-mega-duper-thunder" engine on one of my android devices, but as I am a suspicious person by nature, I always check up what these "update.zip" files contains first.
At fist I did not find anything suspicious, but after installing it. I noticed a higher demand on the data link, transmitting more data than usual.
I found out that the device is now connecting to various IP-adresses all over the planet, transmits some unidentified data and closes the connection. I don't know what's going on, but I find it kinda weird. I do not believe in coincidences either.
I cannot tell if it is some app I recently installed, nor if it is some zip-file I recently installed. I am still investigating this.
Again: I am not accusing anyone for anything... yet. I simply don't know what's going on.
It made me thinking: XDA might be the perfect springboard for anyone to distribute "bad code" to mobile devices, and reach a huge number of them without ever getting busted. How many ROM developers are there on these forums?... and how many have included spywares/viruses/trojans/etc. in their ROM or updated/hacks? ..and how many of us installs these ROMs and updates completely blind, never ever suspecting a thing?
After all. "trusted" developers are just those who haven't been spotted doing bad things... yet.
(I know. It looks like I am pulling everyone over the same edge. But how can one tell the difference between a good developer, and a bad one if both wear white hats?)
I understand that ROMs is hard to check, and thus the perfect target to hide bad binaries in.
Also easy to hide a few kilobytes of bad code inside /META-INF/com/google/android/ for instance.
Is there anything we, the users and developers, can do about this? To make sure that trusted/recognised developers really don't have anything to hide?
What can one sole user do to prevent or reduce the risk of getting bad code on their devices?
Antivirus?... aw.. .don't try that one. Only script kiddies get busted by antivirus softwares. A good developer write their own "bad code".
Perhaps one should just stay with the stock firmware?
Running custom software always has a risk, its best to stick to well known Devs and try and keep tabs on the feedback in the forum, eventually somebody will figure out if something stinks.. Don't just blindly flash any zip because it promises double data speeds or 4x the battery life from random members with a low post/thanks account.
Even stock software has it exploits.
super mega duper thunder engine?? lol... btw i feel best to keep a check on my data usage myself...(i still dun knw what android os transfers in background)
as my friend said in above post... best is to stick wid well knwn developers..

Phone hacked need advise and guidance

Hi
I know that this will sound like another hacked story but I know what to do.
My phone got hacked couple of months back.i didnt know it was untill the hacker started to leave clues. It was then that i started really payibg attention to everything going on. but keeping quiet abort it so that he or she thinks i didn't know
I know of 3 incidents that may have conpronised my security coupled by the fact that I did not practice password hygiene or unique ones for all accounts. I know that its totally my fault and i am not goings to blane Android os. So please dont think of this as one of tjose posts
What i now need is help in understanding what tondo next.
Little details on what happens, lets say i get search for some one on Facebook. The same is Charles smith, I Finish off my search and open Instagram boom i see a pictures where recommended shows a google search page where Charles is written and the Google auto complete is giving options .
Happened twice
I tumlr and I don't really post anything in fact My blog is totally blank. Suddenly i have people followings me and they tend of hame my nick name as their user id .the id displays my WhatsApp status updates.
These and just two examples i have more but i think everyone gets whats going on.
things i have done to prevent such occurences factory formatting the phones mac abd router. Gotten new routers and ready to flash a custom firmware for them.
Password changes .everything.wps2 aes wifi password with random numbers upper case lower case n symbols
Passwords are written on paper without a electronic backup and under lock and key.
I thought that maybe its a key logger but i took my moto x2 n moto e2 to the service center and got them to re load official software.
Two days later bam the same thing.
Any suggestion on where the weakness is ?
The problem is that I am kind of tired if thi
Sent from my XT1092 using XDA Forums
Check account sync settings if it is on more applications can use various private data.
Sent from my A0001 using XDA Free mobile app
i dont understand?
can u explain , i have sync on should I not have it
on different note does anyone suggest rooting and installing something that can isolate and restrict data from being accessed. now i know that exposed does that and marshmallow will work that out. but any other guidance ?
Did you use a virus or malware scanner?
Are there any apps you didn't install on your phone?
If i were you, i would start with doing the following steps by their exact order to get rid of the hacker and operate on a "safe" system.
1- Backup personal files to pc and deep scan them with virus scanner, make sure they're clean.
2- Unlock the bootloader of device and flash every image manually with fastboot from stock factory image.
3- After flashing the images, go to stock recovery and wipe data / factory reset and wipe cache for a complete, untouched system.
4- Change account passwords with stuff that are unrelated to you. I mean if you made a google search for firedance, don't include dance or fire in any your passwords.
* also change the " forgot my password " questions and their answers.
5- Once you boot the system, download any ota packages from the manufacturer to be sure you'd be on a safer and patched software for security.
For future securtity, be sure to check apps permissions before installing anything from google play or external places. Don't root your device and don't enable USB Debugging in developer options. Hope it helps.
Semseddin said:
If i were you, i would start with doing the following steps by their exact order to get rid of the hacker and operate on a "safe" system.
1- Backup personal files to pc and deep scan them with virus scanner, make sure they're clean.
2- Unlock the bootloader of device and flash every image manually with fastboot from stock factory image.
3- After flashing the images, go to stock recovery and wipe data / factory reset and wipe cache for a complete, untouched system.
4- Change account passwords with stuff that are unrelated to you. I mean if you made a google search for firedance, don't include dance or fire in any your passwords.
* also change the " forgot my password " questions and their answers.
5- Once you boot the system, download any ota packages from the manufacturer to be sure you'd be on a safer and patched software for security.
For future securtity, be sure to check apps permissions before installing anything from google play or external places. Don't root your device and don't enable USB Debugging in developer options. Hope it helps.
Click to expand...
Click to collapse
Don't Root your device? Don't check USB debugging? Seriously? That is your answer? Wow, do you work for Verizon or AT&T by some chance? Sorry, but with Root and some nicely placed Xposed modules, this persons phone or tablet would be more safe than anything g Verizon or AT &THE could conjure up. You are a dope! Lol! Seriously, go away. Bother another community. ?
Sent from my SM-N910V using Tapatalk
Jaytronics said:
Don't Root your device? Don't check USB debugging? Seriously? That is your answer? Wow, do you work for Verizon or AT&T by some chance? Sorry, but with Root and some nicely placed Xposed modules, this persons phone or tablet would be more safe than anything g Verizon or AT &THE could conjure up. You are a dope! Lol! Seriously, go away. Bother another community. ?
Sent from my SM-N910V using Tapatalk
Click to expand...
Click to collapse
Pardon me but where does that come from ? Made me laugh. Since this is security forum, the first priority is security not your "nicely put xposed modules whatever that means". It is said many times by security experts rooting an android device removes a big portion of layer of security. I unfortunately don't work for AT&T or Verizon but i wish i worked for them for a nice salary.
This one is coming from the recognized developer and moderator of XDA Android Security forum. Someone who have exploited devices and found vulrenabiliies that you can't even dream of. Lets say i am a "dope" and you're the smart guy. Are jcase, steve kondik dopes as well ?
http://securitywatch.pcmag.com/secu...-have-android-settings-from-a-security-expert
http://www.dailytech.com/CyanogenMod+Creator+Tells+Android+Users+to+Rethink+Rooting/article33058.htm ( yeah, even steve kondik doesn't approve rooting for general users.
https://blog.kaspersky.com/rooting-and-jailbreaking/1979/ " Kasperksky a security platform well known for years are also against rooting.
Think again if you can who is the dope, now, go bother in your nicely put xposed modules forums for the sake of security. :good:
Semseddin said:
Pardon me but where does that come from ? Made me laugh. Since this is security forum, the first priority is security not your "nicely put xposed modules whatever that means". It is said many times by security experts rooting an android device removes a big portion of layer of security. I unfortunately don't work for AT&T or Verizon but i wish i worked for them for a nice salary.
This one is coming from the recognized developer and moderator of XDA Android Security forum. Someone who have exploited devices and found vulrenabiliies that you can't even dream of. Lets say i am a "dope" and you're the smart guy. Are jcase, steve kondik dopes as well ?
http://securitywatch.pcmag.com/secu...-have-android-settings-from-a-security-expert
http://www.dailytech.com/CyanogenMod+Creator+Tells+Android+Users+to+Rethink+Rooting/article33058.htm ( yeah, even steve kondik doesn't approve rooting for general users.
https://blog.kaspersky.com/rooting-and-jailbreaking/1979/ " Kasperksky a security platform well known for years are also against rooting.
Think again if you can who is the dope, now, go bother in your nicely put xposed modules forums for the sake of security. :good:
Click to expand...
Click to collapse
For a dope, I suppose that Root is a security risk. But, just because a device is not Rooted, does not mean it is secure by any stretch of the imagination. Truthfully, they are more unsecured if locked out from the user. That is, if the person is not a dope. What I am saying is that your advice, for the OP to take every update and not Root, was not really that helpful. If the OP installed an app that was a risk, then all the updates and non Root, will not help them. Now, if you were to show them, that if they were to Root, and use certain apps and modules on their device. Then they could keep a better eye out for potential problems. But, even if they did as I just said. If the OP is being a dope, and installing apps that, let's say, they obtained from a torrent site. Then, well, dope would be a fitting title for them as well.
And, if those recognized developers stated that Root was not good at all. Then yes, dope would be a fitting application of the word. Root is only bad for those that are dopes.
I believe that you inadvertently called the OP a dope. You did not help them all that well. What you did was help them to get rid of the problem temporarily. Do we know who apps are on their device? It would be a good idea to know these things. Also, where did they get these apps from? Kind of a big deal there.
But, if you were wondering what it is that I am talking about in regards to xposed. Look it up.
http://repo.xposed.info/module/de.robv.android.xposed.installer
I suggest the OP do the same. As well as anyone else who is having g issues. Now, knowing about xposed and the modules that can accompany it. Will not fully protect anyone from blatant stupidity. Read, read, read. And practice safe device use. There are so many avenues to protecting g ones self. But a big one that anyone can do. Don't download from shady places. Though, it is even very possible to get in trouble from apps from the Play store. Knowing what apps are asking for what permissions is important. What bothered me about your post is that you in the same post, stated for them to unlock the bootloader and then, to not root. Verizon and AT&T are advocates of the no Root behavior. And that sickens me. As well as many others. Instead of helping g people to see the dangers. They are told to do the most simplest of tasks, not to Root. And that they would be fine. Absolutely and completely false and misleading. Now, and again, for a dope. I suppose this would be fine. Though, it is not helpful. Education into matters are. One needs to seek out the underlying issue first. Then attempt to educate. As far as calling you a dope, I do humbly apologize for my Choi e of words. You did not deserve that. It would have been just fine for me to build onto what you suggested. Which was good advice. So, I am sorry. And yes, I am very much a dope at times .
Sent from my SM-N910V using Tapatalk
Jaytronics said:
For a dope, I suppose that Root is a security risk. But, just because a device is not Rooted, does not mean it is secure by any stretch of the imagination. Truthfully, they are more unsecured if locked out from the user. That is, if the person is not a dope. What I am saying is that your advice, for the OP to take every update and not Root, was not really that helpful. If the OP installed an app that was a risk, then all the updates and non Root, will not help them. Now, if you were to show them, that if they were to Root, and use certain apps and modules on their device. Then they could keep a better eye out for potential problems. But, even if they did as I just said. If the OP is being a dope, and installing apps that, let's say, they obtained from a torrent site. Then, well, dope would be a fitting title for them as well.
And, if those recognized developers stated that Root was not good at all. Then yes, dope would be a fitting application of the word. Root is only bad for those that are dopes.
I believe that you inadvertently called the OP a dope. You did not help them all that well. What you did was help them to get rid of the problem temporarily. Do we know who apps are on their device? It would be a good idea to know these things. Also, where did they get these apps from? Kind of a big deal there.
But, if you were wondering what it is that I am talking about in regards to xposed. Look it up.
http://repo.xposed.info/module/de.robv.android.xposed.installer
I suggest the OP do the same. As well as anyone else who is having g issues. Now, knowing about xposed and the modules that can accompany it. Will not fully protect anyone from blatant stupidity. Read, read, read. And practice safe device use. There are so many avenues to protecting g ones self. But a big one that anyone can do. Don't download from shady places. Though, it is even very possible to get in trouble from apps from the Play store. Knowing what apps are asking for what permissions is important. What bothered me about your post is that you in the same post, stated for them to unlock the bootloader and then, to not root. Verizon and AT&T are advocates of the no Root behavior. And that sickens me. As well as many others. Instead of helping g people to see the dangers. They are told to do the most simplest of tasks, not to Root. And that they would be fine. Absolutely and completely false and misleading. Now, and again, for a dope. I suppose this would be fine. Though, it is not helpful. Education into matters are. One needs to seek out the underlying issue first. Then attempt to educate. As far as calling you a dope, I do humbly apologize for my Choi e of words. You did not deserve that. It would have been just fine for me to build onto what you suggested. Which was good advice. So, I am sorry. And yes, I am very much a dope at times .
Sent from my SM-N910V using Tapatalk
Click to expand...
Click to collapse
Humble apology accepted.
You may not like AT&T and Verizon for their tight stance against rooting.I don't like that as well. They're filling their devices with their bloatware and excluding some very useful features from their customers like hotspot for free. However, Anyone who owns an operator variant of a specific device have already signed a contract with his operator already accepted their terms and that's why they get their bloated and controlled devices for cheaper prices in long term instead of paying full in cash. That said, i see nothing wrong with AT&T or Verizon's policy of keeping their devices locked to death since rooting would take a stake from their business and that was not their agreement with their customers. This is not the subject of this thread for sure. Should add, i see nothing wrong if a contracted owner a device wants to take full potencial out of it by rooting since it is the only way for them to get rid of bs in their devices. This is another discussion, not related to this thread.
I will use the word " regular user " instead of "dope" since nobody have to be knowledgeful about android security. Being someone without a clue of android security wouldn't make them a "dope". I currently sport a Moto Maxx, a bootloader unlockable variant of Verizon Droid Turbo sold in Brazil. I paid about 150$ more just to be free of Verizon Bloatware for the exact same hardware. I could have paid 150$ less and bought a Verizon Droid Turbo but i didn't just because i knew i would have Verizons' bs running in my phone every second. There used to be a time for me when rooting was a must with android because i used to own devices bloated with Motoblur, having low amount of ram and storage as well as unavailbility of disabling/deleting of unwanted apps. Now, i have 3gb of ram and 64gb storage with near Vanilla Android experience with my phone. I asked myself, what the heck do i need rooting for ? The answer was easy : nothing.
Lets say, android is an apartment, the root is the key to its door, xposed is the "watchdog" and hacker is the "thief". Would you keep the door unlocked and rely on a dog for its security ? I personally wouldn't do that cause the dogs can be fooled easily by a piece of meat and most importantly they have no responsibility at all. After all, It is just a dog serving for free without any responsibility. I couldn't ask for insurance as well cause i was the one who kept the door unlocked. I am also aware that any door can be opened without a key and the dog can be bypassed easily and the hacker can get whatever he wants. Things will happen if they're destined to be happen, we can't avoid some. Still, it is always our responsibility to keep the door locked in the first place and take counter measurements against. That was what i was pointing in my post.
Disabling USB debugging is the first thing one should do if there're concerns about security and this is not coming from a "dope" but security experts of android. :good:
Semseddin said:
Lets say, android is an apartment, the root is the key to its door, xposed is the "watchdog" and hacker is the "thief". Would you keep the door unlocked and rely on a dog for its security ? I personally wouldn't do that cause the dogs can be fooled easily by a piece of meat and most importantly they have no responsibility at all. After all, It is just a dog serving for free without any responsibility. I couldn't ask for insurance as well cause i was the one who kept the door unlocked. I am also aware that any door can be opened without a key and the dog can be bypassed easily and the hacker can get whatever he wants. Things will happen if they're destined to be happen, we can't avoid some. Still, it is always our responsibility to keep the door locked in the first place and take counter measurements against. That was what i was pointing in my post.
Disabling USB debugging is the first thing one should do if there're concerns about security and this is not coming from a "dope" but security experts of android. :good:
Click to expand...
Click to collapse
To show how ridiculously and persistently wrong you are, I am going to use your above example. If root is your key, then what you are doing is giving that key to Google and device manufacturer, while throwing your own copy away. In your own apartment, you are only allowed to go where google and verizon let you. This makes no sense whatsoever, unless the apartment owner is a real dope (no personal offence meant).
Disabling usb debugging also sounds like an aria from the same opera. If the device is on your person, this provides no additional security at all, as usb debugging is only relevant when your phone is connected to computer. If someone physically takes your device, it would take 10 seconds to enable debugging.
Root provides you an opportunity to control your device and restrict system apps, thereby reducing possibilities for hackers to take over your phone... As I have already mentioned before, every operating system provides root access to users. The only reason it is not done on smart phones is becase manufacturers, carriers and OS providers want to turn users into walking advertising beacon-dopes. Again, no offence meant...
optimumpro said:
To show how ridiculously and persistently wrong you are, I am going to use your above example. If root is your key, then what you are doing is giving that key to Google and device manufacturer, while throwing your own copy away. In your own apartment, you are only allowed to go where google and verizon let you. This makes no sense whatsoever, unless the apartment owner is a real dope (no personal offence meant).
Disabling usb debugging also sounds like an aria from the same opera. If the device is on your person, this provides no additional security at all, as usb debugging is only relevant when your phone is connected to computer. If someone physically takes your device, it would take 10 seconds to enable debugging.
Root provides you an opportunity to control your device and restrict system apps, thereby reducing possibilities for hackers to take over your phone... As I have already mentioned before, every operating system provides root access to users. The only reason it is not done on smart phones is becase manufacturers, carriers and OS providers want to turn users into walking advertising beacon-dopes. Again, no offence meant...
Click to expand...
Click to collapse
I see your point, respect it but disagree. Your example doesn't really work with my logic since you're putting players like Google/Verizon in the same league with an hacker. Yes, they for sure have control over their software since they're the one who created Android and offered the hardware along with an oem in the first place. These big companies are not like 3rd party devs who are irresponsible for any their actions.. If you happen to have sensetive privacy trust issues with Google, leave any android device out, you wouldn't even use google search in your pc.
A hacker having pyshical access to a device who would enable USB debugging in 5 seconds. is this what we're really talking about ? Anyone who have a device in hand doesn't need to be a hacker to get data from it. Have a coffee with the target sitting next to to him, memorize his passcode Done. Another way is to flash twrp and give some adb shell commands to bypass any lockscreen code. Done. USB debugging ON help with apk rooters and computer based root exploits as well.They rely on usb debugging to be on. You're hacked in no time.
I just can't trust any 3rd party dev more than my device manufacturer / operating system provider and network provider. I think the same for you like you're persistently and ridiciolusly wrong by giving too much credit to some unknown sources instead of those who have an actual business address. :good:
Just kiss each other already or dont say anything.
This thread is made by someone who needs help and you two both are taking it off topic instead of helping him. Now out of respect for that user, stop this endless conversation.
Semseddin said:
I see your point, respect it but disagree. Your example doesn't really work with my logic since you're putting players like Google/Verizon in the same league with an hacker. Yes, they for sure have control over their software since they're the one who created Android and offered the hardware along with an oem in the first place. These big companies are not like 3rd party devs who are irresponsible for any their actions.. If you happen to have sensetive privacy trust issues with Google, leave any android device out, you wouldn't even use google search in your pc.
A hacker having pyshical access to a device who would enable USB debugging in 5 seconds. is this what we're really talking about ? Anyone who have a device in hand doesn't need to be a hacker to get data from it. Have a coffee with the target sitting next to to him, memorize his passcode Done. Another way is to flash twrp and give some adb shell commands to bypass any lockscreen code. Done. USB debugging ON help with apk rooters and computer based root exploits as well.They rely on usb debugging to be on. You're hacked in no time.
I just can't trust any 3rd party dev more than my device manufacturer / operating system provider and network provider. I think the same for you like you're persistently and ridiciolusly wrong by giving too much credit to some unknown sources instead of those who have an actual business address. :good:
Click to expand...
Click to collapse
This is not about respect, disrespect or disagreements. The facts (not opinions) remain: every operating system on Earth provides root or administrative privileges to users. However, it is not given to the same user when he turns to a smartphone. There is no security reason whatsoever why a user has root on computer and no root on a smartphone.
As I have already said, there are plenty of non-security reasons for the above: the main one being to prevent the user from removing advertising junk and spying malware inserted there by manufacturers, carriers and software providers. Kids love it (above three) and Mother (NSA) approves...
Every argument against root invalidates itself when applied to computer OS: remember the user is the same.
@its the peanut
Please stop patronizing. This is a security discussion thread and we discuss security, which is beneficial to the poor guy, the OP... :silly:
Semseddin, what do you do to stop fastboot?
rooting and knowledge go hand in hand, the OP states device is rooted, but sounds like hasn't got the interest to know what's behind the process. that is why we don't have the slightest piece of evidence that his device has been compromised. just the users opinion that it has.
having su and adb debugging at least allows them to logcat.

Is Rooting your device illegal?

Sorry if this question has been answered already, but I haven't found a recent (ie within a year) thread about this when I searched. I haven't rooted anything in years and I've just got a Galaxy Tab Pro and was looking into Rooting it. My friend who has an HTC One has also reached out to me asking me how to Root it.
When I started researching methods I kept running across articles that were stating that Rooting a device is now illegal? I've never heard of this before, is it true? Anyone have links to information that says otherwise?
No it's not but In most cases it will void your warranty. also most of the time you could always unroot your device. I used KingRoot to root my phone it's an app it was quick and simple.
Sent from my BLU STUDIO 7.0 II using XDA Free mobile app
It depends what you do with root. If you root it to "hack" or "snif" then you're doing a illegal thing. If you root it to costumise your Android then, you're not disturbing a privacy from another person or what else.
Hit the Thanks Button if I helped
You bought and own it. You can do what you like with it. Of course if it's a stolen phone and you're rooting it to mess with the IMEI, then that's another matter.
Does anyone have links to articles or information confirming this? Because all I can find are articles stating that it is illegal with the 2nd article below stating that "Tablets cannot be Rooted AT ALL" (*edit: apparently I can't post links yet)
godzillinois said:
Does anyone have links to articles or information confirming this? Because all I can find are articles stating that it is illegal with the 2nd article below stating that "Tablets cannot be Rooted AT ALL" (*edit: apparently I can't post links yet)
Click to expand...
Click to collapse
I don't know what you have been reading, but it's wrong. Root is perfectly legal. My Nexus 7 and Nexus 9 are both rooted.
Where are you getting this information? That part of the internet should just go ahead and die.
well like I said, I can't post links yet because I'm still 'new' but if you just Google Root and Illegal a bunch of articles come up (some contradicting the others, which is why I was looking for a definitive answer from somewhere.)
godzillinois said:
well like I said, I can't post links yet because I'm still 'new' but if you just Google Root and Illegal a bunch of articles come up (some contradicting the others, which is why I was looking for a definitive answer from somewhere.)
Click to expand...
Click to collapse
I think you don't quite get how search engines (google) works: you can google illegal and pineapples, and get a bunch of articles.
The only issue with rooting would be that it breaks/voids warranty in most cases, and if your device was obtained on contract i.e. still technically the property of your provider, then rooting might be against the terms of service - the consequence of which varying depending on the provider.
HypoTurtle said:
I think you don't quite get how search engines (google) works: you can google illegal and pineapples, and get a bunch of articles.
The only issue with rooting would be that it breaks/voids warranty in most cases, and if your device was obtained on contract i.e. still technically the property of your provider, then rooting might be against the terms of service - the consequence of which varying depending on the provider.
Click to expand...
Click to collapse
I wasn't searching for it outright, I was actually searching for the pros and cons of rooting since my buddy was interested, and a couple of the articles I kept running into kept mentioning the illegality part. Since I can't post links I just suggested that one Google Root and Illegal since someone actually asked where I got my information. I figured it would be easier than explaining all this and then telling him to Google "Pros and Cons."
Obviously I know how a search engine works, no need for the passive aggressive comments - especially when you provide no other help than what was already said.
godzillinois said:
I wasn't searching for it outright, I was actually searching for the pros and cons of rooting since my buddy was interested, and a couple of the articles I kept running into kept mentioning the illegality part. Since I can't post links I just suggested that one Google Root and Illegal since someone actually asked where I got my information. I figured it would be easier than explaining all this and then telling him to Google "Pros and Cons."
Obviously I know how a search engine works, no need for the passive aggressive comments - especially when you provide no other help than what was already said.
Click to expand...
Click to collapse
Sorry, wasn't meaning to sound that way, but your question is rather vague as there isn't one universal global law system - although arguably there should be for digital matters.
To fully answer there are several parts to look at; primarily does it violate local laws - in some cases it can be argued that it breaks copyright law. Additionally you need to question on if the 'broken law' is inforcable - inmost cases it is not and the said laws were made in a pre-digital age and haven't been updated to account for the current world. As an example - setting the wrong age (or a fake profile) on FB is technically illegal as it's against the TOS which is a legal document; but the proseccution of these lawbreakers isn't feasible or inforcable.
Although as i stated previously - this can be slightly different if the device isn't wholely owned by the user i.e. the device cost was covered by the network provider and essentially loaned to the user until the contract is over.
Fair enough - sorry to jump on you, so I guess to be more specific I was looking into the legality of Rooting devices that are out of contract in the US/Illinois. My friend's phone is older than 2 years well past his contract, and I bought a refurbished Wifi-only Galaxy Tab Pro which seems is stuck on Kit Kat for now.
I'm mainly looking to Root to turn off my back button and gain write access to my external SD card (as well as remove bloat) but the Wifi-tether I was finding in articles seems intriguing. Although that seems like if anything that came from Rooting would be illegal that would be it (and bootlegging paid apps of course.)
godzillinois said:
Fair enough - sorry to jump on you, so I guess to be more specific I was looking into the legality of Rooting devices that are out of contract in the US/Illinois. My friend's phone is older than 2 years well past his contract, and I bought a refurbished Wifi-only Galaxy Tab Pro which seems is stuck on Kit Kat for now.
I'm mainly looking to Root to turn off my back button and gain write access to my external SD card (as well as remove bloat) but the Wifi-tether I was finding in articles seems intriguing. Although that seems like if anything that came from Rooting would be illegal that would be it (and bootlegging paid apps of course.)
Click to expand...
Click to collapse
You can easily bootleg paid apps without root, so don't think that rooting is opening up the phone to the "dark side" of Android.
Rooting devices is not illegal anywhere in the US. It does, however, void your warranty and if you were to trade in the device for credit towards a new one they will likely not take it and force you to pay the difference.
But if you own the device outright (not on contract or paid full price), it is yours and you can do anything you like with it. You can root it, you can smash it with a hammer, or you can bake it into a cake. The possibilities are endless.
Even if you don't "own it" outright yet (i.e. are on a 2 year contract or pay monthly installments) you can still modify the device in any way as long as you finish your contract/agreement.
As long as you don't use root access to do illegal things, it's perfectly fine. Root itself is harmless.

Categories

Resources