Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Android Hardware Hacking Hardware Linux

Ask Slashdot: Can I Trust Android Rooting Tools? 186

Qbertino writes After a long period of evaluation and weighing cons and pros I've gotten myself a brand new Android tablet (10" Lenovo Yoga 2, Android Version) destined to be my prime mobile computing device in the future. As any respectable freedom-loving geek/computer-expert I want to root it to be able to install API spoofing libraries and security tools to give me owners power over the machine and prevent services like Google and others spying on me, my files, photos, calendar and contacts. I also want to install an ad-blocking proxy (desperately needed — I forgot how much the normal web sucks!). I've searched for some rooting advice and tools, and so far have only stumbled on shady looking sites that offer various Windows-based rooting kits for android devices.

What's the gist on all this? How much of this stuff is potential malware? What are your experiences? Can I usually trust rooting strategies to be malware-free? Is there a rule-of-thumb for this? Is there perhaps a more generic way for a FOSS/Linux expert who isn't afraid of the CLI to root any Android 4.4 (Kitkat) device? Advice and own experiences, please.
This discussion has been archived. No new comments can be posted.

Ask Slashdot: Can I Trust Android Rooting Tools?

Comments Filter:
  • by Anonymous Coward on Sunday January 18, 2015 @11:58AM (#48844711)

    My phone exploded, and I had to have one of my hands amputated.

    Learn from my mistake. Don't do it. Your hands are too important.

    • Rooting an android (Score:5, Informative)

      by Anonymous Coward on Sunday January 18, 2015 @12:23PM (#48844839)

      I've been running rooted for about 4 years on various phones.

      There are quite a lot of tools that you can run while rooted that are impossible otherwise.

      This includes the ROMs themselves which don't usually come with the normal Google tools at all.

      Then you can leverage tools like AppOps (integrated into many of the custom ROMs) to control granularly what info apps can get.

      You can run things like AdAway, which basically block ads systemwide (including in apps).

      The F-droid app repository has quite a lot of open-source software, and you can build a perfectly functional phone without Google apps.

      As already mentioned, XDA-developers is a good place to start, even just to find info about your specific device, and guides for rooting, etc.

      On balance, my opinion is that, if you do your diligence and set things up correctly, a rooted phone can absolutely be more secure than not.

      As a small suggestion, if you decide to jump in, I highly recommend using ClockworkMod (Koush) superuser manager, because it's open-source and let's you set a pin for SU without paying for an upgrade.

      • by rwa2 ( 4391 ) * on Sunday January 18, 2015 @04:04PM (#48846025) Homepage Journal

        Yep, if you have any qualms about doing stuff on Android, feel free to get a cheap Android tablet to experiment on, like the old $200 Nexus 7. Then you can feel free to fill that one with games and crapware and wipe and reload it regularly like a Windows gaming box. This lets you play without too much risk without compromising your primary Android device. If you use the same google Play account, you don't even have to buy your paid apps twice (though of course then you're exposing your google account that you use to pay for Google apps, but if you're like me, that's separate from your personal gmail account)

        My primary Android device is my phone, and I just keep a bare minimum of essential apps on it so it runs fast and lean. After the Android 5 update, haven't even felt compelled to root it.

        • by lsllll ( 830002 )

          ... reload it regularly like a Windows gaming box.

          Wow! The Windows install/update/drivers process is so painful that I am extremely careful in selecting what I install on my gaming machine. I can upgrade to a new version of Fedora in 15 minutes, give or take a minute or two, though. When it comes to my Windows installation, the ONLY thing I install is games I intend to play. Now if I need to experiment in a Windows environment I don't care about, I use VirtualBox and turn on snapshots.

          • by rwa2 ( 4391 ) *

            Eh, with Windows 7 it hasn't been that bad, or even with Win98 before that. Every six months or so when it starts having problems, just reinstall from scratch, walk away and let it reboot a few times to finish updates, then install the nVidia updater and Steam and anything else from ninite.com . Just a few more steps than setting up a fresh Linux Mint box.

            That said, the last time my C:\ drive failed, I restored my AppData dir from backups into the new system but still couldn't get some of my games to fin

            • You left the part out where this may take three hours, during which browsing for drivers and programs may be a great security risk.
              There's even the bug where the SP1 of Windows 7 refuses to install (mine does, googled answers suggest it's a boot due to using dual boot/multiboot causing the damn thing to not recognize the 100MB "system partition" ; there is no solution besides grabbing a Windows 7 + SP1 warez iso and reinstalling)
              There's keeping up with antiviruses to know which "free" one is not pseudo-rans

          • by mlts ( 1038732 )

            One trick I learned is to format the machine completely (using the clean all command under disk part), install the OS of choice, load needed drivers and updates, and once it is in a place where everything is stable... then activate it, and save off a couple wbadmin backups.

            Now, if I need to reload a physical Windows box, I boot the Windows media, format, then reload the image, and reboot. Back to how it was. I can always get fancier by having a USB flash drive with Offline WSUS [1] images so I can get all

  • Try Here (Score:5, Informative)

    by rotorbudd ( 1242864 ) on Sunday January 18, 2015 @12:05PM (#48844739)
    • Comment removed (Score:5, Insightful)

      by account_deleted ( 4530225 ) on Sunday January 18, 2015 @01:08PM (#48845105)
      Comment removed based on user account deletion
      • Comment removed based on user account deletion
        • by David_W ( 35680 )

          Also, TowelRoot, I believe, works for KitKat.

          Confirming that. TowelRoot is what I used when the KitKat upgrade came out for my S3.

      • by jafac ( 1449 )

        I've had my Samsung S5 (Verizon) complain that TowelRoot was malware.

        Also, after rooting, the update process seemed to fail from that point onwards; I can't install any vendor-provided update successfully.

        • by florin ( 2243 ) *

          I've had my Samsung S5 (Verizon) complain that TowelRoot was malware.

          That's more like a contraindication, though. Like a vote of confidence where the entire floor except for the distinguished gentleman Knox from the state of Samsung goes mf-ing AYE!

    • To add more info: (Score:4, Informative)

      by thegarbz ( 1787294 ) on Sunday January 18, 2015 @09:32PM (#48847411)

      The XDA-Developers forum is full of tinkerers and developers themselves. They get a lot of traffic so proposed roots and mods will have quite a bit of feedback allowing you to judge the quality before you attempt to do something.

      Additionally the XDA guys have a known history of calling out other people's shit. They are the ones who find questionable security practices, back to base datalogging and basically nearly everything negative or questionable you have heard about an Android manufacturer you'll have heard it on XDA first.

      I wouldn't trust any shady site for any kind of root exploit, just links from the XDA-Developers forum.

    • Re:Try Here (Score:4, Funny)

      by quenda ( 644621 ) on Sunday January 18, 2015 @09:58PM (#48847543)

      Not that cesspit of hackers!
      The only way to be safe from malware is to stick to respectable corporate sites like C|net's download.com.

    • Re:Try Here (Score:4, Informative)

      by caseih ( 160668 ) on Monday January 19, 2015 @12:44AM (#48848083)

      Ugg. xda-developers is a forum of very smart people, but it's a frustrating place to go to find information. Having to read through dozens of pages of posts trying to glean bits of information is rather fatiguing. Especially topics that stretch on for literally years with hundreds of posts. Sometimes the first posts are updated to provide latest information, sometimes you have to read through several pages of comments to find what you're looking for.

      Really all web forums just suck, plain and simple.

  • Rooting - (Score:5, Informative)

    by joelwest ( 38708 ) * <joel&joelwest,com> on Sunday January 18, 2015 @12:08PM (#48844753) Homepage

    I have had Android devices from Cupcake onward and have always rooted them. That being said, I don't presume that rooting will work and I always presume that I may end up with a bricked device. A reminder that as soon as you start rooting, you have voided your warranty. I have also bricked devices. I learned how to make a jtag that way.

    Your milage may vary.

    • Re: Rooting - (Score:3, Informative)

      by Anonymous Coward

      You havent voided warranty on a rooted device. Most drvices all? Can be safely brought back to factory with all markers erased. Thats been my experience with samsung, asus, and motorola devices

      • Re: Rooting - (Score:4, Informative)

        by Golden_Rider ( 137548 ) on Sunday January 18, 2015 @12:56PM (#48845021)

        You havent voided warranty on a rooted device. Most drvices all? Can be safely brought back to factory with all markers erased. Thats been my experience with samsung, asus, and motorola devices

        Not true for current Samsung devices (S4 onwards) with the KNOX-enabled firmware. If you root those, you will trigger an eFUSE which flags your phone as "warranty void" forever. So yes - you can root even those phones, but you WILL lose the warranty. http://omegadroid.co/wanted-kn... [omegadroid.co]

        • Re: Rooting - (Score:4, Informative)

          by Anonymous Coward on Sunday January 18, 2015 @01:03PM (#48845069)

          Not true for all... I've rooted the Note 3 without triggering the Knox. (KNOX is the reason my next phone won't be a Note 4 or 5, after owning Note 2 & 3).

        • Re: Rooting - (Score:5, Informative)

          by Anonymous Coward on Sunday January 18, 2015 @01:05PM (#48845085)

          Not quite true. If you don't replace the bootloader KNOX won't be tripped. I have an S5 with an unlocked bootloader (t-mobile) that I have rooted without tripping KNOX, using ChainFire's rooting tools.

        • Re: Rooting - (Score:5, Interesting)

          by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Sunday January 18, 2015 @01:50PM (#48845355) Homepage Journal

          Has this actually been tested in court? Seems to me like a root-capable su is compatible software for all intents and purposes and therefore dropping warranty support for users who root should be a violation of the Magnuson-Moss warranty act.

        • by uolamer ( 957159 )

          S4 here, it has KNOX. my bootloader is stock but I use safestrap and HyperDrive ROM. Normally with safe strap you still have your normal rom when you are done but I do not. I can put it back whenever I want if ever needed, remove safe strap, etc. As others have noted XDA Developers is a very good place to start.

          Read up on your exact phone and version you have on the phone.. Honestly just rooting is usually pretty simple and easy removable. Replacing the whole ROM is not hard, but more involved.

        • Don't write WILL in capital letters. There are definitely cases of people having phones fixed under warranty after triggering the KNOX flag. In some countries rooting a phone will also give you legal protection against losing warranty.

      • by allo ( 1728082 )

        i europe you cannot void the warranty by rooting.

    • by johanw ( 1001493 )

      To brick the device is quite difficult (if you don't do it on purpose). Usually you can always reflash the original firmware. To end up in a bootloop, however, is easy and quite scary if you've never done this kind of stuff before.

  • by raymorris ( 2726007 ) on Sunday January 18, 2015 @12:09PM (#48844755) Journal

    That's a good question. I don't think many of the tools and ROMs have been analyzed for security by qualified people. As someone else mentioned, http://forum.xda-developers.co... [xda-developers.com] is the most popular source. You'd hope that if there were major issues with the tools used there someone would notice.

    You can extract a rooted ROM and compare the contents to the stock ROM.

    • by Anonymous Coward

      Imagine if Windows PC manufacturers supplied PCs lacking Administrator access in Windows. People would quite rightly complain, and many would sue their respective PC manufacturers in order to gain full control over their own legal possession. But what if Administrator access were not being supplied because Microsoft did not provide it in Windows in the first place? In that situation, the many lawsuits would rapidly collapse into a single class action against Microsoft.

      That is exactly the situation we h

      • That's an interesting thought. I imagine Google would have two responses to that. First, an Android user can install applications, set security policies such as requiring a PIN or pattern lock, encrypt the data storage - mostly the same things a Windows administrator can do. To say, completely wipe the disk and install a different OS, one does that via the bootloader, not in the OS. That can be done on many (most?) Android devices and is outside of Google's control anyway.

        Secondly, contrary to your cla

        • I'm not certain, but I think there is, CTS [android.com] you need that and comply with ACD (Android Compatibility Definition) to be even considered for a license to ship the Google apps.
    • The same way we noticed teh SSL vulns....?

  • XDA Forums (Score:4, Interesting)

    by Raxxon ( 6291 ) on Sunday January 18, 2015 @12:18PM (#48844811)

    In general, if you're computer-savvy, hitting the XDA Forums will be your best option (IMO) if you're concerned about security. The SuperSU Package can be sideloaded into the device via manual ADB commands for most devices out there (some of them are considerably more difficult than others eg: Current Samsung devices with KNOX). I've owned multiple devices from several vendors and I have yet to have an issue with the posted information from the XDA forums. I would expect that anyone attempting to pass shit-ware in there would get found rather quickly unless it's a very niche device with few people actually interested in it.

    Personally I've yet to use any of the "one click root" kinda options I've seen posted to various sites....

    • Other than tripping Knox, I haven't had any issues with it. Locked bootloaders have given me more trouble than Knox.

  • by Spacelord ( 27899 ) on Sunday January 18, 2015 @12:19PM (#48844815)

    My advice: don't rely on specialized tools that claim to do the work for you, but learn how to do it by hand with adb and fastboot.

  • by PsychoSlashDot ( 207849 ) on Sunday January 18, 2015 @12:25PM (#48844847)
    On the PC, typically Odin is the only Windows executable involved with rooting an Android phone. Standard security best-practices should keep you "safe" here. Obtain Odin from trustworthy sites such as XDA. Use a bi-directional firewall package that tells you when your PC tries to make an outbound connection. Odin shouldn't.

    On the phone, if you're just rooting, you're trusting the manufacturer of your phone, which isn't necessarily wise, but I see that's WHY you're rooting. So, you can get the XPosed Framework and XPrivacy, and set permissions for the various packages on your phone. Both are open-source.

    If you don't actually read the code, then by definition you're trusting, period. So what's the issue?
    • . So, you can get the XPosed Framework and XPrivacy, and set permissions for the various packages on your phone. Both are open-source.

      Not on lolipop :)

      That said, I have yet to have an android phone (or device) that I have not rooted. I love adaway way to much to live without it (and titanium backup is a great tool.) I actually prefer CM or AOSP based roms now but mileage varies depending on the device.

    • On the PC, typically Odin is the only Windows executable involved with rooting an Android phone.

      What is your basis for saying that? Odin is a Samsung internal flashing tool for Samsung devices. There are open source tools which work better (IMO) and also still only cover Samsung phones.

      This is of little comfort to the Lenovo tablet which the OP was asking about. Many other devices don't have such easy flashing tools such as Motorola where root exploits and the ability to flash come from exploits that people have found and abused.

      Also XPrivacy is not a silver bullet. It only works on an application lev

  • The last phone I rooted only had rooting tools available in Chinese. It seems to have worked, but ...
  • by allquixotic ( 1659805 ) on Sunday January 18, 2015 @12:27PM (#48844857)

    Most root exploits I've seen have two components to them: the attack vector, and the payload.

    The attack vector is usually a series of commands that have to be run to get the payload onto the device. This part is fully auditable and usually "open source" in the sense that you can perform these commands yourself. If someone sends you a .bat script with a bunch of adb commands, you can always open up the script and read it and make sure nothing is malicious in there.

    The real problem is that 99% of the root exploits out there have to upload some kind of a binary file to the device, which is then executed. In MOST cases, the source code to this binary is not disclosed, perhaps to make it harder for the manufacturers to fix the exploit, or to keep their attack methods secret, in case the code might expose some more general pattern of attack that would enable the manufacturers to close a whole series of root exploits.

    So basically you are trusting someone who compiled a Linux binary *whose job is to obtain escalated privileges on your device* to then not use those privileges to install some kind of tracking malware, data siphon, or cookie exfiltrating software, or even just a rootkit providing them a backdoor, which initially does nothing but can be activated at any time when the author feels they need something from your device (like participating in a botnet, perhaps?).

    I'm a little surprised that the comments so far haven't really tackled the crux of your question, which was NOT "how do I find root exploits", but "are they trustworthy". Remember, folks, just because it's posted on XDA, doesn't mean it's trustworthy. Anyone can register an account on XDA; absolutely anyone.

    I've read statements from root exploit authors who've said in plain language that they have no motivation to bundle malware in their root exploits and thus don't ever do so, but that's like the NSA saying they don't spy on Americans. We have no way of verifying the statement, and several reasons to suspect the contrary.

    If you are in doubt, I would suggest that you forego root exploits altogether. Instead, you should simply refuse to buy any Android device where the manufacturer does not provide you a means to unlock the bootloader. Once you have a (legit) unlocked bootloader using official tools from the manufacturer, you can then proceed to install any ROM you want -- even an open source ROM that you could audit yourself -- which then gives you root access. Remember, on an Android device, root is far less powerful than an unlocked bootloader, so that's really what you should be aiming for anyway, to have a truly "open" device as an enthusiast.

    • I would suggest that you forego root exploits altogether. Instead, you should simply refuse to buy any Android device where the manufacturer does not provide you a means to unlock the bootloader. Once you have a (legit) unlocked bootloader using official tools from the manufacturer, you can then proceed to install any ROM you want -- even an open source ROM that you could audit yourself -- which then gives you root access. >

      I didn't really get this until I got my tmobile S5. Not only is an unlocked bootloader safer, it's much easier to play with and you don't have to worry that someday you will have to decide if you want to risk upgrading and losing your unlocker bookloader (freedom.)
      I started with an EVO 4G. I updated it when I first got it like I do with OS's for computers. I ended up with a locked bootloader and couldn't do any of the cool stuff I had wanted the phone for. Sure months later a new exploit was found but i

    • by c ( 8461 ) <beauregardcp@gmail.com> on Sunday January 18, 2015 @07:52PM (#48847029)

      I'm a little surprised that the comments so far haven't really tackled the crux of your question, which was NOT "how do I find root exploits", but "are they trustworthy".

      Well, the way I see it, I'll trust a random XDA developer pushing closed-source hacks way more than I trust my carrier and/or handset manufacturer.

      It'll grant you that it's a low bar.

      • "Well, the way I see it, I'll trust a random XDA developer pushing closed-source hacks way more than I trust my carrier and/or handset manufacturer."

        That's just plain silly.

        Unless your random XDA developer also manufactured the phone and supplied the stock firmware, then you need to trust two parties: that random XDA developer AND your carrier. Remember just because the phone is rooted doesn't mean it also isn't running the manufacturer's (if any) malware.

        So a phone which can be unlocked using a manufacture

        • by c ( 8461 )

          Remember just because the phone is rooted doesn't mean it also isn't running the manufacturer's (if any) malware.

          Sure. But we're talking about evaluating trust, not whether or not the phone's running malware. If I'm running a stock firmware, in my mind it's already compromised; slapping an XDA hack on top of it doesn't strike me as increasing risk substantially.

          That being said, I don't find getting root at all useful unless it's a means to the end of unlocking the phone and replacing the stock firmware. I t

    • Then the flip side to the argument is that most exploits and malware by vendors is discovered by XDA which in general people would consider white hats.

      Do you setup an identity theft business inside a police station? Yes you'd be able to get a lot of identities, but think about the odds of getting caught.

  • We neither know where you take your tools from nor the actual version you're using. And even if we did, by the time such a through analysis is done, the next version rolls about and we can restart rolling that boulder uphill. And even if we did, why should you believe us? There are too many corporations who have a vested interest in you not rooting that device and thinking that any and all rooting tools are malware. Misinformation would most likely dominate such an examination effort.

    The best one can tell y

  • Then an Android device was a bad choice.

    1) Most of the important functionality (including the WebKit/Blink browser engine) are now embedded in Google Play Services, which you can't manage.

    2) Total ownership of a device with a proprietary radio isn't realistic - even if you managed to install straight Linux on the thing (unlikely) the underlying firmware is in the bag.

    3) Better to return that machine and go with a Yoga 2 Pro honestly. You'll have the ability to install Linux on it and have far grea

    • You do realize that you can have Android without Google right? That Android and Google Play are not the same thing?
    • Im confused by point #1. Are you saying you cant have an android device without google services? You dont NEED gmail and Chrome, they are easily replaced.
      • Re: (Score:2, Informative)

        by hax4bux ( 209237 )

        gMail and chrome != Google Play Services

        Google Play Services is like iTunes for Android, there is an agent on the phone which does such chores as:
        1) deliver GCM "push" notifications (and other housekeeping chores)
        2) notify you of application updates
        3) probably other stuff but I haven't had coffee yet

        +1 to brad-x, if you are serious about owning the machine then you should not be on Android

        • by dave420 ( 699308 )
          Google Play Services can be removed, or at least entirely disabled... You don't even have to install GApps, and use F-Droid or Amazon or even nothing as your APK source...
    • 1) Most of the important functionality (including the WebKit/Blink browser engine) are now embedded in Google Play Services, which you can't manage.

      This depends on how you define important functionality. You can't use any gapps without play services, and you will need another browser, but there are other browsers.

      Total ownership of a device with a proprietary radio isn't realistic - even if you managed to install straight Linux on the thing (unlikely) the underlying firmware is in the bag.

      Most of us like to have some kind of wireless communications, and that's going to be true of pretty much *. Including the Yoga 2 Pro.

      A rooting tool is inherently untrustworthy as it exploits flaws in the target system.

      That really doesn't follow.

  • RTFM (Score:5, Interesting)

    by Anonymous Coward on Sunday January 18, 2015 @12:46PM (#48844971)

    RTFM and get ready to build stuff yourself. You will need to do some research for your particular device and then decide for yourself.

    When I started using Android, it was a Nexus 4. Since the Nexus 4 came from Google, and was widely used by developers, it was easy to unlock the bootloader and root it using tools that were open source and reputable.

    When I purchased a new and less popular phone, I wanted to root it and give it the same treatment. Unfortunately, the only tools I could find for my new device were posted in threads on the XDA forum. Someone posts a recovery + kernel and everyone just downloads and flashes it. Amazing. Well I run a banking app on my phone, how do I know that this thing is only a recovery + kernel and not something extra?

    My other problem with the stuff people post on XDA is that some of the contributors don't seem to really know what they are doing. There's one custom kernel for my device that has a whole slew of useless options and the comment "Please do not ask me to add something, I don't know much about kernel ". So I think there is some amount of "recipe following" by some of the people that contribute on XDA: they figure out a recipe that works, and generate kernels or ROMs without really understanding what it is that they are doing.

    So, my ultimate solution to the problem was just to build everything myself. This took several days for me to scrape together all the information I needed from Google, my device vendor, and random places on the web. I ran into the same problem: I needed tools to do this (specifically a compiler toolchain and a few other tools for assembling the kernel and recovery the way my particular device needs it), but I'm not going to download some random binary from GitHub.

    I'm running Ubuntu 14.04, and the gcc-arm-none-eabi compiler worked fine for building for my Android. I didn't have to download any mystery meat binaries. I rewarded myself by sticking my name into the kernel version, so it says "3.0.4-AnonymousCoward" instead of "3.0.4-SomeAssholeFromXDA"

    RE devices: I've only ever purchased devices from vendors who will let you unlock your bootloader. If you have a device that the vendor doesn't want you to have control over, your only option is to wait for an exploit that can get root (something like Towel Root). I will never trust something like that since the source isn't published, but I would never purchase a device that I can't control completely.

    Hope this is helpful

  • The relevant question is: could you trust the devices firmware in the first place? The las tfew year put a solid upper bound to my trust in this respect?

  • by ponos ( 122721 ) on Sunday January 18, 2015 @01:02PM (#48845063)

    I had the same thoughts when I tried installing CM on an old Android device. In the end, the platform was never meant to be secure or really open to user scrutiny. I suppose with a considerable amount of effort you could achieve some sense of security by inspecting all major components, but if you are inclined to invest a considerable amount of effort, then you probably want much better security and are looking at the wrong place. Phones/tablets are fundamentally insecure, and this is probably by design.

  • Using CynogenMod version (android 4.4.4) on HP touchpad ... Haven't noticed anything very different than on Linux Mint on Asus laptop
  • spying on me" Well, you've completed Step 1: Buy some Google ecosystem. Step 2: ???? Step 3: Profit!
  • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Sunday January 18, 2015 @01:07PM (#48845099) Homepage Journal

    Especially if you get them from XDA-Developers, where people have reputations.

    Let someone else test the tools for you.

    At least some of the tools actually let you patch the hole they got in through, this is true of the exploit for Asus Cube.

  • Paranoid? (Score:5, Informative)

    by WoodburyMan ( 1288090 ) on Sunday January 18, 2015 @01:07PM (#48845103)
    Here's an idea. If you are uncomfortable with Google and such, eyeing them as a big brother of some sorts and do not want any Google Play Services or anything Google touching the device... you should return that tablet. Buy a Nexus 9, or a used Nexus 10 or Nexus 7 (2013). This may look counter intuitive, however Nexus devices have pretty much some of the strongest following and modding community behind them and since Google releases the full source for these devices, they are the first to get AOSP variant roms such as CyanogenMod, SlimROM, and Paranoid Android. Once you get them, you can easily follow guides on XDA Developers ( http://www.xda-developers.com/ [xda-developers.com] ) to Unlock the bootloader (Via Google released ADB/Fastboot tools), install a custom recovery (I recommend TWRP which is open source as well so you know what you're getting). Then, depending on your level of paranoid, you can sync the AOSP tree from Google itself and build the entire ROM from scratch yourself, or build or download a flashable zip file of any custom ROM such as CyanogenMod, SlimROM, Paranoid Android etc, and then load it onto the device. AOSP based roms such as these DO NOT have Google's Proprietary API's and Google Play Services. Straight Android. Plus, will full open source, you know what's in it. You will still have to deal with the proprietary blobs left in for display, modem, wifi, etc, however it's as close to full control as you can get for Android with a 100% fully functional Android device.
    • Re:Paranoid? (Score:5, Informative)

      by swillden ( 191260 ) <shawn-ds@willden.org> on Sunday January 18, 2015 @09:54PM (#48847521) Journal

      (Android security engineer here)

      Mod parent up.

      This is the only way to be sure of what you're getting. The various rootkits (almost?) all include some closed-source binary which gets uploaded and run as root. Rather than using some hack to exploit some defect in your device's security and upload some random binary which does unknown things to your device, buy a device with a legitimately-unlockable bootloader. All Nexus devices meet this requirement. There are some Motorola devices that do, too, and there may be a few others from other manufacturers. Then unlock your device, install your new ROM (ideally, build it from source, but that's optional) and re-lock your device.

      That will give you the control you want without exposing yourself to unnecessary risks.

      I'm not saying this approach doesn't expose your data to risks, it does. The various third-party ROMs intentionally subvert various aspects of the Android security model. To really understand the risks, you need to understand Android security (I recommend "Android Security Internals" by Nikolay Elenkov), understand how your chosen ROM alters it, and understand how that will impact your usage. But it does put you in control, rather than the author of some random rootkit.

      Oh, and note that it is important to re-lock your device. If you don't, anyone who gets your device can install their own custom ROM and get access to all of your data. Locking the bootloader ensures that the data partition gets erased before a new system is installed.

      (Disclaimer: I work for Google, but this is not an official statement of any sort. It's purely my own opinion.)

      • Re:Paranoid? (Score:4, Informative)

        by kenshin33 ( 1694322 ) on Sunday January 18, 2015 @11:54PM (#48847969)
        ^^^what he said. On some nexus devices (recent ones) you can unlock later without wiping (BootUnlocker app for example, it's available in the play store and opensource ). You might consider building everything your self and SIGN your builds with your own keys (something other than the test key, as the private keys for those are available to anyone) and make sure any recovery you'd use enforces "signature verification" (and that it can not be disabled)
  • Basically, all you need is adb and fastboot, both available in the Andorid SDK, which runs on Linux, and the the rooting zip files or images that you upload to the phone/tablet.

    Easiest way to root the tablet is to install a rooted image.

  • When you root, you almost always neuter Android security model. So goodbye to any security.
    You can always do the flashing properly, with signing and stuff, but the procedure is major PITA: http://mjg59.dreamwidth.org/31... [dreamwidth.org]

    • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Sunday January 18, 2015 @01:56PM (#48845379) Homepage Journal

      From your fine link:

      This is unfortunate. Even if you've encrypted your phone, anyone with physical access can simply reboot into recovery and reflash /system with something that'll stash your encryption key and mail your data to the NSA. Surely there's a better way of doing this?

      Anyone with physical access to your phone can, in theory, do anything they want to your phone. Including unlocking the bootloader, and then doing all that other stuff. What a fat waste of time that was.

  • What are *your* experiences.

  • Would mainly be Pris.

    But I'd also be pretty keen on rooting Zhora and/or Rachael as well.

  • Can you trust the factory installed software?
    Can you trust the modded ROM you want to install?
    Why should it be different with the rooting tool, the modded recovery or any other thing?
    Which ever pill you'll take, you won't ever know!
    Welcome in the real world!
  • No.

    And you cannot trust the ROM. And you cannot trust google. And you cannot trust debian.

    Go, realize that you're always trusting someone, as long as you're not flipping bits to code your own OS. And then you're trusting the hardware.

  • I rooted my Nexus 4 and my Kindle Fire HDX using Towelroot (on the Nexus 4 it is extremely easy to apply - just allow non-store apps and install tr.apk; on the Kindle, I had to install HDXposed, the Xposed framework and Google Apps [se7ensins.com] before I could do that). IIRC it worked fine on Android 4.4 (despite scary warnings issued by Google, which can be safely ignored). But it doesn't work on Android 5. Last time I looked into it (a couple of months ago), there was not an easy way to root Lollipop - you had to back
  • I had an Android phone which I eventually was able to root/mod; here's some advice, for what it's worth:
    - Get a device which has a supported root/mod path via XDA. Some devices are more rootable than others.
    - Be careful about updates; most root tools only work for specific versions, and patches regularly break rooting methods/scripts.
    - If you want to preserve root, you'll want to run a cusom ROM, so find a device which has a supported mainstream ROM for it.
    - Unless you are an expert, it will take a while. P

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...