this post was submitted on 02 Oct 2023
220 points (97.0% liked)

Technology

34828 readers
20 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 13 points 1 year ago (2 children)

Rooting can harm the security of your device, significantly.

Why is that? On a rooted device you still benefit from Google scanning installed apk, and root access is protected by an explicit accept dialog.

It's the exact same setup as UAC on Windows or the admin prompts on Linux and Mac.

[–] [email protected] 5 points 1 year ago (1 children)

The rooting process itself often involves running an exploit and trusting whoever wrote the rooting tool not to use that exploit to do anything undisclosed. If you wanted to install an undetectable rootkit, slipping something into such a tool wouldn't be a bad way to do it.

[–] [email protected] 1 points 1 year ago

The rooting process itself often involves running an exploit

It most certainly does not. Exploits were used a decade ago, nowadays you unlock the bootloader using a manufacturer-provided key. And regardless of the key you need physical access to the device and rebooting into a special runtime.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

You just answered your own question. How many users click approve without thinking? How many install Xposed modules that intentionally, or unintentionally, create security issues?

I didn't say rooting will break your security, just that it can. Rooting exponentially increasing the attack surface, which for some users isn't a concern, but for your average user, it probably should be.

In this case, this person wanted to increase his privacy, which is why I recommended what I did.

Also, FWIW, there's a reason why GrapheneOS and DivestOS specifically design their ROMS to NOT be rooted and to RELOCK the bootloader.

[–] [email protected] -1 points 1 year ago* (last edited 1 year ago)

Saying "rooting can harm the security of your device significantly" is like saying "crossing the street exposes you to mortal danger". It's technically true but fails to take into consideration a huge amount of factors, to the point it loses all meaning. Either qualify your statements or refrain from making such generic ones.

You just answered your own question. How many users click approve without thinking? How many install Xposed modules that intentionally, or unintentionally, create security issues?

You do realize that most of the Internet runs on servers where people have admin access? And there's no shortage of attacks against machines on the Internt. If they can manage to function under these conditions I think my phone will also be fine.