by anonypla on 12/25/20, 12:05 PM with 1 comments
by hilbert42 on 12/25/20, 2:04 PM
I'd particularly recommend the paper to Android users who've root their phones or those who develop tools for rooted phones. Whilst you're unlikely to gain any additional insight into the specifics of rooting any phone from the paper, you will get a good overview of how unlocked bootloaders/rooted phones fit into the grand schema of Android security (i.e.: how Google, phone and app manufactures deal with security including matters relating to the SafetyNet issue, electronic fuse trips, etc.). Essentially, discussion isn't at a nuts-and-bolts level but rather how these techniques are viewed from a security/policy level.