How Google Alters Search Queries to Get at Your Wallet - eviltoast
  • floofloof@lemmy.caOP
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    The rooting process itself often involves running an exploit and trusting whoever wrote the rooting tool not to use that exploit to do anything undisclosed. If you wanted to install an undetectable rootkit, slipping something into such a tool wouldn’t be a bad way to do it.

    • lemmyvore@feddit.nl
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      The rooting process itself often involves running an exploit

      It most certainly does not. Exploits were used a decade ago, nowadays you unlock the bootloader using a manufacturer-provided key. And regardless of the key you need physical access to the device and rebooting into a special runtime.