Apple Inc. v. Amazon.Com, Inc.
Filing
20
Declaration of John Wright in Support of 18 MOTION for Preliminary Injunction NOTICE OF MOTION AND MOTION FOR PRELIMINARY INJUNCTION filed byApple Inc.. (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Exhibit C)(Related document(s) 18 ) (Eberhart, David) (Filed on 4/13/2011)
EXHIBIT B
TO DECLARATION
OF JOHN WRIGHT
Rooting - is it for me? Some Q&A | Android Central
Page 1 of 28
• Featured:
• HTC Sensation
• Windows Phone Forums
•
•
•
•
•
•
Android
BlackBerry
iPhone / iPad
HP Palm webOS
Windows Phone
Nokia
Join our Community
Login
Search Android Central
•
•
•
•
•
•
•
•
•
•
•
•
Search
Articles
Reviews •
Forums
•
Devices
Apps
•
Tips & Tricks
Rooting
•
Podcast
Tip Us
•
Contact
About
•
RSS
Rooting - is it for me? Some Q&A
Posted on Saturday, Jun 5, 2010 by Jerry Hildenbrand
http://www.androidcentral.com/rooting-it-me-some-qa
Like
157
4/12/2011
Rooting - is it for me? Some Q&A | Android Central
Page 2 of 28
Ed. Note: The story originally was published on Feb. 14, 2010. We've updated it with new information
and present it again for those of you new to Android.
Each day more and more Android handsets are being sold, and that means users are faced with a
major decision: To root, or not to root. Some of us will do it simply because we can, others will
decide not to do it as they enjoy the phone as-is, but the majority of us will be on the fence about the
whole idea of rooting.
Hopefully some of those questions can get answered and you’ll have a clearer picture of the process
and some understanding to make the decision a bit easier. I’m sure this won’t answer every question
you’ll have when considering whether or not to root your device, but hopefully this is a good start and
a basis for further discussion.
What, exactly, is rooting?
Rooting your Android device involves adding in a small Linux application called “su”. It stands for
SuperUser, and allows applications and commands to run with elevated permissions. Everything that
runs code, whether it’s an application or the user, has a permission level set by the operating system.
Why Linux? Well the heart of the Android operating system is the Linux kernel. You'll hear a lot of
nerdy geek-speak about the Linux kernel, but all you really need to know is that it's what is
interfacing Android to your hardware, and ultimately has complete control. When you stray outside
the "normal" way of using Android and start entering commands directly, the kernel is who you're
talking to.
The root user is the boss and can do anything (good or bad) on the device. From simple things like
clearing the cache from core applications, to more advanced things like wirelessly tethering a laptop
or iPod touch through your phone, root can do it. The su program is a sort of gateway that lets
applications or users act as root while doing tasks. If you’re the curious type (I know some of you
are ;) ) here’s a more in-depth review of root as used in a Linux system by the Linux Information
Project .
OK, so why would I want to root my phone?
Good question! Maybe you don’t. Everything in a Linux system is a file, or is treated as a file. Since
Android runs on top of Linux, it acts the same way. Most of the files you will need to access or
change are available to you without having elevated permissions. "Most" being the key term here.
http://www.androidcentral.com/rooting-it-me-some-qa
4/12/2011
Rooting - is it for me? Some Q&A | Android Central
Page 3 of 28
When you want to do things that affect or change the core software of your device -- like updating the
version of Android on your phone, or adding a nice piece of software from another device -- you'll
have to do it as root. Dream and Magic users have been running Eclair on their phones for a good
while now, and it’s because they have rooted their device. Rooting also gives you access to some
handy software that you couldn’t use otherwise. Things like a complete system backup or ad
blocking software require you to root your device. Don’t root your phone just for the sake of rooting
your phone, but if you come across something you feel you could use or would like to have, then
consider it. You'll find that the open source community is usually pretty helpful and encouraging new
people to do new things is common. And when you get to the point where you can lend a hand to the
new folks, pay it forward.
So it's like jailbreaking?
Pretty darn close. Jailbreaking an iPhone or iPod touch opens up things like using applications that
aren’t manufacturer-approved or changing the look and feel of the device. Android already allows
this to a large extent. The changes behind the scenes are the same way. A lot of what you can do
with a jail broken iPhone you can already do with your Android phone, but to really unlock
everything you’ll need to root it. The concept itself is identical. You’re allowing things that usually
wouldn’t have root permission to have them.
Is it dangerous? Will it break my phone? Will it void my
warranty?
It can be, It might, and Yes. By not allowing access to the superuser account, the manufacturer and
your carrier have basically protected you from doing things that change the system and make it
unusable. All it takes is one wrong keystroke to turn your shiny new Android phone into a plastic and
metal brick with no connection. Most times this is recoverable, but not always. You have to decide
how capable you feel you are, and how well written the instructions you’ve found seem to be.
Nobody will blame you if you decide against the risk, especially your cell carrier. All major carriers
and manufacturers plainly state that altering or using unapproved software voids your warranty, and
http://www.androidcentral.com/rooting-it-me-some-qa
4/12/2011
Rooting - is it for me? Some Q&A | Android Central
Page 4 of 28
rooting falls into that category. While that seems a bit harsh, they need to be able to support the
products they sell. For that to happen, they need to know exactly what’s running and what it’s doing.
Apps that run as root need a little further consideration. You need to have a level of trust in the
person who wrote the app first and foremost. Does the developer have other software available? Do
the user comments (for Market apps) have anything that raises a red flag? Do the requested
permissions seem a little odd? These are all questions you need to think about before you allow
something to run as root. For a further level of security, think about installing an application that
warns you anytime something tries to run as root. SuperUser Whitelist (Android Market link) is a
great little app that does exactly that. If you decide to go on and root, ask users with the same device
as you for a link to a version of SuperUser Whitelist that works with your firmware. Once installed,
anytime something wants to run as root, the app intercepts and asks if you would like to allow it.
You’re given the choice to accept, decline, or grant the app in question full privileges each time it
runs.
One last thing to touch on here. Many custom ROMs include some sort of SSH server. This can be a
wonderful tool, or it can get you in hot water. This is what caused the whole “Rick-Roll” episode
with the latest iPhone jailbreak. The server sits and waits for an outside connection, and if that
connection provides the right password full control of the device is turned over. In the case of the
iPhone, users never bothered to change the default SSH password for root. A clever (or devious)
group of users simply scanned for servers listening on the correct port, then attempted to sign in as
root with the default password. Lesson learned, but this is easy to prevent. Ask other users of the
ROM or firmware you’re thinking of flashing if there is a server listening, and if so how to disable it
or change the default password.
If I root, will I still receive operating system updates from my
carrier?
Maybe. More than likely if you’ve just rooted your phone so you could have access to the full file
system and haven’t drastically changed things, the phone will still pass your carrier's checks and
upgrade. If you’ve delved deeper and really customized your device, count on not being able to
upgrade. Carrier updates were designed to work with the original software, so they need to be sure
http://www.androidcentral.com/rooting-it-me-some-qa
4/12/2011
Rooting - is it for me? Some Q&A | Android Central
Page 5 of 28
that’s what the phone is running. Again, this is for your own good. T-Mobile or Verizon can’t offer
technical support for things they haven’t trained their technicians on, and if you flash a carrier
approved update over custom software it’s probably not going to work.
The good news is that failing the checks the carrier does during an update won’t cause any damage to
your phone. The update will just quit and you’ll be back where you started. Then you can decide if
you would like to un-root and upgrade or take another path. The worst case scenario is that the phone
passes the carriers checks, updates, and then things get broken. That’s pretty unlikely, but possible.
If that would happen, you won’t be alone. Everyone in your situation will scramble to their favorite
Android user forum and hopefully a work around can be found.
Note - a carrier update may also break the ability to root the device and a new method will need to be
found. Any discussion of upgrading and root needs this mentioned as well. Most folks who root and
decide to install a custom ROM wait for the ROM developer to provide an update that includes any
bug fixes or new capabilities of the carrier update.
Will I still get application updates?
Yes. While it’s not being used, the program that allows permissions to be upgraded just sits and does
nothing. Normal applications won’t even be aware it’s there, and applications that use it expect it to
be there. Application updates, whether they are from the Market or other third parties will still install
as normal.
http://www.androidcentral.com/rooting-it-me-some-qa
4/12/2011
Rooting - is it for me? Some Q&A | Android Central
Page 6 of 28
If I decided to 'un-root' my phone, how do I do that?
It depends on the model of your phone. Some are ridiculously easy to revert, some not so much. This
is the most important question you can ask before you dive in and root your phone. Usually the
website you found the method to root your phone will also have a discussion about un-rooting and
going back to stock firmware. Take the time to find and read this information so you’re aware of just
how difficult it’s going to be to go back. Pay close attention and create backups when recommended
while you’re rooting your phone, as these may be needed to go back. I’ve not heard of any device
that can’t be restored to factory firmware provided the original was backed up properly as
recommended during the rooting process. The most important thing to always remember is to ask for
help. If you do find yourself stuck without a backup or a working phone and need to roll back, ask for
advice. Our forums are full of fine folks from all walks of life, and the majority are more than happy
to help. There’s a good chance you’re not the first person in that situation and a solution has already
been worked up!
As you can see it is something that needs a little thought before you dive right in. But if you decide
you need root access, consider some of the information we’ve laid out here. The security and other
risks are real, but are pretty easy to work with. There’s no reason you can’t safely root and use your
phone, just do your homework first!
157
Email this Story
reddit
42
247
Share
http://www.androidcentral.com/rooting-it-me-some-qa
4/12/2011
Android Security: Six Tips to Protect Your Google Phone
Page 1 of 4
Android Security: Six Tips to Protect Your Google
Phone
Al Sacco
March 8, 2011 (CIO)
Google's Android Market mobile software shop was hit last week with its first major malware
attack; a popular application called "DroidDream" proved to be infected with malicious code
that could steal users' personal information, and Google was forced to use a built-in Android
"kill-switch" to do away with the problematic app--but not until after it had already infiltrated
thousands of Android smartphones.
The Google Android platform has never been more popular; in fact, Android now holds a
commanding 31% of the U.S. smartphone market share, making it the most popular
smartphone OS in the country, according to ComScore.
Slideshow: 8 Essential Android Security Apps
Android has also never before represented such a significant target for hackers and other
baddies looking to profit off of the platform's popularity. In other words, now is the time to get
smart about Google Android security. The following six tips and tricks will help do just that.
1) Protect Your Android with a Password--Now!
The single most effective security measure you can take to protect your Android device is to
lock it with a password. It sounds simple, but a strong password--or even a weak one--will
protect you and your smartphone from the vast majority of threats; if a malicious party can't
get past your password screen, your data and everything else on-device is generally secure.
Depending on the model of your Android smartphone, you'll have a variety of password
options, but they're all accessed in mainly the same way. Open up your Android Settings
menu and scroll down to the section called Location & Security Settings or something similar.
First, enable Screen Unlock Security and you'll then be presented with a number of password
options, depending on your device.
For example, my Motorola Atrix 4G provides password options for a Pattern Lock, for which
you can set a specific "swipe pattern" to unlock your device; a PIN Lock that uses numbers to
secure your handheld; a Password Lock, for which you can employ both letters and numbers;
and finally, a biometric-based Fingerprints Lock that employs the Atrix's fingerprint reader for
authentication.
Though the Fingerprint Lock is the most secure option...I'm a bit wary of storing my biometric
information on Google's servers, so I opt for the Password Lock. In order of "secureness," the
Fingerprint Lock is most secure, followed by the Password Lock, PIN Lock and finally, the
Pattern Lock. But using any one of these Android password security options is better than not
using one at all.
http://www.computerworld.com/s/article/print/9213800/Android_Security_Six_Tips_to_Pr... 4/12/2011
Android Security: Six Tips to Protect Your Google Phone
Page 2 of 4
(Note: If you choose to employ the Pattern Lock option, it's a good idea to frequently wipe
your touch screen clean, since repeated entry of your pattern lock can leave a "trail" that can
be spotted by hackers and used to gain access to your device.)
After you set your Android password, you should set your Screen Timeout options to a
relatively low option, so your device display shuts off and locks itself shortly after you last
touch it. To do so, open up the Android Settings menu, scroll down and select Display. On
the following screen, locate the Screen Timeout option and pick a value--I suggest one
minute or less for maximum security.
2) Customize Locked Home Screen with Owner Info
Imagine you accidentally leave your smartphone at a bar. A good Samaritan locates the
device and wants to get it back to its rightful owner...but it's locked and the home screen
shows only a beautiful, albeit useless, ocean vista.
This scenario plays out all the time, and if more smartphone owners only added owner
information to their devices' home screens, many more lost devices would likely be returned.
Unfortunately, Android doesn't have any built-in option that lets you post owner information
on your device's locked home screen, like other mobile platforms, including Research In
Motion's (RIM) BlackBerry OS. But a couple of third-party applications will do the trick.
My favorite option for adding owner information to your Android home screen: the Phone
Found - Owner Info app, which is available for free via the Android Market. To customize the
Owner Info app, simply launch the software, hit the Edit menu options and enter in your
contact information. You can then open up the app's Settings and choose which information
you want to display on your device's locked home screen.
3) Do NOT Root Your Android Device
To "root" your Google Android device means to remove a number of manufacturer- and
wireless-carrier-imposed restrictions put on your smartphone to make it easier for said
parties to install and deliver the applications and services they want you to employ, among
other things.
Rooting also opens up system-level access to your device's core resources, which is not a
good thing, at least from a security perspective, since doing so also removes a number of
safeguards installed to help protect your device from malware and other potentially
dangerous code.
Unless you're a developer or someone who is very familiar with Android and you're simply
willing to take your chances, you should NOT root your Android device. Ever. Not rooting
might mean limited access to some cool, custom applications and services, and you won't be
able to download apps from many unofficial third-party app stores. However, avoiding a root
does vastly increase security, because in large part applications can't gain system-level
access without a root.
Bottom line: Don't root your Android device. But if do, beware that in rooting your
smartphone, you're significantly reducing your device's existing security safeguards.
4) Stick to the Official Android Market for Apps
It's a good idea to be very selective about where you download your Android mobile
http://www.computerworld.com/s/article/print/9213800/Android_Security_Six_Tips_to_Pr... 4/12/2011
Android Security: Six Tips to Protect Your Google Phone
Page 3 of 4
applications. In fact, I suggest only downloading applications from Google's Android Market,
even though the whole DroidDream situation proves the official Android Market is not 100%
free of malware and other harmful apps. (Following the DroidDream debacle, Google did,
however, vow to bolster Android Marketplace security.)
Every once and a while, I'll download an Android app from a source other than the Android
Market, but I'm always aware of the potential danger, and I always use some type of antivirus
scanner after the download to help ensure security--more on Android antivirus coming up in
the next section.
As a rule of thumb, it's a wise idea to get your Android software directly from Google's
Android Market.
5) Google Android Antivirus
A good mobile antivirus app scans new Android software downloads for obvious signs of
tomfoolery, such as strange permissions- or download-requests. And a number of free and
commercial, or paid, Android antivirus apps are currently available in the Android Market.
I can't personally vouch for the effectiveness of them all, but in general, running one of the
more popular antivirus apps is better than not running any antivirus at all. The app I've used
most is Lookout Mobile Security. Lookout is available as a free download, with a basic
antivirus scanner, Find-My-Phone features to help locate lost or stolen devices and
backup/restore options. You can also upgrade Lookout for more in-depth security features,
but the free version should provide basic protection for average users.
Another free antivirus option is the aptly named Antivirus Free app.
Even if you choose not to constantly run an Android antivirus application, it's a good idea to
download one and scan your device occasionally for potentially harmful apps.
6) Android Wireless Connectivity and Security
In general, it's a wise idea to disable any and all unused wireless-connection options on your
Android smartphone. In other words, you should turn off your Wi-Fi when you leave home
and won't be in range of another Wi-Fi network for the day. When you're done using that
Bluetooth headset in the car, turn off Bluetooth. Doing so will not only conserve battery life,
it'll reduce the risk of malicious parties detecting, or even connecting to, your device without
your knowledge.
In addition, you should also disable your Wi-Fi auto connect option--if your device has such
an option--to ensure you don't automatically connect to a public Wi-Fi hotspot, through which
a Bad Guy could access your device data. Turn off Wi-Fi auto connect by opening up your
Android Settings menu, then choosing Wireless & Networks and next, Wi-Fi Settings. If your
device has a Wi-Fi auto connect option, you should see it listed here. Uncheck the auto
connect box to turn off this functionality.
On the Wireless & Networks settings page, you'll also see a Bluetooth Settings option. Open
up your Bluetooth Settings and turn Bluetooth on if it's not already. Then click the Device
Name option and change your Android's name to something unique and specific to you. This
will reduce confusion in the future, should you attempt to connect your smartphone to
another device via Bluetooth.
http://www.computerworld.com/s/article/print/9213800/Android_Security_Six_Tips_to_Pr... 4/12/2011
Android Security: Six Tips to Protect Your Google Phone
Page 4 of 4
If your Android device supports mobile hotspot features, you'll want to secure your personal
network. First, again open up your Wireless & Networks settings and then scroll down to and
select Mobile Hotspot. Next, turn on your Wi-Fi hotspot feature and click the Wi-Fi Hotspot
Settings settings menu.
Once the hotspot features are activated, your Wi-Fi Hotspot Settings page should show an
option to Configure Wi-Fi Hotspot. Open up this menu, assign a new, unique name to your
network, choose WPA2 PSK security from the dropdown menu and then assign a password
to your network. Save your changes, and your Wi-Fi hotspot is now secure.
It's a good practice to turn off you Wi-Fi hotspot when not in use, so unauthorized parties
cannot employ your network, eating up you monthly data allotment and/or accessing your
device information.
Al Sacco covers Mobile and Wireless for CIO.com. Follow Al on Twitter @ASacco. Follow
everything from CIO.com on Twitter @CIOonline and on Facebook. Email Al at
asacco@cio.com
http://www.computerworld.com/s/article/print/9213800/Android_Security_Six_Tips_to_Pr... 4/12/2011
Malware in Android Market highlights Google's vulnerability
Page 1 of 2
Malware in Android Market highlights Google's vulnerability
By Peter Bright | Last updated about a month ago
Google has removed 21 applications from the Android Market after it was discovered that the
apps secretly installed malware. The applications themselves included pirated and renamed
versions of legitimate Android software that had been modified to include the malware and
then offered for free on the Market. Together, the 21 programs received more than 50,000
downloads over the course of about four days.
The malicious applications sent personal details, including the phone's unique IMEI number, to
a US-based server. Worse, it exploited security flaws to root the phone, and installed a
backdoor application that allows further software to be installed to the handsets. Though
Google has now purged the applications from the Market, the rooting and backdoor mean that
the anyone who has run one of the malicious programs should reset their phone to stock
conditions to clean it up. The flaw used to root the operating system was fixed in Android
2.2.2 and 2.3, so users of those versions should be able to get away with simply removing the
applications. The programs were all (re)published by an entity named Myournet; it too has
now been removed from the Market.
A full list of the 21 programs can be found at Android Police, who originally reported the
issue, after the republished applications were spotted by redditor lompolo. lompolo
investigated the applications after noticing that one of them did not have the publisher he
expected; he posted his findings to reddit after noticing that one of the applications appeared
to contain exploit code.
Similar malware, dubbed "DreamDroid" has been found in even more applications, with
applications from publishers named Kingmall2010 and we20090202 also removed. In total,
more than 50 programs have been pulled.
This attack is notable in that it combines a wide range of smartphone issues all into one neatly
packaged exploit: we have the lack of governance of the Android Market, the piracy and republication that is distressingly common on mobile platforms, the security flaws that allow
rooting, and Android's inconsistent updating which leaves machines at risk of security flaws.
Google's Android Market is a free-for-all: unlike Apple's App Store and Microsoft's
Marketplace, which both have strict eligibility requirements and mandate that programs are
restricted only to a limited set of APIs, in the Android Market essentially anything goes.
Google can remove applications that are found to be actively harmful, as it has done here, but
this action tends to be reactive, not proactive. The Android Market Developer Agreement
does prohibit this kind of application in section 4.4, but Google obviously took no steps to
ensure that applications abided by this rule prior to publication.
Apple's strictly regulated store is criticised by many for its inconsistent rule enforcement and
the apparently arbitrary decisions made by the those inspecting its applications. This
regulation is by no means flawless—the Handy Light flashlight application contained a
backdoor to allow iPhones to be tethered, showing that it can indeed be tricked—but it should
nonetheless impede similar attacks on that platform. Microsoft's gatekeeping of the Windows
Phone 7 Marketplace should similarly serve to stand in the way of such malicious applications.
Incidents like this serve to vindicate the approach Microsoft and Apple have both taken to
their application stores, and repeat performances could make users increasingly wary of the
Android Market.
Application piracy is again an issue found on Apple's platform as well as Google's. Neither
company earns much praise for their responses to piracy allegations: though both maintain
that they will remove applications that infringe on the intellectual property of others, in
practice their responses are slow and inconsistent. One of the developers whose game had
been ripped off informed Google of this more than a week before the program was eventually
removed—due to its malware—without receiving any response from Google.
http://arstechnica.com/open-source/news/2011/03/malware-in-android-market-highlights-g... 4/12/2011
Malware in Android Market highlights Google's vulnerability
Page 2 of 2
Perhaps it is fortunate that that software was pirated, however, as it was this piracy that led
to lompolo's closer inspection. Had it not piqued his curiosity, it may have lingered on the
Market for weeks or months, quietly infecting users all the while.
The desirability of rooting handsets is also a continued problem. Rooting, to enable custom
software and operating system builds to be installed to a device, is a widespread (albeit
minority) activity among both iPhone and Android users. It creates an unusual alignment of
interests—an exploit that can be used to root a phone is sought by both "good guys" (who just
want to install custom firmware) and "bad guys" (who want to install nefarious malware).
While the root flaw in this case was already patched, that patch is not widely distributed. This
is due to Google's enormous dependence on handset OEMs and mobile networks to package
and distribute firmware updates. Even security-conscious users who would like to upgrade to
a fixed version can find themselves unable to do so for many months—if ever—due to
unavailability of a suitable patch for their particular phone.
Apple, with its vertically integrated approach, has a much more robust response to such
issues, as it can publish updates for all users of supported models, regardless of their
network, simultaneously. If Microsoft can get the unfortunate teething difficulties in the
Windows Phone 7 update process resolved, it too should have a considerable ability to deploy
updates.
Android is now a major smartphone platform, estimated to be outselling the iPhone. For many,
its openness and flexibility is a virtue, but it comes at a cost: it leaves the platform unusually
susceptible to attack. And those attacks will come: just as popularity has made Windows an
attractive target, so too will the black hats be drawn to Android. This will place Google in an
increasingly uncomfortable position; locking down the platform may be appealing to most
users, but it would infuriate and alienate the early adopters and trend-setters who
championed the operating system in its early days. However, leaving it a free-for-all could
make Android the Windows 98 of smartphone systems: virus-ridden and unsafe.
http://arstechnica.com/open-source/news/2011/03/malware-in-android-market-highlights-g... 4/12/2011
Google encourages rooting of phones | Android Atlas - CNET Blogs
Page 1 of 5
CNET.com
CNET Home
Shop Motorola ATRIX 4G from AT&T
• log in
• join CNET
•
•
•
•
•
Home
Reviews
News
Downloads
Video
Search
Go
•
•
•
•
•
Home
Reviews
News
Downloads
Video
Android Atlas
December 21, 2010 2:36 PM PST
Google encourages rooting of phones
by Scott Webster
36
Recommend
10
Google used its Android Developers blog
yesterday to deny a correlation between
rooting a handset and perceived poor security
measures on the operating system.
In the blog, Android engineer Nick Kralevich
pointed to comments on an Engadget post that
http://www.cnet.com/8301-19736_1-20026340-251.html?tag=mncol;3n
4/12/2011
Google encourages rooting of phones | Android Atlas - CNET Blogs
Page 2 of 5
characterized the Nexus S' security as "crap." Samsung Nexus S
Not suprisingly, Kralevich disagreed.
"Legitimately gaining root access to your device is a far cry from most rooting
exploits," he wrote. "Traditional rooting attacks are typically performed by exploiting
an unpatched security hole on the device. Android has a strong security strategy,
backed by a solid implementation."
Though such assumptions spread like wildfire every time a security company or
development team talks about Android's exploits and vulnerabilities, Google argues
that rooting a phone should be the beginning of an experience. "It should be no surprise
that modifying the operating system can give you root access to your phone,"
Kralevich wrote.
Common reasons for rooting a phone include letting users decide which apps should be
loaded or operating the handset on a different carrier's network. Most often, it's simply
done to install custom operating systems such as Cyanogenmod.
Kralevich also discussed two types of rooting. Root access, which gives users root
level access to the device, opens the door to custom boot images and ROMs. Though
hackers and modders are quick to take advantage of access whenever a new phone
enters the market, they don't have to bypass much security to do so.
The second, and scarier, type of rooting is accomplished by exploiting the OS, but
Android's nature makes it a fairly difficult task. As all apps and games are sandboxed
from each other, exploiting one app should not affect the next. Also, all applications
are required to declare the permissions they use.
Though hackers love to find weak spots in mobile Web browsers and sneak onto
phones through the back door, the Android team moves quickly to patch documented
holes and releases fixes as needed. And thanks to the open-source community, anyone
and everyone is welcome to contribute to platform.
If Google does see a problem to rooting, it appears to be the wireless carriers.
According to the blog, until carriers and manufacturers make it easier for users to
unlock devices, "there will be a natural tension between the rooting and security
communities."
http://www.cnet.com/8301-19736_1-20026340-251.html?tag=mncol;3n
4/12/2011
Google encourages rooting of phones | Android Atlas - CNET Blogs
Page 3 of 5
"It's possible to design unlocking techniques that protect the integrity of the mobile
network, the rights of content providers, and the rights of application developers, while
at the same time giving users choice," Kralech wrote. "Users should demand no less."
Unfortunately, there doesn't seem to be much wiggle room in the current system.
Scott Webster
Like
10
Full Profile E-mail Scott Webster
Scott Webster has spent the better part of his adult life playing with cell phones and
gadgets. When not looking for the latest Android news and rumors, he relaxes with
his wife and son. Scott also is the senior editor for AndroidGuys. Scott is a member
of the CNET Blog Network, and is not an employee of CNET. E-mail Scott.
•
•
•
•
•
•
•
•
•
Reviews
All Reviews
Camcorders
Car Tech
Cell Phones
Digital Cameras
GPS
Laptops
TVs
•
•
•
•
•
•
•
•
News
All News
Business Tech
Crave
Cutting Edge
Green Tech
Security
Wireless
•
•
•
•
•
•
•
•
Downloads
Add Your Software
All Downloads
Mac
Mobile
Software Deals
Webware
Windows
http://www.cnet.com/8301-19736_1-20026340-251.html?tag=mncol;3n
4/12/2011
Google encourages rooting of phones | Android Atlas - CNET Blogs
•
•
•
•
•
•
•
Video
All Videos
Apple Byte
Buzz Report
CNET Top 5
Loaded
Prizefight
•
•
•
•
•
•
•
•
•
•
•
•
•
More
About CBS Interactive
About CNET
CNET Deals
CNET Forums
CNET Mobile
CNET Site Map
CNET Widgets
Corrections
Help Center
Newsletters
Permissions
RSS
•
•
•
•
Page 4 of 5
Join us on
Facebook
Twitter
YouTube
POPULAR TOPICS:
•
•
•
•
•
•
•
•
•
•
Apple iPhone,
Apple iPod,
LCD TV,
Apple iPad,
Smartphones,
Windows 7,
CES 2011,
Google Android,
HTC phones,
Android phones
• Top Brands:
• AT&T Products
◦ Cell Phones
• Intel Products
• Samsung
◦ Televisions
http://www.cnet.com/8301-19736_1-20026340-251.html?tag=mncol;3n
4/12/2011
Google encourages rooting of phones | Android Atlas - CNET Blogs
Page 5 of 5
◦ Mobile Phones
◦ Blu-Ray & Home Theater
◦ Notebooks
◦ Monitors & Printers
◦ Cameras & Camcorders
• Acer Products
◦ Notebooks
•
•
•
•
•
•
© 2011 CBS Interactive. All rights reserved.
Privacy Policy
Ad Choice
Terms of Use
Mobile User Agreement
Visit other CBS Interactive sites: Select Site
http://www.cnet.com/8301-19736_1-20026340-251.html?tag=mncol;3n
4/12/2011
The Motorola Droid Gets Rooted - PCWorld
News
Reviews
How-To's
Page 1 of 6
Downloads
Shop & Compare
Apps
Business Center
Magazine
Subscribe & Get a
Bonus CD
Customer Service
Sign in with
or Create a New Account.
PCWorld» Blogs» Today @ PCWorld
Facebook
17
Twitter
53
Share
73
5 Comments +43Recommends Email Print
TODAY @ PCWORLD
The Motorola Droid Gets Rooted
By Ian Paul, PCWorld
Dec 9, 2009 5:36 AM
Add the Motorola Droid to the expanding list of hacked devices that give more adventurous users greater
control over how they can use their smartphones. Late Tuesday Wired's Gadget Lab reported that
instructions had been posted to an Android forum that supposedly show you how to gain administrator
access to your Droid device.
A hacked Droid would allow you to modify the operating system any way you want, and add functions to
the device that may have been previously restricted. The problem is that, for the moment anyway, an
online community providing customized Droid hacks doesn't exist yet. But that is likely to change in the
not-too-distant future.
Warning: Hacks can be hazardous to your Droid's health
http://www.pcworld.com/article/184077/the_motorola_droid_gets_rooted.html
4/12/2011
The Motorola Droid Gets Rooted - PCWorld
Page 2 of 6
Before you read on, keep in mind that rooting your Droid could brick your handset making it essentially
useless. Also, tinkering with the inner workings of the software will almost certainly void the device's
manufacturer warranty. So think carefully before you decide to try hacking your device.
Android phones are rooted, not jailbroken
In Android lingo a hacked phone is said to be rooted as opposed to being unlocked or jailbroken. With a
rooted Android phone you can change the handset's visual theme, customize the operating system and
add multi-touch gestures. You could also use applications or functions that may be forbidden or
restricted by your carrier such as tethering.
How it's done, and why you should hold off
The instructions found on AllDroid for hacking your device look pretty straightforward: download a .zip
file, rename it, and stash it on your handset's SD card. After that you restart your phone while holding
down several keys, and then install the exploit using an onscreen menu. I have not verified this exploit
myself, so I can't vouch for it.
According to the post, after the Droid has been hacked you can gain root access to the phone. But as I
mentioned earlier, unless you already know how to modify to the Android OS, rooting your Droid won't do
much for you at the moment. That's because software designed to take advantage of hacked Droids
doesn't exist yet.
Hacking communities already exist for many Android HTC phones, and other devices running the
Android 1.6 operating system (Droid runs Android 2.0). So in all likelihood you won't have to wait that
long for Droid-related modifications.
But while you're waiting, you can check out what's already available for some rooted Android devices at
the Android Spin database, the Cyanogen mod, and this dedicated Android hacking and modding site.
Just remember: any tinkering you do with your Android device is at your own risk. So ask yourself if the
benefits are really worth it, before trying to modify your handset.
Connect with Ian on Twitter (@ianpaul).
See more like this:android,hackers,motorola
Would you recommend this story? YES 43 NO 7
Sponsored Links
Free Remote PC Access
Remote Access From Any Web Browser. Fast, Easy & Secure - 30 Days Free
www.GoToMyPC.com
Virus and Trojan Remover
Download Free Trojan & Virus Scan. Recommend & Used by the Experts.
www.pctools.com
Computer Repair
FREE Estimates. PC & Mac Repair.Serving LA & Orange County.Let Us Help
ThinkComputersOnline.com
SHOCKING:$9 Car Insurance
Auto Insurers are SCARED you will learn this secret.
http://www.pcworld.com/article/184077/the_motorola_droid_gets_rooted.html
4/12/2011
The Motorola Droid Gets Rooted - PCWorld
Page 3 of 6
www.LifestyleJournal.com
Comments
Leave a comment
Submit Comment
Once you click submit you will be asked to sign in or register
an account if you are not already a member.
04mePCee says:
Wed Dec 09 06:19:36 PST 2009
PCWorld said
Post your comments for http://www.pcworld.com/article/id,184077/article.html here
I am always in awe of hackers for iPhone and now the Droid; the obsession to download software
that runs the risk of turning your smart phone into a brick.
Is there a restore option for Droid ?
REPLY
Jodokai says:
Wed Dec 09 07:58:55 PST 2009
04mePCee said
PCWorld said
Post your comments for http://www.pcworld.com/article/id,184077/article.html here
I am always in awe of hackers for iPhone and now the Droid; the obsession to download
software that runs the risk of turning your smart phone into a brick.
Is there a restore option for Droid ?
I'm not sure if there is a restore, but if you have root, I'm pretty sure you could do a back up of your
OS.
As far as the "in awe" you have to weigh the benefits to the risk. Out of all the Jailbroken iPhones out
there, how many have actually been unrecoverably bricked? I'd bet very few. If you search T-
http://www.pcworld.com/article/184077/the_motorola_droid_gets_rooted.html
4/12/2011
The Motorola Droid Gets Rooted - PCWorld
Page 4 of 6
mobile's forums you'll see their stance on Rooting is that it doesn't automatically void your warranty,
they just won't fix it if rooting it caused the problem.
Look at tethering, some companies charge $60 a month for this service. If you get away with it for 8
months you've just paid for your $500 phone.
The Android OS has the limitation that it will only use installed memory to store programs. I think the
most out right now is 256mb. A lot of games a lot of memory space, so this is a huge limitation that
can be overcome with rooting.
I'm not saying everyone should run right out and root it, but I do understand why people do it. It's all
about risk vs. reward.
REPLY
Nuke61 says:
Wed Dec 09 10:48:32 PST 2009
You can tether the Droid right now, without having to gain root. There could be other reason's why
you want to get root access, but tethering shouldn't be among those reasons. I've tethered at roughly
1/2 of my cable modem speed using a USB cable connection to my laptop. When I used Bluetooth it
was roughly 1/2 the speed of the USB connection.
REPLY
boden says:
Wed Dec 09 13:56:09 PST 2009
I wonder about the ethics of articles like this. The people who understand root access already know
this can be done and how to do it right. The newbies will get just enough information to wreck their
device. OR implant a lovely Trojan on their system.
Then we have to listen to them complain...
Boo Hoo I put software from some guy in Russia on my phone and now my phone company says i
owe them X thousands of $ because X number of phones are now using my data.. boo hoo.
REPLY
Jodokai says:
Wed Dec 09 17:25:02 PST 2009
boden said
I wonder about the ethics of articles like this. The people who understand root access already
know this can be done and how to do it right. The newbies will get just enough information to
wreck their device. OR implant a lovely Trojan on their system.
Then we have to listen to them complain...
http://www.pcworld.com/article/184077/the_motorola_droid_gets_rooted.html
4/12/2011
The Motorola Droid Gets Rooted - PCWorld
Page 5 of 6
Boo Hoo I put software from some guy in Russia on my phone and now my phone company
says i owe them X thousands of $ because X number of phones are now using my data.. boo
hoo.
Root has nothing to do with your chances of getting a virus. You can load a virus now without rooting
your phone, that's the downside to Open source and not having strict control like Apple does. In my
opinion the upsides FAR outweigh the down, but that doesn't mean the down isn't there.
As I said in my first post, there are many more reasons than just tethering. A non-rooted Droid has
256mb to use for stored applications, a rooted Droid gets essentially unlimited storage for apps
(limited only by the size of your microSD cards).
Add to that, T-Mobile at least, has said that rooting isn't an automatic deal breaker with the warranty
(I can't find official word from Verizon or Sprint) and why not root it?
REPLY
Editors' Picks
HTC Sensation 4G Hands
-On: Beautiful, Dual-Core
Beast
How to Tell if Your
Android Phone Is Getting
the Gingerbread OS
Update
Many Unlimited Tech
Services Appear to Have
Limits
http://www.pcworld.com/article/184077/the_motorola_droid_gets_rooted.html
CyanogenMod 7 Goes
Final, Now Does
Gingerbread
4/12/2011
The Motorola Droid Gets Rooted - PCWorld
Page 6 of 6
Home
Products
Android App Reviews
Desktop PCs
Laptops
Storage
iPhone App Reviews
E-Readers
Macs & iPods
Tablets
Business Center
Gadgets
Monitors
Tech Industry
Cameras
Gaming
Printers
Tech Events
Camcorders
HDTV
Software
Upgrading
Cell Phones & PDAs
Home Theater
Spyware & Security
Windows 7
Consumer Advice
Network Sites
About PCWorld
Resources
PCWorld Business Center
About Us
Newsletters
Search for Jobs
Ad Choices
FAQ
Macworld
Advertise
Contact Us
MacUser
PCWorld Content Works
Mac OS X Hints
Terms of Service Agreement
Magazine Customer Service
iPhone Central
Privacy Policy
Community Standards
RSS Feeds
Site Map
Visit other IDG sites:
Select One
© 1998-2011, PCWorld Communications, Inc.
http://www.pcworld.com/article/184077/the_motorola_droid_gets_rooted.html
4/12/2011
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?