Rooting (Android)
{{short description|Modification of Android devices to gain rooted access}}
{{Distinguish|bootloader unlocking|SIM unlocking|iOS jailbreaking|selfref=Derect}}
Rooting is the process by which users of Android devices can attain privileged control (known as root access) over various subsystems of the device, usually smartphones and tablets. Because Android is based on a modified version of the Linux kernel, rooting an Android device gives access to administrative (superuser) permissions similar to those on Linux or any other Unix-like operating system such as FreeBSD or macOS.
Rooting is often performed to overcome limitations that carriers and hardware manufacturers put on some devices. Thus, rooting allows the users to alter or replace system applications and settings, run specialized applications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. On some devices, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system.
Root access is sometimes compared to jailbreaking on devices running the Apple iOS operating system. However, these are different concepts: jailbreaking is the bypass of several types of Apple prohibitions for the end user, including modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved (not available on the App Store) applications via sideloading, and granting the user elevated administration-level privileges (rooting). Some vendors, such as HTC, Sony, OnePlus, Asus, Xiaomi, and Google, have provided the ability to unlock the bootloaders of some devices, thus enabling advanced users to make operating system modifications.{{cite web |url=http://www.htcdev.com/bootloader |title=HTC Bootloader Unlock Instructions |website=htcdev.com |access-date=26 October 2014 |archive-date=27 October 2014 |archive-url=https://web.archive.org/web/20141027141227/http://www.htcdev.com/bootloader/ |url-status=live }}{{cite web |url=http://unlockbootloader.sonymobile.com#Sony |title=Official Bootloader Unlock instructions |website=sonymobile.com |access-date=2021-08-26 |archive-date=2014-07-07 |archive-url=https://web.archive.org/web/20140707020506/http://unlockbootloader.sonymobile.com/#Sony |url-status=live }}{{Cite web|title=How to unlock bootloader on OnePlus smartphones|url=https://www.oneplus.com/support/answer/detail/op588|language=en|access-date=2012-05-12|archive-date=2022-03-10|archive-url=https://web.archive.org/web/20220310225047/https://www.oneplus.com/support/answer/detail/op588|url-status=live}}{{cite web |url=http://source.android.com/source/building-devices.html |title=#unlocking-the-bootloader Google instructions on bootloader unlocking |website=source.android.co.m |access-date=26 October 2014 |archive-date=21 May 2011 |archive-url=https://web.archive.org/web/20110521220428/http://source.android.com/source/building-devices.html |url-status=live }} Similarly, the ability to sideload applications is typically permissible on Android devices without root permissions. Thus, it is primarily the third aspect of iOS jailbreaking (giving users administrative privileges) that most directly correlates with Android rooting.
Rooting is distinct from SIM unlocking and bootloader unlocking. The former allows for the removal of the SIM card lock on a phone, while the latter allows rewriting the phone's boot partition (for example, to install or replace the operating system).{{Cite web|title=Difference between Rooting, SIM Unlocking & Bootloader Unlocking|url=https://www.c-sharpcorner.com/blogs/difference-between-rooting-sim-unlocking-bootloader-unlocking1|access-date=2020-10-01|website=www.c-sharpcorner.com|language=en|archive-date=2021-02-05|archive-url=https://web.archive.org/web/20210205052558/https://www.c-sharpcorner.com/blogs/difference-between-rooting-sim-unlocking-bootloader-unlocking1|url-status=live}}
Overview
Rooting lets all user-installed applications run privileged commands typically unavailable to the devices in the stock configuration. Rooting is required for more advanced and potentially dangerous operations including modifying or deleting system files, removing pre-installed applications, and low-level access to the hardware itself (rebooting, controlling status lights, or recalibrating touch inputs.) A typical rooting installation also installs the Superuser application, which supervises applications that are granted root or superuser rights by requesting approval from the user before granting said permissions. A secondary operation, unlocking the device's bootloader verification, is required to remove or replace the installed operating system.
In contrast to iOS jailbreaking, rooting is not needed to run applications distributed outside of the Google Play Store, sometimes called sideloading. The Android OS supports this feature natively in two ways: through the "Unknown sources" option in the Settings menu and through the Android Debug Bridge. However, some US carriers, including AT&T, have prevented the installation of applications not on the Play Store in firmware,{{cite web |url=http://www.wireless.att.com/cell-phone-service/cell-phone-sales/promotion/androidComingSoon.jsp?status=success&_requestid=281920 |title=The Official AT&T FAQs |publisher=Wireless.att.com |access-date=December 18, 2011 |archive-date=October 1, 2011 |archive-url=https://web.archive.org/web/20111001090745/http://www.wireless.att.com/cell-phone-service/cell-phone-sales/promotion/androidComingSoon.jsp?status=success&_requestid=281920 |url-status=live }} although several devices are not subject to this rule, including the Samsung Infuse 4G;{{cite web |url=http://www.mobileburn.com/news.jsp?Id=14654 |publisher=MobileBurn |title=Samsung INFUSE 4G capable of side-loading apps, accessing Amazon Appstore |date=May 7, 2011 |access-date=December 18, 2011 |url-status=dead |archive-url=https://web.archive.org/web/20130518022713/http://www.mobileburn.com/news.jsp?Id=14654 |archive-date=May 18, 2013 }} AT&T lifted the restriction on most devices by the middle of 2011.{{cite web |author=Mike Luttrell |url=http://www.tgdaily.com/mobility-brief/56057-att-customers-can-finally-use-amazons-appstore |title=AT&T customers can finally use Amazon's Appstore |publisher=TG Daily |date=May 19, 2011 |access-date=July 27, 2012 |archive-date=October 29, 2012 |archive-url=https://web.archive.org/web/20121029232954/http://www.tgdaily.com/mobility-brief/56057-att-customers-can-finally-use-amazons-appstore |url-status=live }}
{{As of|2011}}, the Amazon Kindle Fire defaults to the Amazon Appstore instead of Google Play, though like most other Android devices, Kindle Fire allows sideloading of applications from unknown sources,{{cite web |author=Austin Krause |url=http://www.groovypost.com/howto/enable-sideloading-kindle-fire-android-tablet/ |title=How to Enable Sideloading on the Kindle Fire |publisher=groovyPost |date=December 8, 2011 |access-date=July 27, 2012 }} and the "easy installer" application on the Amazon Appstore makes this easy. Other vendors of Android devices may look to other sources in the future. Access to alternate apps may require rooting but rooting is not always necessary.
= Advantages =
File:Magisk 26.4 screenshot.png on a Samsung Galaxy phone, an application to manage root access in Android]]
Advantages of rooting include the possibility for complete control over the appearance, feel, and behaviour of the device. As a superuser has access to the device's system files, all aspects of the operating system can be customized with the only real limitation being the level of coding expertise.{{cite web|url=https://rootmygalaxy.net/rooting-android-phone-advantages-disadvantages/|title=What Is Rooting Android Phone? Advantages And Disadvantages|publisher=Root Mygalaxy|access-date=22 November 2014|archive-date=18 June 2016|archive-url=https://web.archive.org/web/20160618013532/http://rootmygalaxy.net/rooting-android-phone-advantages-disadvantages/|url-status=usurped}} Immediately expectable advantages of rooted devices include the following:{{cite web|url=http://reviewlagoon.com/five-reasons-why-everyone-should-root-their-android/|title=Five Reasons Why Everyone Should "Root" Their Android|publisher=Review Lagoon|date=30 August 2012|access-date=6 January 2015|archive-date=6 January 2015|archive-url=https://web.archive.org/web/20150106122337/http://reviewlagoon.com/five-reasons-why-everyone-should-root-their-android/|url-status=dead}}{{cite web|url=http://lifehacker.com/top-10-reasons-to-root-your-android-phone-1079161983|title=Top 10 Reasons to Root Your Android Phone|author=Whitson Gordon|publisher=Gawker Media|work=Lifehacker|date=10 August 2013 |access-date=6 January 2015|archive-date=6 January 2015|archive-url=https://web.archive.org/web/20150106002414/http://lifehacker.com/top-10-reasons-to-root-your-android-phone-1079161983|url-status=live}}
- Support for theming, allowing everything to be visually changed from the color and type of the battery status indicator to the boot animation that appears while the device is booting, the status bar, control menu, virtual on-screen navigation buttons, and more.
- Full control of the kernel, which, for example, allows overclocking and underclocking the CPU and GPU.
- Full application control, including the ability to fully back up, restore, or batch-edit applications, or to remove bloatware that comes pre-installed on some phones.
- Custom automated system-level processes through the use of third-party applications.{{cite web |title=Advantages of Rooting Your Android Device |url=http://spyappsmobile.com/advantages-of-rooting-your-android-device |website=spyappsmobile.com |access-date=3 October 2014 |archive-date=6 October 2014 |archive-url=https://web.archive.org/web/20141006195551/http://spyappsmobile.com/advantages-of-rooting-your-android-device/ |url-status=live }}
- Ability to install software (such as Xposed, Magisk, SuperSU, BusyBox, etc.) that allows additional levels of control on a rooted device or management of root access.
- Access to more Unix shell commands, both standalone and through Android Debug Bridge.
- Ability to bypass restrictions by vendors or Google, such as scoped storage, which compromised file system access and compatibility to established third-party mobile applications such as file managers.{{cite web |title=Scoped Storage in Android Q forces developers to use SAF, which sucks |url=https://www.xda-developers.com/android-q-storage-access-framework-scoped-storage/ |website=xda-developers |access-date=12 June 2021 |date=2019-05-31 |archive-date=2021-04-28 |archive-url=https://web.archive.org/web/20210428205737/https://www.xda-developers.com/android-q-storage-access-framework-scoped-storage/ |url-status=live }}
- Extended task management abilities{{cite web |title=The best task manager apps for Android |url=https://www.androidauthority.com/best-task-manager-apps-for-android-342334/ |website=Android Authority |access-date=13 June 2021 |date=2020-07-11 |archive-date=2021-06-13 |archive-url=https://web.archive.org/web/20210613170042/https://www.androidauthority.com/best-task-manager-apps-for-android-342334/ |url-status=live }}
- Ability to terminate misbehaving and/or unresponsive system tasks such as media scanner and camera server manually.{{cite web |title=Android Media Server troši puno baterije. Kako popraviti? {{!}} |url=https://srbodroid.com/development/uputstva/android-media-server-trosi-puno-baterije-kako-popraviti/ |website=srbodroid.com |language=Croatian |date=2013-12-26 |access-date=2021-07-16 |archive-date=2021-07-16 |archive-url=https://web.archive.org/web/20210716133915/https://srbodroid.com/development/uputstva/android-media-server-trosi-puno-baterije-kako-popraviti/ |url-status=live }}
- Ability to downgrade applications directly, without uninstallation which involves deleting their user data. A downgrade may be desirable after an update breached compatibility and/or removed useful functionality.{{cite web |title=How to Downgrade an Android App If You Don't Like the Update |url=https://www.maketecheasier.com/downgrade-android-app/ |website=Make Tech Easier |access-date=12 June 2021 |date=2016-09-16 |archive-date=2021-03-05 |archive-url=https://web.archive.org/web/20210305040636/https://www.maketecheasier.com/downgrade-android-app/ |url-status=live }}
- Ability to control battery charging current, where a technically unnecessary throttling imposed by the operating system while the screen is on can be removed. On the other hand, a current reduction may be desired to extend battery lifespan. APIs may vary per vendor. For example, on Samsung Galaxy devices, this is done by applying a value to the
/sys/devices/platform/sec-battery/power_supply/battery/siop_level
system file, where 100 represents the highest technically supported charging rate.{{cite web |title=Limit charge rate above/below a fixed charge threshold, temperature etc. · Issue #23 · sriharshaarangi/BatteryChargeLimit |url=https://github.com/sriharshaarangi/BatteryChargeLimit/issues/23 |website=GitHub |access-date=10 June 2021 |language=en |date=2017-08-10 |archive-date=2021-06-10 |archive-url=https://web.archive.org/web/20210610003905/https://github.com/sriharshaarangi/BatteryChargeLimit/issues/23 |url-status=live }}{{efn|/sys/class/power_supply/battery/siop_level
is a shorthand symbolic link to that system file.}} - Ability to limit charging capacity to reduce battery weardown.{{cite web |title=How to Set a Custom Battery Charge Limit in Android device? |url=https://www.getdroidtips.com/custom-battery-charge-limit-android/ |website=Get Droid Tips |access-date=19 July 2021 |language=en |date=7 September 2020 |archive-date=19 July 2021 |archive-url=https://web.archive.org/web/20210719214056/https://www.getdroidtips.com/custom-battery-charge-limit-android/ |url-status=live }}
= Disadvantages =
Some disadvantages of rooting include:
- On certain brands such as Samsung and Motorola, rooting can void one's warranty.{{cite web |title=Does Rooting or Unlocking Void Your Android Phone's Warranty? |url=https://www.howtogeek.com/240417/does-rooting-or-unlocking-void-your-android-phones-warranty/ |website=How To Greek |access-date=29 August 2022 |language=en |date=20 June 2017 }}
- If used incorrectly, rooting can cause stability issues with the software or hardware. If the issues are purely software-based, unrooting the phone can often resolve these issues.
- Certain devices, including those from Huawei{{Cite news|url=https://www.phonearena.com/news/huawei-honor-bootloader-unlock-discontinued_id105187|title=Huawei shuts down bootloader unlock program|date=2018-05-25|newspaper=PhoneArena|access-date=2022-08-29|archive-date=2018-05-27|archive-url=https://web.archive.org/web/20180527194004/https://www.phonearena.com/news/huawei-honor-bootloader-unlock-discontinued_id105187|url-status=live}} and any brand sold by Verizon{{Cite news|url=https://www.droid-life.com/2012/02/29/letter-from-verizon-to-fcc-details-their-stance-on-bootloaders/7|title=Letter From Verizon to FCC Details Their Stance on Bootloaders|date=2012-02-29|newspaper=DroidLife|access-date=2022-08-29}} cannot easily be rooted, unless a privilege escalation exploit is found in the device's operating system version.
- Android SafetyNet API is tripped so some apps will not work or won't be shown on the Play Store.{{Cite web |last=Siddiqui |first=Aamir |date=2016-10-19 |title=Android SafetyNet Now Reportedly Tripped by Unlocked Bootloaders |url=https://www.xda-developers.com/android-safetynet-now-reportedly-tripped-by-unlocked-bootloaders/ |access-date=2024-03-24 |website=XDA Developers |language=en}}
= Related concepts =
Rooting allows the user to obtain privileged access to a phone. It does not allow a user to install a new OS (custom firmware or custom ROM) or recovery image, and it doesn't allow a phone that is locked to a certain carrier to be used on another one. Related operations allow these.
== Bootloader unlock ==
{{Main|Bootloader unlocking}}
Bootloader unlocking is sometimes a first step used to root the device; however, it is not the same as rooting the device.{{cite web|last=Congleton|first= Nicholas |title=Easily Unlock Your Android Bootloader With Fastboot|url=https://www.lifewire.com/how-to-unlock-bootloader-android-phone-4689186|access-date=2020-10-01|website=Lifewire|archive-date=2020-10-23|archive-url=https://web.archive.org/web/20201023094354/https://www.lifewire.com/how-to-unlock-bootloader-android-phone-4689186|url-status=live}} Most devices come with a locked bootloader, which prevents users from installing a new boot image, which is often flashed when rooting a device or using a custom ROM.{{Cite web|title=Locking/Unlocking the Bootloader|url=https://source.android.com/devices/bootloader/locking_unlocking|access-date=2020-10-01|website=Android Open Source Project|language=en|archive-date=2020-09-24|archive-url=https://web.archive.org/web/20200924222551/https://source.android.com/devices/bootloader/locking_unlocking|url-status=live}} The bootloader runs on device start-up and is in charge of loading the operating system on the phone.{{Cite web|title=Overview|url=https://source.android.com/devices/bootloader|access-date=2020-10-01|website=Android Open Source Project|language=en|archive-date=2020-10-07|archive-url=https://web.archive.org/web/20201007051412/https://source.android.com/devices/bootloader|url-status=live}} It is generally in charge of verifying that phone system information hasn't been tampered with and is genuine. Nonetheless, people still perform this operation, as unlocking the bootloader allows users to install custom ROMs.{{Cite web|date=2012-01-03|title=What is the bootloader?|url=https://www.androidcentral.com/what-is-android-bootloader|access-date=2020-10-01|website=Android Central|archive-date=2020-10-07|archive-url=https://web.archive.org/web/20201007112634/https://www.androidcentral.com/what-is-android-bootloader|url-status=live}}
The first step to do this is to generally to set up OEM unlocking,{{Cite web|date=2018-03-12|title=How to Enable OEM Unlocking on Android [OEM Unlock]|url=https://www.thecustomdroid.com/enable-oem-unlocking-on-android/|access-date=2020-10-01|website=The Custom Droid|language=en-US|archive-date=2020-10-20|archive-url=https://web.archive.org/web/20201020024510/https://www.thecustomdroid.com/enable-oem-unlocking-on-android/|url-status=live}} and then to follow manufacturer specific instructions. Not all devices can be bootloader unlocked, and some can only be unlocked with an exploit which usually needs a privilege escalation bug in order to remove software locks, which includes most LG V20 models and Verizon-sold Google Pixel devices.{{Cite web|date=2016-10-20|title=dePixel8 by beaups|url=http://theroot.ninja/depixel8.html|access-date=2023-05-31|website=Sunshine|language=en-US|archive-date=2016-10-31|archive-url=https://web.archive.org/web/20161031013931/http://theroot.ninja/depixel8.html}}{{Cite web|date=2016-12-14|title=LG V20 DirtySanta Bootloader unlock and Root guide|url=https://forum.xda-developers.com/t/ls997-vs995-h910-f800l-dirtysanta-bootloader-unlock-and-root-guide.3519410/|access-date=2023-05-31|website=XDA|language=en-US|archive-date=2020-12-24|archive-url=https://web.archive.org/web/20201224102059/https://forum.xda-developers.com/t/ls997-vs995-h910-f800l-dirtysanta-bootloader-unlock-and-root-guide.3519410/}}
The process of unlocking the bootloader might involve a factory reset, erasing all user data, third-party applications, and configuration.{{cite web |title=Unlock Bootloader - Open Devices - Sony Developer World |url=https://developer.sony.com/develop/open-devices/get-started/unlock-bootloader |website=developer.sony.com |access-date=2021-06-10 |archive-date=2021-06-10 |archive-url=https://web.archive.org/web/20210610002728/https://developer.sony.com/develop/open-devices/get-started/unlock-bootloader |url-status=live }}{{cite web |title=Unlock Bootloader on Samsung Galaxy Phones and Tablets - A Complete Guide |url=https://www.thecustomdroid.com/samsung-galaxy-bootloader-unlock-guide/ |website=The Custom Droid |date=2021-04-03 |access-date=2021-06-10 |archive-date=2021-06-10 |archive-url=https://web.archive.org/web/20210610002838/https://www.thecustomdroid.com/samsung-galaxy-bootloader-unlock-guide/ |url-status=live }}
== SIM unlock ==
{{Main|SIM lock}}
SIM unlocking allows a phone that is locked to a certain carrier to be used on a different carrier. The instructions vary per device and carrier, but this might be done by first requesting the carrier to unlock the phone or purchasing an unlock code online.{{Cite web|title=How Does Unlocking SIM Cards Work?|url=https://smallbusiness.chron.com/unlocking-sim-cards-work-28926.html|access-date=2020-10-01|website=Small Business - Chron.com|archive-date=2020-10-01|archive-url=https://web.archive.org/web/20201001231218/https://smallbusiness.chron.com/unlocking-sim-cards-work-28926.html|url-status=live}}
= Methods =
Some rooting methods involve the use of a command prompt and a development interface called the Android Debug Bridge (also known as ADB), while other methods may use existing vulnerabilities in devices. Due to similarly modeled devices often having a multitude of changes, rooting methods for one device when used for a different variant can result in bricking the device.
"Systemless root" is a variant of rooting in which the underlying device file system is not modified. Systemless root uses various techniques to gain root access without modifying the system partition of a device. Some root applications may include a "hiding" function, which makes attempts to mask the effects and results of rooting, often by whitelisting certain applications for the root or blocking access to affected files.{{cite web|title=How to play Pokémon GO (0.37+) on a rooted Android with Magisk|url=http://www.androidpolice.com/2016/09/11/guide-play-pokemon-go-0-37-rooted-android-magisk/|website=Android Police|date=11 September 2016 |access-date=19 May 2017|archive-date=21 May 2017|archive-url=https://web.archive.org/web/20170521183754/http://www.androidpolice.com/2016/09/11/guide-play-pokemon-go-0-37-rooted-android-magisk/|url-status=live}} Systemless rooting has the advantage of not triggering the software-based version of SafetyNet, an Android feature that works by monitoring changes to system files and is used by applications such as Google Pay to detect whether a device has been tampered with such as by rooting. However, hardware-backed SafetyNet versions may be triggered by systemless rooting, as well as in unrooted devices shipped without Google Mobile Services (GMS).{{cite web |url=https://www.androidpolice.com/2020/06/29/googles-dreaded-safetynet-hardware-check-has-been-spotted-in-the-wild/?amp |title=Google's dreaded SafetyNet hardware check has been spotted in the wild |work=AndroidPolice.com |last=Hager |first=Ryne |date=June 29, 2020 |access-date=August 26, 2021 |url-status=live |archive-date=August 25, 2021 |archive-url=https://web.archive.org/web/20210825012953/https://www.androidpolice.com/2020/06/29/googles-dreaded-safetynet-hardware-check-has-been-spotted-in-the-wild/?amp }}{{cite web |url=https://www.howtogeek.com/241012/safetynet-explained-why-android-pay-and-other-apps-dont-work-on-rooted-devices/ |title=SafetyNet Explained: Why Android Pay and Other Apps Don't Work on Rooted Devices |work=How-To Geek |last=Hoffman |first=Chris |date=July 11, 2017 |access-date=August 26, 2021 |url-status=live |archive-date=November 11, 2020 |archive-url=https://web.archive.org/web/20201111085644/https://www.howtogeek.com/241012/safetynet-explained-why-android-pay-and-other-apps-dont-work-on-rooted-devices/amp/ }}{{cite web |url=https://www.xda-developers.com/bypass-safetynet-hardware-attestation-unlocked-bootloader-magisk-module/ |title=How to (maybe) bypass SafetyNet hardware attestation on devices with an unlocked bootloader |work=XDA |date=January 30, 2021 |access-date=August 26, 2021 |url-status=live |archive-date=April 25, 2021 |archive-url=https://web.archive.org/web/20210425090025/https://www.xda-developers.com/bypass-safetynet-hardware-attestation-unlocked-bootloader-magisk-module/amp/ }}{{cite web |url=https://www.xda-developers.com/magisk-vs-supersu/?amp |title=How to Install Magisk on your Android Phone |work=XDA |date=August 17, 2021 |access-date=August 26, 2021}}{{cite web |url=https://www.howtogeek.com/312404/how-to-root-your-android-phone-with-magisk/ |title=How to Root Your Android Phone with Magisk (So Android Pay and Netflix Work Again) |work=How-To Geek |last=Summerson |first=Cameron |date=September 15, 2017 |access-date=August 26, 2021 |url-status=live |archive-date=February 28, 2021 |archive-url=https://web.archive.org/web/20210228195824/https://www.howtogeek.com/312404/how-to-root-your-android-phone-with-magisk/ }}
The distinction between "soft rooting" through a security vulnerability and "hard-rooting" by flashing a su
binary executable varies from exploit to exploit, and manufacturer to manufacturer. Soft-rooting requires that a device be vulnerable to privilege escalation, or replacing executable binaries. Hard-rooting is supported by the manufacturer, and it is generally only exposed for devices the manufacturer allows.{{Cite book|last1=Zhang|first1=Hang|last2=She|first2=Dongdong|last3=Qian|first3=Zhiyun|title=Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security |chapter=Android Root and its Providers |date=2015-01-01|series=CCS '15|location=New York, NY, USA|publisher=ACM|pages=1093–1104|doi=10.1145/2810103.2813714|isbn=9781450338325|s2cid=7650341}} If a phone can be soft-rooted, it is also inherently vulnerable to malware.
Rooting through exploits
The process of rooting varies widely by manufacturer and device but sometimes includes exploiting one or more security bugs in the firmware (i.e., in the version of the Android OS installed on) of the device. Once an exploit is discovered, a custom recovery image that will skip the digital signature check of firmware updates can be flashed. Then a modified firmware update that typically includes the utilities needed to run apps as root can be installed. For example, the su
binary (such as an open-source one paired with the Superuser{{Cite web|url=https://github.com/ChainsDD/su-binary|title=ChainsDD/su-binary|website=GitHub|access-date=2016-10-08|archive-date=2017-02-26|archive-url=https://web.archive.org/web/20170226225153/https://github.com/ChainsDD/su-binary|url-status=live}} or SuperSU application{{Cite news|url=http://www.howtogeek.com/115297/how-to-root-your-android-why-you-might-want-to/|title=How to Root Your Android Phone with SuperSU and TWRP|access-date=2016-10-08|archive-date=2016-10-07|archive-url=https://web.archive.org/web/20161007131535/http://www.howtogeek.com/115297/how-to-root-your-android-why-you-might-want-to/|url-status=live}}) can be copied to a location in the current process' PATH (e.g., /system/xbin/
) and granted executable permissions with the chmod
command. A third-party supervisor application, like Superuser or SuperSU, can then regulate and log elevated permission requests from other applications. Many guides, tutorials, and automatic processes exist for popular Android devices facilitating a fast and easy rooting process.
The process of rooting a device may be simple or complex, and it even may depend upon serendipity. For example, shortly after the release of the HTC Dream (HTC G1), it was discovered that anything typed using the keyboard was being interpreted as a command in a privileged (root) shell. Although Google quickly released a patch to fix this, a signed image of the old firmware leaked, which gave users the ability to downgrade and use the original exploit to gain root access. Installable apps have managed to unlock immediate root access on some early 2010s Samsung smartphones. This has also been referred to as "one-click rooting".{{cite web |title=How to Use Framaroot to Root Android Devices |url=https://www.coolmuster.com/android-root/framaroot-guide.html |website=www.coolmuster.com |access-date=8 February 2022 |date=2017-05-16}}
A security researcher, Grant Hernandez, demonstrated a use-after-free exploit in Binder, Android's IPC framework, to gain root privileges.{{Cite web |title=Tailoring CVE-2019-2215 to Achieve Root |url=https://hernan.de/blog/tailoring-cve-2019-2215-to-achieve-root/ |access-date=29 December 2022 |archive-url=https://archive.today/20221229134229/https://hernan.de/blog/tailoring-cve-2019-2215-to-achieve-root/ |date=15 October 2019 |archive-date=29 December 2022 |website=hernan.de}} This exploit, tagged CVE-2019-2215, was alleged to be sold by the NSO Group.{{cite web |title=Bad Binder: Android In-The-Wild Exploit |url=https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html |date=21 Nov 2019 |archive-url=https://archive.today/20191122171606/https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html |archive-date=22 November 2019 |website=Google Project Zero |last=Stone |first=Maddie}}
Rooting through manufacturer
Some manufacturers, including OnePlus and Motorola, provide official support for unlocking the bootloader, allowing for rooting without exploiting a vulnerability.{{Cite news|url=http://m.androidcentral.com/root|title=Everything you need to know about rooting your Android|date=2016-06-06|newspaper=Android Central|access-date=2016-10-08|archive-date=2016-10-17|archive-url=https://web.archive.org/web/20161017100215/http://m.androidcentral.com/root|url-status=live}} However, the support may be limited only to certain phones – for example, LG released its bootloader unlock tool only for certain models of its phones.{{Cite web|url=http://www.androidpolice.com/2015/06/02/lg-releases-its-long-promised-bootloader-unlock-tool-but-it-currently-only-supports-the-g4-for-the-eu-open-market-h815/|title=LG Releases Its Long Promised Bootloader Unlock Tool, But It Currently Only Supports The G4 For The EU Open Market (H815)|date=2015-06-02|website=Android Police|access-date=2016-10-08|archive-date=2016-09-30|archive-url=https://web.archive.org/web/20160930172021/http://www.androidpolice.com/2015/06/02/lg-releases-its-long-promised-bootloader-unlock-tool-but-it-currently-only-supports-the-g4-for-the-eu-open-market-h815/|url-status=live}} Also, a manufacturer could discontinue bootloader unlocking support, as was the case with LG{{Cite news|url=https://www.xda-developers.com/lg-bootloader-unlocking-shut-down-december-31/|title=LG will shut down its bootloader unlocking service on December 31|date=2021-12-06|newspaper=XDA Developers|access-date=2022-05-12|archive-date=2022-04-28|archive-url=https://web.archive.org/web/20220428215524/https://www.xda-developers.com/lg-bootloader-unlocking-shut-down-december-31/|url-status=live}} and Huawei.{{Cite news|url=https://www.phonearena.com/news/huawei-honor-bootloader-unlock-discontinued_id105187|title=Huawei shuts down bootloader unlock program|date=2018-05-25|newspaper=PhoneArena|access-date=2022-05-12|archive-date=2018-05-27|archive-url=https://web.archive.org/web/20180527194004/https://www.phonearena.com/news/huawei-honor-bootloader-unlock-discontinued_id105187|url-status=live}}
The Google Nexus and Pixel line of devices can have their bootloader unlocked by simply connecting the device to a computer while in bootloader mode and running the Fastboot protocol with the command fastboot oem unlock
on older devices,{{cite web|url=https://android.googlesource.com/platform/docs/source.android.com/+/bf8b4aa249ae4e2f8c6543839fefbfea0c96ce9a/src/source/building-devices.md#Unlocking-the-bootloader|title=Building for devices|website=Google Git|publisher=Google Inc.|access-date=9 December 2015|archive-date=10 December 2015|archive-url=https://web.archive.org/web/20151210215216/https://android.googlesource.com/platform/docs/source.android.com/%2B/bf8b4aa249ae4e2f8c6543839fefbfea0c96ce9a/src/source/building-devices.md#Unlocking-the-bootloader|url-status=live}} or fastboot flashing unlock
on newer devices.{{cite web|url=https://source.android.com/docs/core/architecture/bootloader/locking_unlocking|title=Locking/Unlocking the Bootloader|website=Android Source|publisher=Google Inc.|access-date=18 January 2023}} After a warning is accepted, the bootloader is unlocked, so a new system image can be written directly to flash without the need for an exploit. Additionally, Pixel phones sold via certain carriers like Verizon disallow bootloader unlocking,{{cite web|url=https://community.verizon.com/t5/Google-Pixel/Pixel-OEM-Unlocking-Support/td-p/1153573|title=Pixel OEM Unlocking Support|website=Verizon Forums|date=20 February 2020 |publisher=Verizon|access-date=12 May 2022|archive-date=3 September 2021|archive-url=https://web.archive.org/web/20210903190252/https://community.verizon.com/t5/Google-Pixel/Pixel-OEM-Unlocking-Support/td-p/1153573|url-status=live}} while others such as T-Mobile require a phone to be paid off and SIM unlocked before the bootloader can be unlocked.{{citation needed|date=April 2025}}
= Difficulties =
In the past, many manufacturers have tried to make non-rootable phones with more elaborate protections (like the Droid X), but exploits are usually still found eventually. There may be no root exploit available for new, or outdated phones.{{cite web |url=http://lifehacker.com/5789397/the-always-up+to+date-guide-to-rooting-any-android-phone |title=Everything You Need to Know About Rooting Your Android Phone |date=4 September 2013 |publisher=Lifehacker.com |access-date=2014-02-26 |archive-date=2014-02-26 |archive-url=https://web.archive.org/web/20140226053654/http://lifehacker.com/5789397/the-always-up+to+date-guide-to-rooting-any-android-phone |url-status=live }}
Industry reaction
Until 2010, tablet and smartphone manufacturers, as well as mobile carriers, were mainly unsupportive of third-party firmware development. Manufacturers had expressed concern about improper functioning of devices running unofficial software{{cite web |title=Unlock Bootloader |url=http://htcdev.com/bootloader/ |access-date=October 30, 2011 |archive-date=November 1, 2011 |archive-url=https://web.archive.org/web/20111101152226/http://www.htcdev.com/bootloader |url-status=live }} and related support costs. Moreover, firmware such as OmniROM and CyanogenMod sometimes offer features for which carriers would otherwise charge a premium, such as tethering. Due to that, technical obstacles such as locked bootloaders and restricted access to root permissions have commonly been introduced in many devices. For example, in late December 2011, Barnes & Noble and Amazon.com, Inc. began pushing automatic, over-the-air firmware updates, 1.4.1 to Nook Tablets and 6.2.1 to Kindle Fires, that removed one method to gain root access to the devices. The Nook Tablet 1.4.1 update also removed users' ability to sideload apps from sources other than the official Barnes & Noble app store (without modding).{{cite web|url=http://www.itworld.com/mobile-wireless/234809/kindle-fire-and-nook-tablet-both-get-upgraded-reduced-functionality|work=ITworld|last=Smith|first=Peter|date=December 21, 2011|access-date=January 10, 2012|title=Kindle Fire and Nook Tablet both get 'upgraded' with reduced functionality|archive-date=January 8, 2012|archive-url=https://web.archive.org/web/20120108015721/http://www.itworld.com/mobile-wireless/234809/kindle-fire-and-nook-tablet-both-get-upgraded-reduced-functionality|url-status=live}}{{cite web|url=http://pcper.com/category/tags/update|work=PC Perspective|last=Verry|first=Tim|date=December 21, 2011|access-date=January 10, 2012|title=Kindle Fire and Nook Tablet Receive Root Access Killing Software Updates|archive-date=August 15, 2012|archive-url=https://web.archive.org/web/20120815131453/http://pcper.com/category/tags/update|url-status=live}}
However, as community-developed software began to grow popular in the late 2009 to early 2010,{{cite web |url=https://www.zdnet.com/article/cyanogenmod-cm7-teach-your-old-droid-new-tricks/ |title=CyanogenMod CM7: Teach your old Droid New Tricks |author=Jason Perlow |publisher=ZDNet |date=January 18, 2011 |access-date=January 4, 2012 |archive-date=January 7, 2012 |archive-url=https://web.archive.org/web/20120107050441/http://www.zdnet.com/blog/perlow/cyanogenmod-cm7-teach-your-old-droid-new-tricks/15574 |url-status=live }}{{cite web |url=http://androidandme.com/2011/08/devices/popular-android-aftermarket-firmware-miui-gets-its-own-superphone/ |title=MIUI firmware is "popular" |publisher=AndroidAndMe |date=August 16, 2011 |access-date=January 4, 2012 |archive-date=January 14, 2012 |archive-url=https://web.archive.org/web/20120114164822/http://androidandme.com/2011/08/devices/popular-android-aftermarket-firmware-miui-gets-its-own-superphone/ |url-status=live }} and following a statement by the Copyright Office and Librarian of Congress (US) allowing the use of "jailbroken" mobile devices,{{cite web |last=Sadun |first=Erica |url=http://www.tuaw.com/2010/07/26/library-of-congress-rules-in-favor-of-jailbreaking/ |title=LoC rules in favor of jailbreaking |publisher=Tuaw.com |date=July 26, 2010 |access-date=January 4, 2012 |archive-url=https://web.archive.org/web/20121030023251/http://www.tuaw.com/2010/07/26/library-of-congress-rules-in-favor-of-jailbreaking/ |archive-date=October 30, 2012}}{{cite web |title=Statement of the Librarian of Congress Relating to Section 1201 Rulemaking |publisher=Library of Congress |date=December 1, 2012 |url=https://www.copyright.gov/1201/2010/Librarian-of-Congress-1201-Statement.html |access-date=November 7, 2018 |archive-date=November 16, 2018 |archive-url=https://web.archive.org/web/20181116022214/https://www.copyright.gov/1201/2010/Librarian-of-Congress-1201-Statement.html |url-status=live }} manufacturers and carriers have softened their position regarding CyanogenMod and other unofficial firmware distributions. Some manufacturers, including HTC,{{cite web |url=http://htcdev.com/bootloader |title=HTC's bootloader unlock page |publisher=Htcdev.com |access-date=January 4, 2012 |archive-date=October 19, 2012 |archive-url=https://web.archive.org/web/20121019020546/http://htcdev.com/bootloader |url-status=live }} Samsung,{{cite web|title=CyanogenMod supported by Samsung, gives away Galaxy S2 to devs |url=http://www.itmag.org/android-operating-system-news/175-cyanogenmod-supported-by-samsung-gives-away-galaxy-s2-to-devs.html |website=ITMag |access-date=9 December 2015 |url-status=dead |archive-url=https://web.archive.org/web/20150105202030/http://www.itmag.org/android-operating-system-news/175-cyanogenmod-supported-by-samsung-gives-away-galaxy-s2-to-devs.html |archive-date=January 5, 2015 }} Motorola{{cite web |url=https://techcrunch.com/2011/10/24/motorola-offers-unlocked-bootloader-tool-for-droid-razr-verizon-removes-it/ |title=Motorola Offers Unlocked Bootloader Tool |publisher=Techcrunch.com |date=October 24, 2011 |access-date=January 4, 2012 |archive-date=July 7, 2017 |archive-url=https://web.archive.org/web/20170707201234/https://techcrunch.com/2011/10/24/motorola-offers-unlocked-bootloader-tool-for-droid-razr-verizon-removes-it/ |url-status=live }} and Sony,{{cite web|last1=Dahlström|first1=Karl-Johan|title=Sony Ericsson supports independent developers|url=http://developer.sonymobile.com/2011/09/28/sony-ericsson-supports-independent-developers/|website=Sony Mobile Communications|access-date=9 December 2015|archive-date=10 December 2015|archive-url=https://web.archive.org/web/20151210213321/http://developer.sonymobile.com/2011/09/28/sony-ericsson-supports-independent-developers/|url-status=live}} actively provide support and encourage development.
In 2011, the need to circumvent hardware restrictions to install unofficial firmware lessened as an increasing number of devices shipped with unlocked or unlockable bootloaders, similar to the Nexus and Pixel series of phones. Device manufacturer HTC has announced that it will support aftermarket software developers by making the bootloaders of all new devices unlockable.
In 2014, Samsung released a security feature called Knox, which verifies whether system and boot files were modified. If custom firmware was flashed, the eFuse is set to 0x1, permanently voiding the warranty and disabling Knox-enabled features such as Samsung Pay.{{Cite web|date=2018-12-30|title=All you wanted to know about KNOX Void Warranty 0x1|url=http://omegadroid.net/wanted-knox-void-warranty-0x1/|access-date=2020-08-27|archive-url=https://web.archive.org/web/20181230130548/http://omegadroid.net/wanted-knox-void-warranty-0x1/|archive-date=2018-12-30}} Additionally, certain Samsung devices lack the ability to flash custom software, namely Samsung phones and tablets released in North America after 2015, with an exception for devices lacking a cellular modem,{{Cite web|date=2016-03-13|title=Galaxy S7 Bootloader Lock Explained: You Might Not Get AOSP After All|url=https://www.xda-developers.com/galaxy-s7-bootloader-lock-explained-you-might-not-get-aosp-after-all/|access-date=2023-07-05}} although there are exploits that can unlock the bootloader on some affected devices running older One UI versions.{{Cite web|date=2021-01-08|title=Bootloader Unlock for Samsung US/Canada Devices|url=https://forum.xda-developers.com/t/android-unsamlock-bootloader-unlock-for-samsung-us-canada-devices.4215101/|access-date=2023-07-05}}
Legality
International treaties have influenced the development of laws affecting rooting. The 1996 World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against digital rights management (DRM) circumvention. The American implementation is the Digital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as rooting. The 2001 European Copyright Directive implemented the treaty in Europe, requiring member states of the European Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as to run alternative software,{{cite web |author=Duncan Geere |url=https://www.wired.co.uk/news/archive/2010-07/28/investigation-is-it-legal-to-jailbreak-a-uk-iphone |title=Investigation: Is it legal to jailbreak a UK iPhone? |publisher=Wired UK |date=July 28, 2010 |access-date=October 26, 2012 |archive-date=October 31, 2012 |archive-url=https://web.archive.org/web/20121031034914/http://www.wired.co.uk/news/archive/2010-07/28/investigation-is-it-legal-to-jailbreak-a-uk-iphone |url-status=live }} but member states vary on the implementation of the directive.
= Australia =
In 2010, Electronic Frontiers Australia said that it is unclear whether rooting is legal in Australia, and that anti-circumvention laws may apply.{{cite web |url= http://www.pcauthority.com.au/News/223713,could-jailbreaking-your-iphone-land-you-in-jail.aspx |title= Could jailbreaking your iPhone land you in jail? |author= Rosalyn Page |date= August 5, 2010 |publisher= PC & Tech Authority |access-date= January 21, 2013 |archive-date= October 21, 2013 |archive-url= https://web.archive.org/web/20131021010517/http://www.pcauthority.com.au/News/223713,could-jailbreaking-your-iphone-land-you-in-jail.aspx |url-status= live }} These laws were strengthened by the Copyright Amendment Act 2006.
= Canada =
In November 2012, Canada amended its Copyright Act with new provisions prohibiting tampering with digital locks, with exceptions including software interoperability.{{cite web |url= http://www.michaelgeist.ca/content/view/6692/125/ |title= Canadian Copyright Reform In Force: Expanded User Rights Now the Law |author= Michael Geist |date= November 7, 2012 |publisher= michaelgeist.ca |access-date= November 13, 2012 |author-link= Michael Geist |archive-date= November 9, 2012 |archive-url= https://web.archive.org/web/20121109182709/http://www.michaelgeist.ca/content/view/6692/125 |url-status= dead }} Rooting a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.
There had been several efforts from 2008 to 2011 to amend the Copyright Act (Bill C-60, Bill C-61, and Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,{{cite web |url=https://www.eff.org/deeplinks/2012/02/canadas-c-11-bill-and-hazards-digital-locks-provisions |title=Canada's C-11 Bill and the Hazards of Digital Locks Provisions |publisher=Electronic Frontier Foundation |date=February 10, 2012 |access-date=October 17, 2012 |archive-date=October 17, 2012 |archive-url=https://web.archive.org/web/20121017235618/https://www.eff.org/deeplinks/2012/02/canadas-c-11-bill-and-hazards-digital-locks-provisions |url-status=live }} but those bills were set aside. In 2011, Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly broad Copyright Act amendments could prohibit.{{cite news |author= The Canadian Press |url= http://www.ctvnews.ca/phone-jailbreaking-allows-users-to-hack-their-phone-1.707707 |title= Phone 'jailbreaking' allows users to hack their phone |publisher= CTV News |date= October 13, 2011 |access-date= October 17, 2012 |archive-date= November 7, 2012 |archive-url= https://web.archive.org/web/20121107105637/http://www.ctvnews.ca/phone-jailbreaking-allows-users-to-hack-their-phone-1.707707 |url-status= live }}
= European Union =
The Free Software Foundation Europe argues that it is legal to root or flash any device. According to the European Directive 1999/44/EC, replacing the original operating system with another does not void the statutory warranty that covers the hardware of the device for two years unless the seller can prove that the modification caused the defect.{{cite web|url=http://fsfe.org/freesoftware/legal/flashingdevices.en.html|title=Does rooting your device (e.g. an Android phone) and replacing its operating system with something else void your statutory warranty if you are a consumer?|author=Matija Šuklje|access-date=26 October 2014|archive-date=10 August 2014|archive-url=https://web.archive.org/web/20140810185926/https://fsfe.org/freesoftware/legal/flashingdevices.en.html|url-status=live}}
= United Kingdom =
The law Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Rooting may be a form of circumvention covered by that law, but this has not been tested in court.{{cite web |url= http://www.pcadvisor.co.uk/how-to/apple/3344366/how-jailbreak-your-iphone/ |title= How to jailbreak your iPhone: Unleash the full potential of your iPhone |author= Jim Martin |date= March 14, 2012 |publisher= PC Advisor |access-date= January 21, 2013 |archive-date= December 22, 2012 |archive-url= https://web.archive.org/web/20121222040110/http://www.pcadvisor.co.uk/how-to/apple/3344366/how-jailbreak-your-iphone/ |url-status= live }} Competition laws may also be relevant.{{cite web |url= http://www.electronicsweekly.com/Articles/30/07/2010/49177/iphone-jailbreaking-is-okay-under-eu-law.htm |title= iPhone jailbreaking is 'okay under EU law' |author= Warwick Ashford |date= July 30, 2010 |work= Computer Weekly |publisher= Electronics Weekly |access-date= January 21, 2013 |archive-date= August 26, 2021 |archive-url= https://web.archive.org/web/20210826190006/https://www.electronicsweekly.com/news/business/information-technology/iphone-jailbreaking-is-okay-under-eu-law-2010-07/ |url-status= live }}
= India =
India's copyright law permits circumventing DRM for non-copyright-infringing purposes.{{cite web |url= http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012/tpm-copyright-amendment |title= Technological Protection Measures in the Copyright (Amendment) Bill, 2010 |author= Pranesh Prakash |date= April 29, 2010 |publisher= Centre for Internet and Society |access-date= November 10, 2012 |archive-date= September 20, 2012 |archive-url= https://web.archive.org/web/20120920045947/http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012/tpm-copyright-amendment |url-status= live }}{{cite web |url= https://arstechnica.com/tech-policy/2010/04/indias-copyright-proposals-are-un-american-and-thats-bad/ |title= India's copyright proposals are un-American (and that's bad) |author= Nate Anderson |date= April 22, 2010 |publisher= Ars Technica |access-date= November 10, 2012 |archive-date= December 3, 2012 |archive-url= https://web.archive.org/web/20121203011221/http://arstechnica.com/tech-policy/2010/04/indias-copyright-proposals-are-un-american-and-thats-bad/ |url-status= live }} Indian Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.{{cite web |url= http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012 |title= Analysis of the Copyright (Amendment) Bill 2012 |author= Pranesh Prakash |date= May 23, 2012 |publisher= Centre for Internet and Society |access-date= November 10, 2012 |archive-date= May 26, 2012 |archive-url= https://web.archive.org/web/20120526223828/http://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012 |url-status= live }} India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.
= New Zealand =
New Zealand's copyright law allows the circumvention of technological protection measure (TPM) as long as the use is for legal, non-copyright-infringing purposes.{{cite web |author=Michael Geist |url=http://www.michaelgeist.ca/content/view/2829/125/ |title=New Zealand's Digital Copyright Law Demonstrates Anti-Circumvention Flexibility |publisher=Michael Geist |date=April 10, 2008 |access-date=October 26, 2012 |author-link=Michael Geist |archive-date=April 19, 2012 |archive-url=https://web.archive.org/web/20120419083000/http://www.michaelgeist.ca/content/view/2829/125/ |url-status=dead }}{{cite news |author=Stephen Bell |url=http://computerworld.co.nz/news.nsf/news/law-changes-required-before-nz-ratifies-acta |title=Law changes required before NZ ratifies ACTA |publisher=ComputerWorld New Zealand |date=September 30, 2011 |access-date=October 26, 2012 |url-status=dead|archive-url=https://web.archive.org/web/20110930234801/http://computerworld.co.nz/news.nsf/news/law-changes-required-before-nz-ratifies-acta |archive-date=September 30, 2011}} This law was added to the Copyright Act 1994 as part of the Copyright (New Technologies) Amendment Act 2008.
= Singapore =
Rooting might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.{{cite web |url= http://www.digitalone.com.sg/news/article/12884 |title= iPhone jailbreak may be legal here, but... But there will be certain legal provisions. |author= Kenny Chee |date= August 12, 2010 |work= DigitalOne |publisher= AsiaOne |access-date= November 10, 2012 |url-status= dead |archive-url= https://web.archive.org/web/20100815122823/http://www.digitalone.com.sg/news/article/12884 |archive-date= August 15, 2010 }}
= United States =
The Unlocking Consumer Choice and Wireless Competition Act guarantees that consumers can unlock or let others unlock their phones. Under the Digital Millennium Copyright Act (DMCA) rooting was illegal in the United States except by exemption. The U.S. Copyright Office granted an exemption to this law "at least through 2015".{{cite web |url=https://www.eff.org/is-it-illegal-to-unlock-a-phone |title=Is It Illegal To Unlock a Phone? The Situation is Better - and Worse - Than You Think | Electronic Frontier Foundation |publisher=Eff.org |date=2013-01-28 |access-date=2014-02-26 |archive-date=2013-11-02 |archive-url=https://web.archive.org/web/20131102064726/https://www.eff.org/is-it-illegal-to-unlock-a-phone |url-status=live }}
In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit rooting.{{cite web |url=http://www.copyright.gov/1201/ |title=Copyright office provides exemption to DMCA |publisher=United States Copyright Office |date=February 12, 2009 |access-date=July 17, 2009 |archive-date=August 6, 2009 |archive-url=https://web.archive.org/web/20090806213422/http://www.copyright.gov/1201/ |url-status=live }}{{cite web |url= http://news.cnet.com/8301-13578_3-20011661-38.html |title= Feds say mobile-phone jailbreaking is OK |author= Declan McCullagh |date= July 26, 2010 |work= Politics and Law |publisher= CNET |access-date= October 26, 2011 |archive-date= October 7, 2011 |archive-url= https://web.archive.org/web/20111007193710/http://news.cnet.com/8301-13578_3-20011661-38.html |url-status= live }} In their ruling, the Library of Congress affirmed on July 26, 2010, that rooting is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.
On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset". However, the U.S. Copyright office refused to extend this exemption to tablets, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.{{cite web |url=http://www.copyright.gov/fedreg/2012/2012-26308_PI.pdf |title=Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies |publisher=U.S. Copyright Office |access-date=October 31, 2012 |archive-date=November 19, 2012 |archive-url=https://web.archive.org/web/20121119084311/http://www.copyright.gov/fedreg/2012/2012-26308_PI.pdf |url-status=live }}{{cite web |author=Timothy B. Lee |url=https://arstechnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphones-but-not-tablets/ |title=Jailbreaking now legal under DMCA for smartphones, but not tablets |publisher=Ars Technica |date=October 25, 2012 |access-date=October 26, 2012 |archive-date=October 27, 2012 |archive-url=https://web.archive.org/web/20121027192318/http://arstechnica.com/tech-policy/2012/10/jailbreaking-now-legal-under-dmca-for-smartphones-but-not-tablets/ |url-status=live }}{{cite web |url=http://www.androidpolice.com/2012/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-phone-unlocks-will-be-a-thing-of-the-past/ |title=New DMCA Exemptions Allow Rooting Phones (But Not Tablets), Unapproved Phone Unlocks Will Be A Thing Of The Past |date=26 October 2012 |publisher=Android Police |access-date=October 31, 2012 |archive-date=October 30, 2012 |archive-url=https://web.archive.org/web/20121030123310/http://www.androidpolice.com/2012/10/26/new-dmca-exemptions-allow-rooting-phones-but-not-tablets-unapproved-phone-unlocks-will-be-a-thing-of-the-past/ |url-status=live }} The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.
Tim Wu, a professor at Columbia Law School, argued in 2007 that jailbreaking is "legal, ethical, and just plain fun".{{cite web |url= http://www.slate.com/id/2175304/ |title= The iPhone Freedom Fighters |author= Tim Wu |date= October 4, 2007 |work= Technology |publisher= Slate |access-date= October 26, 2011 |archive-date= September 24, 2011 |archive-url= https://web.archive.org/web/20110924084544/http://www.slate.com/id/2175304 |url-status= live }} Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.{{cite web |url=http://www.copyright.gov/fedreg/2006/71fr68472.pdf |title=Federal Register: Exemption to Prohibition on Circumvention of Copyright Protection Systems for |access-date=September 11, 2010 |archive-date=July 10, 2010 |archive-url=https://web.archive.org/web/20100710102554/http://www.copyright.gov/fedreg/2006/71fr68472.pdf |url-status=live }} Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so. In 2010 and 2012, the U.S. Copyright Office approved exemptions to the DMCA that allow users to root their devices legally.{{cite news |author=David Goldman |url=https://money.cnn.com/2010/07/26/technology/iphone_jailbreaking/ |title=Jailbreaking iPhone apps is now legal |publisher=CNN Money |date=July 26, 2010 |access-date=September 11, 2010 |archive-date=August 30, 2010 |archive-url=https://web.archive.org/web/20100830035354/http://money.cnn.com/2010/07/26/technology/iphone_jailbreaking/ |url-status=live }} It is still possible to employ technical countermeasures to prevent rooting or prevent rooted phones from functioning. It is also unclear whether it is legal to traffic in the tools used to make rooting easy.{{cite web |url=http://www.onthemedia.org/transcripts/2010/07/30/03 |title=Transcript of "Jailbreak?" (July 30, 2010) |publisher=On The Media |date=July 30, 2010 |access-date=September 11, 2010 |url-status=dead |archive-url=https://web.archive.org/web/20100731150659/http://www.onthemedia.org/transcripts/2010/07/30/03 |archive-date=July 31, 2010 }}
See also
Notes
{{Notelist}}