this post was submitted on 29 Dec 2023
841 points (97.0% liked)

linuxmemes

21272 readers
518 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] rush@lemm.ee 3 points 10 months ago (1 children)

    There's other reasons to use Magisk for this instead, like not having a VPN slot free or wanting to use another DNS Server

    [–] Dehydrated@lemmy.world 1 points 10 months ago (1 children)

    Sure, but rooting your phone fundamentally destroys the security model https://madaidans-insecurities.github.io/android.html#rooting

    [–] rush@lemm.ee 2 points 10 months ago* (last edited 10 months ago) (1 children)

    I know.

    Not only have I written about this before on related forums, but also have I talked and partially written about the AVBRoot Project and others which bring root access closer to the Android security model.

    [–] Dehydrated@lemmy.world 1 points 10 months ago

    Your project sounds great, but it only addresses one part of the issue. But verified boot is far from the only security concept broken by root. Android uses the principal of least privilege (which makes a lot of sense, it's actually used by a lot software). With root, a user-installed app runs with higher privileges than most parts of the entire operating system.