Rooting
is the process by which users of
Android devices can attain
privileged control (known as
root access
In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of the ...
) over various subsystems of the device, usually smartphones and
tablets. Because Android is based on a modified version of the
Linux kernel
The Linux kernel is a Free and open-source software, free and open source Unix-like kernel (operating system), kernel that is used in many computer systems worldwide. The kernel was created by Linus Torvalds in 1991 and was soon adopted as the k ...
, rooting an
Android device gives access to administrative (
superuser
In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of the ...
) permissions similar to those on
Linux
Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
or any other
Unix-like
A Unix-like (sometimes referred to as UN*X, *nix or *NIX) operating system is one that behaves in a manner similar to a Unix system, although not necessarily conforming to or being certified to any version of the Single UNIX Specification. A Uni ...
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
such as
FreeBSD
FreeBSD is a free-software Unix-like operating system descended from the Berkeley Software Distribution (BSD). The first version was released in 1993 developed from 386BSD, one of the first fully functional and free Unix clones on affordable ...
or
macOS
macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
.
Rooting is often performed to overcome limitations that
carriers and
hardware manufacturers put on some devices. Thus, rooting allows the users to alter or replace
system applications and settings, run specialized
applications
Application may refer to:
Mathematics and computing
* Application software, computer software designed to help the user to perform specific tasks
** Application layer, an abstraction layer that specifies protocols and interface methods used in a ...
("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal
Android user. On some devices, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system.
Root access
In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of the ...
is sometimes compared to
jailbreaking on devices running the Apple
iOS
Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
operating system. However, these are different concepts: jailbreaking is the bypass of several types of Apple prohibitions for the
end user
In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users who support or maintain the product, such as sysops, system administrato ...
, including modifying the operating system (enforced by a "locked
bootloader
A bootloader, also spelled as boot loader or called bootstrap loader, is a computer program that is responsible for booting a computer and booting an operating system. If it also provides an interactive menu with multiple boot choices then it's o ...
"), installing non-officially approved (not available on the
App Store
An app store, also called an app marketplace or app catalog, is a type of digital distribution platform for computer software called applications, often in a mobile context. Apps provide a specific set of functions which, by definition, do not i ...
) applications via
sideloading
Sideloading describes the process of transferring files between two local devices, in particular between a personal computer and a mobile device such as a mobile phone, smartphone, PDA, tablet, portable media player or e-reader.
Sideloading ty ...
, and granting the user elevated administration-level privileges (rooting). Some vendors, such as
HTC
HTC Corporation ( zh, t=宏達國際電子股份有限公司, p=Hóngdá Guójì Diànzǐ Gǔfèn Yǒuxiàn Gōngsī, first=t), or High Tech Computer Corporation (abbreviated and trading as HTC), is a Taiwanese consumer electronics corporatio ...
,
Sony
is a Japanese multinational conglomerate (company), conglomerate headquartered at Sony City in Minato, Tokyo, Japan. The Sony Group encompasses various businesses, including Sony Corporation (electronics), Sony Semiconductor Solutions (i ...
,
OnePlus,
Asus
ASUSTeK Computer Inc. (, , , ; stylized as ASUSTeK or ASUS) is a Taiwanese Multinational corporation, multinational computer, phone hardware and electronics manufacturer headquartered in Beitou District, Taipei, Taiwan. Its products include deskto ...
,
Xiaomi
Xiaomi (; ) is a Chinese multinational corporation and technology company headquartered in Beijing, China. It is best known for consumer electronics software electric vehicles. It is the second-largest manufacturer of smartphones in the worl ...
, and
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
, have provided the ability to unlock the bootloaders of some devices, thus enabling advanced users to make operating system modifications.
Similarly, the ability to sideload applications is typically permissible on Android devices without root permissions. Thus, it is primarily the third aspect of iOS jailbreaking (giving users administrative privileges) that most directly correlates with
Android rooting
Rooting is the process by which users of Android devices can attain privileged control (known as root access) over various subsystems of the device, usually smartphones and tablets. Because Android is based on a modified version of the Linux k ...
.
Rooting is distinct from
SIM unlocking and
bootloader unlocking
Bootloader unlocking is the process of disabling the bootloader security that enforces secure boot during the boot procedure. It can allow advanced customizations possible, such as installing custom firmware. On smartphones, this can be a custom ...
. The former allows for the removal of the
SIM card
A typical SIM card (mini-SIM with micro-SIM cutout)A SIM card or SIM (subscriber identity module) is an integrated circuit (IC) intended to securely store an international mobile subscriber identity (IMSI) number and its related key, which are u ...
lock on a phone, while the latter allows rewriting the
phone's boot partition (for example, to install or replace the operating system).
Overview
Rooting lets all user-installed applications run privileged commands typically unavailable to the devices in the stock configuration. Rooting is required for more advanced and potentially dangerous operations including modifying or deleting system files, removing
pre-installed applications, and low-level access to the hardware itself (rebooting, controlling status lights, or recalibrating touch inputs.) A typical rooting installation also installs the
Superuser
In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of the ...
application, which supervises applications that are granted root or superuser rights by requesting approval from the user before granting said permissions. A secondary operation, unlocking the device's
bootloader
A bootloader, also spelled as boot loader or called bootstrap loader, is a computer program that is responsible for booting a computer and booting an operating system. If it also provides an interactive menu with multiple boot choices then it's o ...
verification, is required to remove or replace the installed operating system.
In contrast to
iOS jailbreaking
iOS jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by Apple on devices running iOS and iOS-based operating systems. It is typically done through a series of kernel patches. A jailbroken devic ...
, rooting is not needed to run applications distributed outside of the Google Play Store, known as ''
sideloading
Sideloading describes the process of transferring files between two local devices, in particular between a personal computer and a mobile device such as a mobile phone, smartphone, PDA, tablet, portable media player or e-reader.
Sideloading ty ...
''. The Android OS supports this feature natively in two ways: through the "Unknown sources" option in the Settings menu and through the
Android Debug Bridge. However, some US
carriers, including
AT&T
AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
, have prevented the installation of applications not on the Play Store in
firmware
In computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computer, computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both computer hardware, h ...
,
although several devices are not subject to this rule, including the
Samsung Infuse 4G;
AT&T lifted the restriction on most devices by the middle of 2011.
, the Amazon
Kindle Fire
The Amazon Fire, formerly called the Kindle Fire, is a line of tablet computers developed by Amazon. Built with Quanta Computer, the Kindle Fire was first released in November 2011, featuring a color 7-inch multi-touch display with IPS tech ...
defaults to the
Amazon Appstore
Amazon Appstore is an app store for Android-compatible platforms operated by Amazon.com Services, LLC, a subsidiary of Amazon. On August 20, 2025 the Amazon Appstore will be inaccessible on third party Android devices and apps bought from the Am ...
instead of
Google Play
Google Play, also known as the Google Play Store, Play Store, or sometimes the Android Store (and was formerly Android Market), is a digital distribution service operated and developed by Google. It serves as the official app store for certifie ...
, though like most other Android devices, Kindle Fire allows sideloading of applications from unknown sources, and the "easy installer" application on the Amazon Appstore makes this easy. Other vendors of Android devices may look to other sources in the future. Access to alternate apps may require rooting but rooting is not always necessary.
Advantages

Advantages of rooting include the possibility for complete control over the appearance, feel, and behaviour of the device. As a superuser has access to the device's system files, all aspects of the operating system can be customized with the only real limitation being the level of coding expertise. Immediately expectable advantages of rooted devices include the following:
* Support for
theming, allowing everything to be visually changed from the color and type of the battery status indicator to the
boot animation that appears while the device is booting, the status bar, control menu, virtual on-screen navigation buttons, and more.
* Full control of the kernel, which, for example, allows
overclocking
In computing, overclocking is the practice of increasing the clock rate of a computer to exceed that certified by the manufacturer. Commonly, operating voltage is also increased to maintain a component's operational stability at accelerated sp ...
and underclocking the CPU and GPU.
* Full application control, including the ability to fully
back up
Backup is the computing function of making copies of data to enable recovery from data loss.
Backup may also refer to:
Information technology
* Backup (backup software), Apple Mac software
* Backup and Restore, Windows software
* Backup softwa ...
, restore, or batch-edit applications, or to remove
bloatware
Software bloat is a process whereby successive versions of a computer program become perceptibly slower, use more memory, Computer data storage, disk space or processing power, or have higher hardware requirements than the previous version, whi ...
that comes pre-installed on some phones.
* Custom automated system-level processes through the use of third-party applications.
* Ability to install software (such as Xposed,
Magisk,
SuperSU,
BusyBox
BusyBox is a software suite that provides several List of Unix commands, Unix utilities in a single executable file. It runs in a variety of POSIX environments such as Linux, Android (operating system), Android, and FreeBSD, although many of the ...
, etc.) that allows additional levels of control on a rooted device or management of root access.
* Access to more
Unix shell
A Unix shell is a Command-line_interface#Command-line_interpreter, command-line interpreter or shell (computing), shell that provides a command line user interface for Unix-like operating systems. The shell is both an interactive command languag ...
commands, both standalone and through
Android Debug Bridge.
* Ability to bypass restrictions by vendors or Google, such as
scoped storage, which compromised file system access and compatibility to established third-party mobile applications such as
file manager
A file manager or file browser is a computer program that provides a user interface to manage computer files, files and folder (computing), folders. The most common Computer file#Operations, operations performed on files or groups of files incl ...
s.
* Extended
task management
Task management is the process of overseeing a task through its lifecycle. It involves planning, testing, tracking, and reporting. Task management can help individuals achieve goals or enable groups of individuals to collaborate and share know ...
abilities
** Ability to terminate misbehaving and/or unresponsive system tasks such as media scanner and camera server manually.
* Ability to downgrade
applications
Application may refer to:
Mathematics and computing
* Application software, computer software designed to help the user to perform specific tasks
** Application layer, an abstraction layer that specifies protocols and interface methods used in a ...
directly, without uninstallation which involves deleting their user data. A downgrade may be desirable after an update breached compatibility and/or removed useful functionality.
* Ability to control battery charging
current, where a technically unnecessary throttling imposed by the operating system while the screen is on can be removed. On the other hand, a current reduction may be desired to extend battery lifespan.
API
An application programming interface (API) is a connection between computers or between computer programs. It is a type of software interface, offering a service to other pieces of software. A document or standard that describes how to build ...
s may vary per vendor. For example, on
Samsung Galaxy
Samsung Galaxy (; stylized as SΛMSUNG Galaxy since 2015 (except Japan where it omitted the Samsung branding up until 2023), previously stylized as Samsung GALAXY; abbreviated as SG) is a series of computing, Android mobile computing and wear ...
devices, this is done by applying a value to the
/sys/devices/platform/sec-battery/power_supply/battery/siop_level
system file, where 100 represents the highest technically supported charging rate.
* Ability to limit charging capacity to reduce
battery weardown.
Disadvantages
Some disadvantages of rooting include:
* On certain brands such as
Samsung
Samsung Group (; stylised as SΛMSUNG) is a South Korean Multinational corporation, multinational manufacturing Conglomerate (company), conglomerate headquartered in the Samsung Town office complex in Seoul. The group consists of numerous a ...
and
Motorola
Motorola, Inc. () was an American multinational telecommunications company based in Schaumburg, Illinois. It was founded by brothers Paul and Joseph Galvin in 1928 and had been named Motorola since 1947. Many of Motorola's products had been ...
, rooting can void one's warranty.
* If used incorrectly, rooting can cause stability issues with the software or hardware. If the issues are purely software-based, unrooting the phone can often resolve these issues.
* Certain devices, including those from
Huawei
Huawei Technologies Co., Ltd. ("Huawei" sometimes stylized as "HUAWEI"; ; zh, c=华为, p= ) is a Chinese multinational corporationtechnology company in Longgang, Shenzhen, Longgang, Shenzhen, Guangdong. Its main product lines include teleco ...
and any brand sold by
Verizon
Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
cannot easily be rooted, unless a
privilege escalation
Privilege escalation is the act of exploiting a Software bug, bug, a Product defect, design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resource (computer science), resources that ar ...
exploit is found in the device's operating system version.
* Android
SafetyNet
SafetyNet consists of several application programming interfaces (APIs) offered by the Google Play Services to support security sensitive applications and enforce DRM. Currently, these APIs include device integrity verification, app verification, ...
API is tripped so some apps will not work or won't be shown on the Play Store.
Related concepts
Rooting allows the user to obtain privileged access to a phone. It does not allow a user to install a new OS (
custom firmware
Custom firmware, also known as aftermarket firmware, is an unofficial new or modified version of firmware created by third parties on devices such as video game consoles, mobile phones, and various embedded system, embedded device types to provide ...
or custom
ROM
Rom, or ROM may refer to:
Biomechanics and medicine
* Risk of mortality, a medical classification to estimate the likelihood of death for a patient
* Rupture of membranes, a term used during pregnancy to describe a rupture of the amniotic sac
* ...
) or recovery image, and it doesn't allow a phone that is locked to a certain carrier to be used on another one. Related operations allow these.
Bootloader unlock
Bootloader unlocking is sometimes a first step used to root the device; however, it is not the same as rooting the device.
Most devices come with a locked bootloader, which prevents users from installing a new boot image, which is often flashed when rooting a device or using a custom ROM. The bootloader runs on device start-up and is in charge of loading the operating system on the phone. It is generally in charge of verifying that phone system information hasn't been tampered with and is genuine. Nonetheless, people still perform this operation, as unlocking the bootloader allows users to install custom ROMs.
The first step to do this is to generally to set up OEM unlocking, and then to follow manufacturer specific instructions.
Not all devices can be bootloader unlocked, and some can only be unlocked with an exploit which usually needs a
privilege escalation
Privilege escalation is the act of exploiting a Software bug, bug, a Product defect, design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resource (computer science), resources that ar ...
bug in order to remove software locks, which includes most
LG V20 models and
Verizon
Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
-sold
Google Pixel
Google Pixel is a brand of portable Consumer electronics, consumer electronic devices developed by Google that run either ChromeOS or the Pixel version of the Android (operating system), Android operating system. The main line of Pixel products ...
devices.
The process of unlocking the bootloader might involve a factory reset, erasing all user data, third-party applications, and configuration.
SIM unlock
SIM unlocking allows a phone that is locked to a certain carrier to be used on a different carrier. The instructions vary per device and carrier, but this might be done by first requesting the carrier to unlock the phone or purchasing an unlock code online.
Methods
Some rooting methods involve the use of a
command prompt
A command-line interface (CLI) is a means of interacting with software via commands each formatted as a line of text. Command-line interfaces emerged in the mid-1960s, on computer terminals, as an interactive and more user-friendly alternativ ...
and a development interface called the
Android Debug Bridge (also known as ADB), while other methods may use existing vulnerabilities in devices. Due to similarly modeled devices often having a multitude of changes, rooting methods for one device when used for a different variant can result in
bricking
A brick (or bricked device) is a mobile device
A mobile device or handheld device is a computer small enough to hold and operate in hand. Mobile devices are typically battery-powered and possess a flat-panel display and one or more built-i ...
the device.
"Systemless root" is a variant of rooting in which the underlying device file system is not modified. Systemless root uses various techniques to gain root access without modifying the system
partition of a device. Some root applications may include a "hiding" function, which makes attempts to mask the effects and results of rooting, often by whitelisting certain applications for the root or blocking access to affected files. Systemless rooting has the advantage of not triggering the software-based version of
SafetyNet
SafetyNet consists of several application programming interfaces (APIs) offered by the Google Play Services to support security sensitive applications and enforce DRM. Currently, these APIs include device integrity verification, app verification, ...
, an Android feature that works by monitoring changes to system files and is used by applications such as Google Pay to detect whether a device has been tampered with such as by rooting. However, hardware-backed SafetyNet versions may be triggered by systemless rooting, as well as in unrooted devices shipped without
Google Mobile Services (GMS).
The distinction between "soft rooting" through a security vulnerability and "hard-rooting" by
flashing a
su
binary
Binary may refer to:
Science and technology Mathematics
* Binary number, a representation of numbers using only two values (0 and 1) for each digit
* Binary function, a function that takes two arguments
* Binary operation, a mathematical op ...
executable varies from exploit to exploit, and manufacturer to manufacturer. Soft-rooting requires that a device be vulnerable to
privilege escalation
Privilege escalation is the act of exploiting a Software bug, bug, a Product defect, design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resource (computer science), resources that ar ...
, or replacing executable binaries. Hard-rooting is supported by the manufacturer, and it is generally only exposed for devices the manufacturer allows.
If a phone can be soft-rooted, it is also inherently vulnerable to malware.
Rooting through exploits
The process of rooting varies widely by manufacturer and device but sometimes includes
exploiting one or more security bugs in the firmware (i.e., in the version of the Android OS installed on) of the device.
Once an exploit is discovered, a custom recovery image that will skip the
digital signature check of firmware updates can be flashed. Then a modified firmware update that typically includes the utilities needed to run apps as root can be installed. For example, the
su
binary (such as an open-source one paired with the Superuser or SuperSU application) can be copied to a location in the current process'
PATH
A path is a route for physical travel – see Trail.
Path or PATH may also refer to:
Physical paths of different types
* Bicycle path
* Bridle path, used by people on horseback
* Course (navigation), the intended path of a vehicle
* Desir ...
(e.g.,
/system/xbin/
) and granted executable permissions with the
chmod
is a shell command for changing access permissions and special mode flags of files (including special files such as directories). The name is short for ''change mode'' where ''mode'' refers to the permissions and flags collectively.
The co ...
command. A third-party supervisor application, like Superuser or SuperSU, can then regulate and log elevated permission requests from other applications. Many guides, tutorials, and automatic processes exist for popular Android devices facilitating a fast and easy rooting process.
The process of rooting a device may be simple or complex, and it even may depend upon serendipity. For example, shortly after the release of the HTC Dream (HTC G1), it was discovered that anything typed using the keyboard was being interpreted as a command in a privileged (root) shell. Although Google quickly released a patch to fix this, a signed image of the old firmware leaked, which gave users the ability to downgrade and use the original exploit to gain root access. Installable apps have managed to unlock immediate root access on some early 2010s Samsung smartphones. This has also been referred to as "one-click rooting".
A security researcher, Grant Hernandez, demonstrated a use-after-free exploit in Binder, Android's IPC framework, to gain
root privileges. This exploit, tagged CVE-2019-2215, was alleged to be sold by the
NSO Group
NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company's founders) is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance ...
.
Rooting through manufacturer
Some manufacturers, including
OnePlus and
Motorola
Motorola, Inc. () was an American multinational telecommunications company based in Schaumburg, Illinois. It was founded by brothers Paul and Joseph Galvin in 1928 and had been named Motorola since 1947. Many of Motorola's products had been ...
, provide official support for unlocking the bootloader, allowing for rooting without exploiting a vulnerability. However, the support may be limited only to certain phones – for example,
LG released its bootloader unlock tool only for certain models of its phones. Also, a manufacturer could discontinue bootloader unlocking support, as was the case with LG and
Huawei
Huawei Technologies Co., Ltd. ("Huawei" sometimes stylized as "HUAWEI"; ; zh, c=华为, p= ) is a Chinese multinational corporationtechnology company in Longgang, Shenzhen, Longgang, Shenzhen, Guangdong. Its main product lines include teleco ...
.
The
Google Nexus
Google Nexus is a discontinued line of consumer electronic mobile devices that ran a stock version of the Android (operating system), Android operating system. Google managed the design, development, marketing, and support of these devices, but ...
and
Pixel
In digital imaging, a pixel (abbreviated px), pel, or picture element is the smallest addressable element in a Raster graphics, raster image, or the smallest addressable element in a dot matrix display device. In most digital display devices, p ...
line of devices can have their bootloader unlocked by simply connecting the device to a computer while in bootloader mode and running the
Fastboot protocol with the command
fastboot oem unlock
on older devices, or
fastboot flashing unlock
on newer devices. After a warning is accepted, the bootloader is unlocked, so a new system image can be written directly to flash without the need for an exploit. Additionally, Pixel phones sold via certain carriers like
Verizon
Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
disallow bootloader unlocking, while others such as
T-Mobile T-Mobile is the brand of telecommunications by Deutsche Telekom
Deutsche Telekom AG (, ; often just Telekom, DTAG or DT; stylised as ·T·) is a partially state-owned German telecommunications company headquartered in Bonn and the largest telec ...
require a phone to be paid off and SIM unlocked before the bootloader can be unlocked.
Difficulties
In the past, many manufacturers have tried to make non-rootable phones with more elaborate protections (like the
Droid X), but exploits are usually still found eventually. There may be no root exploit available for new, or outdated phones.
Industry reaction
Until 2010, tablet and smartphone manufacturers, as well as mobile carriers, were mainly unsupportive of third-party firmware development. Manufacturers had expressed concern about improper functioning of devices running unofficial software
and related support costs. Moreover, firmware such as
OmniROM and
CyanogenMod sometimes offer features for which carriers would otherwise charge a premium, such as
tethering
Tethering or phone-as-modem (PAM) is the sharing of a mobile device's cellular data connection with other connected computers. It effectively turns the transmitting device into a modem to allow others to use its cellular network as a gateway for ...
. Due to that, technical obstacles such as locked bootloaders and restricted access to root permissions have commonly been introduced in many devices. For example, in late December 2011,
Barnes & Noble
Barnes & Noble Booksellers is an American bookseller with the largest number of retail outlets in the United States. The company operates approximately 600 retail stores across the United States.
Barnes & Noble operates mainly through its B ...
and
Amazon.com, Inc. began pushing automatic,
over-the-air firmware updates, 1.4.1 to
Nook Tablets and 6.2.1 to Kindle Fires, that removed one method to gain root access to the devices. The Nook Tablet 1.4.1 update also removed users' ability to
sideload
Sideloading describes the process of transferring files between two local devices, in particular between a personal computer and a mobile device such as a mobile phone, smartphone, PDA, tablet, portable media player or e-reader.
Sideloading ty ...
apps from sources other than the official Barnes & Noble app store (without
modding
Modding (from "modifying") is the act of modifying hardware, software, or anything else to perform a function not originally intended by the designer, or to achieve bespoke specification or appearance. The term is often used in reference to vid ...
).
However, as community-developed software began to grow popular in the late 2009 to early 2010, and following a statement by the Copyright Office and Librarian of Congress (US) allowing the use of "jailbroken" mobile devices, manufacturers and carriers have softened their position regarding CyanogenMod and other unofficial firmware distributions. Some manufacturers, including HTC,
Samsung
Samsung Group (; stylised as SΛMSUNG) is a South Korean Multinational corporation, multinational manufacturing Conglomerate (company), conglomerate headquartered in the Samsung Town office complex in Seoul. The group consists of numerous a ...
,
Motorola
Motorola, Inc. () was an American multinational telecommunications company based in Schaumburg, Illinois. It was founded by brothers Paul and Joseph Galvin in 1928 and had been named Motorola since 1947. Many of Motorola's products had been ...
and
Sony
is a Japanese multinational conglomerate (company), conglomerate headquartered at Sony City in Minato, Tokyo, Japan. The Sony Group encompasses various businesses, including Sony Corporation (electronics), Sony Semiconductor Solutions (i ...
, actively provide support and encourage development.
In 2011, the need to circumvent hardware restrictions to install unofficial firmware lessened as an increasing number of devices shipped with unlocked or unlockable bootloaders, similar to the Nexus and Pixel series of phones. Device manufacturer HTC has announced that it will support aftermarket software developers by making the bootloaders of all new devices unlockable.
In 2014, Samsung released a security feature called
Knox, which verifies whether system and boot files were modified. If custom firmware was flashed, the eFuse is set to 0x1, permanently voiding the warranty and disabling Knox-enabled features such as
Samsung Pay
Samsung Pay (stylized as SΛMSUNG Pay) is a mobile payment and digital wallet service, operated by the South Korean company Samsung Electronics. It lets users make payments using compatible smartphones and other Samsung-produced devices, accesse ...
. Additionally, certain Samsung devices lack the ability to flash custom software, namely Samsung phones and tablets released in North America after 2015, with an exception for devices lacking a cellular modem, although there are exploits that can unlock the bootloader on some affected devices running older
One UI
One UI is a user interface (UI) developed by Samsung Electronics for its smart devices, including Android (operating system), Android devices from at least late 2016 or early 2017 running Android Pie, Android 9 (Pie) and later. Succeeding Samsu ...
versions.
Legality
International treaties have influenced the development of laws affecting rooting. The 1996
World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws against
digital rights management
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures, such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM ...
(DRM) circumvention. The American implementation is the
Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
(DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as rooting. The 2001
European Copyright Directive implemented the treaty in Europe, requiring member states of the
European Union
The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as to run alternative software,
but member states vary on the implementation of the directive.
Australia
In 2010,
Electronic Frontiers Australia
Electronic Frontiers Australia Inc. (EFA) is a non-profit Australian national non-government organisation representing Internet users concerned with online liberties and rights. It has been vocal on the issue of Internet censorship in Australia ...
said that it is unclear whether rooting is legal in Australia, and that anti-circumvention laws may apply. These laws were strengthened by the
Copyright Amendment Act 2006.
Canada
In November 2012, Canada
amended its Copyright Act with new provisions prohibiting tampering with digital locks, with exceptions including software interoperability. Rooting a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.
There had been several efforts from 2008 to 2011 to amend the Copyright Act (Bill C-60,
Bill C-61, and
Bill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive, but those bills were set aside. In 2011,
Michael Geist
Michael Allen Geist is a Canadian academic, and the Canada Research Chair in Internet and E-Commerce Law at the University of Ottawa.
He is the editor of four books on copyright law and privacy law,
and he edits two newsletters on Canadian infor ...
, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly broad Copyright Act amendments could prohibit.
European Union
The
Free Software Foundation Europe
The Free Software Foundation Europe e.V. (FSFE) is an organization that supports free software and all aspects of the free software movement in Europe, with registered chapters in several European countries. It is a registered voluntary associat ...
argues that it is legal to root or flash any device. According to the European Directive 1999/44/EC, replacing the original operating system with another does not void the statutory warranty that covers the hardware of the device for two years unless the seller can prove that the modification caused the defect.
United Kingdom
The law
Copyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Rooting may be a form of circumvention covered by that law, but this has not been tested in court.
Competition laws may also be relevant.
India
India's copyright law permits circumventing DRM for non-copyright-infringing purposes.
Indian Parliament
The Parliament of India (ISO: ) is the supreme legislative body of the Government of the Republic of India. It is a bicameral legislature composed of the Rajya Sabha (Council of States) and the Lok Sabha (House of the People). The President o ...
introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012. India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the US
Special 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.
New Zealand
New Zealand's copyright law allows the circumvention of technological protection measure (TPM) as long as the use is for legal, non-copyright-infringing purposes. This law was added to the
Copyright Act 1994
The Copyright Act 1994 is an Act of Parliament passed in New Zealand that, along with its various amendments, governs copyright in New Zealand. It is administered by Intellectual Property Policy Unit of the Ministry of Business, Innovation and ...
as part of the
Copyright (New Technologies) Amendment Act 2008
The Copyright (New Technologies) Amendment Act 2008 was an act passed by the New Zealand Parliament amending the Copyright Act 1994. It received Royal Assent on 11 April 2008.
Background
In 2001, the Ministry of Economic Development initiate ...
.
Singapore
Rooting might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.
United States
The
Unlocking Consumer Choice and Wireless Competition Act
The Unlocking Consumer Choice and Wireless Competition Act (; ) is a United States public law that repeals a rulemaking determination by the United States Copyright Office that left it illegal for people to unlock their cellphones.
The bill pas ...
guarantees that consumers can unlock or let others unlock their phones. Under the Digital Millennium Copyright Act (DMCA) rooting was illegal in the United States except by exemption. The
U.S. Copyright Office granted an exemption to this law "at least through 2015".
In 2010, in response to a request by the
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit rooting. In their ruling, the Library of Congress affirmed on July 26, 2010, that rooting is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.
On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of
awfully obtained softwareapplications with computer programs on the telephone handset". However, the U.S. Copyright office refused to extend this exemption to tablets, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.
The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.
Tim Wu
Timothy Shiou-Ming Wu (born 1971 or 1972) is a Taiwanese-American legal scholar who served as Special Assistant to the President for Technology and Competition Policy at the United States from 2021 to 2023. He is also a professor of law at Colum ...
, a professor at
Columbia Law School
Columbia Law School (CLS) is the Law school in the United States, law school of Columbia University, a Private university, private Ivy League university in New York City.
The school was founded in 1858 as the Columbia College Law School. The un ...
, argued in 2007 that jailbreaking is "legal, ethical, and just plain fun".
Wu cited an explicit exemption issued by the
Library of Congress
The Library of Congress (LOC) is a research library in Washington, D.C., serving as the library and research service for the United States Congress and the ''de facto'' national library of the United States. It also administers Copyright law o ...
in 2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA. Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.
In 2010 and 2012, the U.S. Copyright Office approved exemptions to the DMCA that allow users to root their devices legally.
It is still possible to employ technical countermeasures to prevent rooting or prevent rooted phones from functioning.
It is also unclear whether it is legal to traffic in the tools used to make rooting easy.
See also
*
Android Dev Phone
*
Hacking of consumer electronics
The hacking of consumer electronics is a common practice that users perform to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer, programming, and elect ...
*
List of custom Android distributions
Notes
References
{{Mobile phones
Android (operating system)
Hardware restrictions