• Successful_Try543@feddit.org
      link
      fedilink
      arrow-up
      16
      ·
      8 hours ago

      There usually isn’t a su binary installed on non-rooted Androids. If you’re rooting it yourself anyways, there’s no need to use the exploit.

      • Maki@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        2
        ·
        8 hours ago

        I’m not as smart as the people who make alternative android options. I was just hoping it would help them jailbreak more of goggle’s bullshit so customers actually have a choice to go for an android OS which respects them and their privacy.

          • Lucy :3@feddit.org
            link
            fedilink
            arrow-up
            1
            ·
            3 hours ago

            Aww dang it

            Well ok who tf cares I can literally just connect to adb over localhost with termux and do adb root

          • Scoopta@programming.dev
            link
            fedilink
            arrow-up
            13
            ·
            7 hours ago

            SELinux breaks a lot of android root exploits, way back in the day even dirty cow didn’t work. It would get you “root” but not actually the full perms because of SELinux. Really good testament to the added security of MAC, it’s one of the reasons I run apparmor on my systems

      • lime!@feddit.nu
        link
        fedilink
        arrow-up
        7
        ·
        5 hours ago

        you’d only need to change the payload part, which is a compiled x86 ELF header.