login about faq

To prove you're not a spammer, email newuser.lgqa@gmail.com with the subject "Account Request" to request an account.


I'm getting a nexus 7 and am wondering if there is any point in rooting it? I understand what it does and what it allows me to do but I can't seem to find any actual benefits of having root access. Like what sort of apps need root access?

If you think i should root my nexus then how do you do it? Any tips?

asked Dec 21 '12 at 18:50

Zorbeen98's gravatar image

Zorbeen98
311879197


xda developers has good info on rooting android devices.

http://forum.xda-developers.com/forumdisplay.php?f=1677

the nexus 7 gains a major performance boost when overclocked.

answered Dec 22 '12 at 11:04

Razor512's gravatar image

Razor512
16.5k3683259

I would recommend that you DO NOT root it. You can gain some nice features but leave yourself open for malware, no software can protect you, so security will be really lacking.

answered Dec 21 '12 at 19:46

trueb's gravatar image

trueb
16.1k54105269

1

You have to manually approve all apps that request root access, so long as you know what you're doing security will be fine.

(Dec 21 '12 at 21:04) Zbob750 Zbob750's gravatar image
1

Not too worried about security, never had a problem with malware before. I think as long as you do your research before you just go downloading stuff then you'll be okay.

(Dec 22 '12 at 07:55) Zorbeen98 Zorbeen98's gravatar image

That is a very common but ignorant mindset, who is to say you have to download anything to get infected? Look at the CodeRed Virus from 2001, you did not have to download anything it just infected you.

You cannot apply your current knowledge of what security is like today, to defend against all possible future attacks. It is like saying last time crossed the street I did not get hit, so therefore if I do it again I wont be hit.

Who is to say the applications you install and give root access to does not (inadvertently) allow someone into your system. If someone can get into your system with an application asking for root access, then they themselves have root access.

Who is also to say that there is not away around the permissions?

A whole chain's strength can be reduced by 1 weak link. Same with security, attackers only have to find 1 way to get in, you have to defend against all ways to get in because once they are in, they can open up more doors.

By not rooting your phone, you drastically reduce the chances of this happening.

(Dec 22 '12 at 11:40) trueb trueb's gravatar image
1

By rooting your phone you can also fix exploits that otherwise cannot be changed by the user. The Exynos Exploit is a good example of this.

No stock phone ROM is truly secure, that's how this software gets access to the protected areas of the phone storage, by rooting you can actually fix these issues (usually) so you are sometimes actually more secure by rooting then you are leaving it unrooted.

(Dec 22 '12 at 15:12) Zbob750 Zbob750's gravatar image

that's just it, you can fix exploits, yes, but you have to know about them first. there are so many more that you do not know about, quite frankly, the good guys are loosing at cyber warfare, we will always be one or more step(s) behind, Hell you still hear about buffer overflow attacks, we have not fixed that one, and new ones pop up all over the place.

By not rooting a phone you make it a lot harder for them to gain the access to a root level privileged.

(Dec 22 '12 at 15:58) trueb trueb's gravatar image
1

due to the way android handles root access, you are at no more risk of encountering an infection that requires no user action than you are with a locked device.

the only ones that you are at additional risk for are the social engineering ones, which most people who understand how to root, will not fall for.

Eg don't install something promising to give you a free ipod.

You can be safer on a rooted device than with a locked one as we all know many companies are slow to release android updates and after a year or 2 you are unlikely to ever get an update.

For example most people still use android 2.x, since android 2.x came out there have been a massive number of security certificates that have been revokes but are still trusted by those older devices and thus a malicious user can still make a fake paypal or other bank site and sign it with those revoked certificates and those android users will not get any security warnings.

android releases such as cyanogenmod will include major security updates in their builds, even if they don't push you to the latest android OS, they will still port the security updates over. (if you want to know unsafe, try using an outdated OS that is no longer getting security updates)

(PS the first google android device is still getting updates from the open source community many years after google dropped support)

(Dec 22 '12 at 16:04) Razor512 Razor512's gravatar image

Most phones that are rootable have software exploits. That's quite literally how most phones are rooted. I will always take and recommend that people root the phone themselves, then fix the issue themselves, then have a malicious app root the phone, take over, and do what it pleases.

If I root the phone things are almost always on my terms, if the malicious app does it, things are not under your control. Doing it preemptively is the most secure solution to any phone with a root exploit (most of them).

(Dec 22 '12 at 16:40) Zbob750 Zbob750's gravatar image
showing 5 of 7 show all
Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or __italic__
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported


Join Us in the Chat Room

Tags:

×590
×84
×25

Asked: Dec 21 '12 at 18:50

Seen: 848 times

Last updated: Dec 22 '12 at 16:40