Rooting a Pixel 2 with Magisk from an untrusted app using CVE-2019-2215, no OEM unlock neededpic.twitter.com/yGovBluQj5
-
-
Thank for reply. One more question about SELinux. As i know - fresh Android allows load SE policies only for init context. Possible context transitions also very limited. Magisk relies on prepatched SE policy DB inside initrd. How you manage this prerequisite ?
-
magisk is able to inject rules into a live system too. But for the moment my PoC leaves SELinux disabled
Kraj razgovora
Novi razgovor -
-
-
to be fair, this is really the safer workflow. temp root, do the needful, then reboot to remove the security hole you created.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.