Rooting a Pixel 2 with Magisk from an untrusted app using CVE-2019-2215, no OEM unlock neededpic.twitter.com/yGovBluQj5
It is only temp root, right ? Otherwise i don't understand how to deal with secure bootchain w/o OEM (i.e. bootloader) unlocking.
-
-
Yes it's temporary in the same way that today's iOS jailbreaks are
-
Thank for reply. One more question about SELinux. As i know - fresh Android allows load SE policies only for init context. Possible context transitions also very limited. Magisk relies on prepatched SE policy DB inside initrd. How you manage this prerequisite ?
- Još 1 odgovor
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.