Home ยป Are there any risks to rooting a device?

Are there any risks to rooting a device?

Solutons:


Does it have the potential to brick the device?

Although it has become relatively simple on the Droid, some methods of rooting pose more risk than others. So in short yes there is a potential.

Will it void my warranty?

It mostly depends on where you live and on your manufacturer (and their warranty policies). But technically this does void your warranty in most cases.

Will I stop getting updates?

Again this depends. Some manufacturer provide updates for rooted devices while others do not. These will usually continue to come in and may unroot your phone if you install them, or even require you to unroot manually before you can receive their updates. If you install a third party ROM, then there’s nothing else to do with your original manufacturer.

Will the cops show up at my front door the next day?

I certainly hope not ๐Ÿ™‚ but if rooting involves cracking a bootloader, it could theoretically get you in legal trouble in some jurisdictions (anti-circumvention laws, etc.)

EDIT: Also be aware that there are different root methods based on which current build you are running.

EDIT: It may (as of May 24, 2017) prevent you from installing some apps: Google Play can now prevent rooted users from downloading certain apps

Does it have the potential to brick the device?

Yes, it is possible to brick your phone, but should be very unlikely. Usually there is a way out of even what seems to be a brick.

If you do not know what you are doing and want to use the ADB method (entering shell commands manually) to root your phone, then be sure to follow all of the directions exactly as listed. If you somehow brick your phone, then it does not matter how good your phone insurance is with your cell provider; if they find out you rooted or attempted to, they will not fix it.

If you do somehow brick your phone, then do not panic. Try these things:

  1. Post a thread to where you downloaded the root program or where the root method was posted.
  2. Post to XDA under their questions and answers section.
  3. Search the web. Someone else has probably had the same problem as you.

It is quite possible to unbrick your phone, but it will take some time and patience to sort it out.

Will it void my warranty?

Yes. But in most cases you can restore your phone to a condition that they’ll never know that you rooted your phone. And sometimes they do not even check to see if you rooted your phone when you return it.

Will I stop getting updates?

Yes and no. If you flash a rom, yes. But most likely that rom has constant updates (such as CyanogenMod). Also if you root and keep stock rom, you will still get OTA update notifications (but running an update will un-root your phone).

Anything else I should be aware of?

May the force be with you. No, really, it’s a relatively painless process with a lot of these “easy one touch (un)root tools” and even then there is a plethora of guides and help from XDA to guide you and troubleshoot any problems you might have. But if you are happy with your phone just the way it is, then don’t root.

Rooted phones are just as secure as an unrooted phones if you never grant root permission to any apps. The problem is that if you root your phone, you’re bound to give root permission (otherwise, why are you rooting your phone in the first place), and applications that you give root permission may turned out to be rogue or leak their permission to allow an untrusted applications to gain root-like permission.

Running rooted phone is safe as long as you know which app to give root access and which are not. Problem is, even assuming that you only pick trustworthy apps they still can leak permissions inadvertantly (in security parlance, this is called confused deputy problem), so you must really be careful when choosing trusted apps.

Related Solutions

How do I reset a lost administrative password?

By default the first user's account is an administrative account, so if the UI is prompting you for a password it's probably that person's user password. If the user doesn't remember their password you need to reset it. To do this you need to boot into recovery...

How can I use environment variables in Nginx.conf

From the official Nginx docker file: Using environment variables in nginx configuration: Out-of-the-box, Nginx doesn't support using environment variables inside most configuration blocks. But envsubst may be used as a workaround if you need to generate your...

Difference between .bashrc and .bash_profile

Traditionally, when you log into a Unix system, the system would start one program for you. That program is a shell, i.e., a program designed to start other programs. It's a command line shell: you start another program by typing its name. The default shell, a...

Custom query with Castle ActiveRecord

In this case what you want is HqlBasedQuery. Your query will be a projection, so what you'll get back will be an ArrayList of tuples containing the results (the content of each element of the ArrayList will depend on the query, but for more than one value will...

What is the “You have new mail” message in Linux/UNIX?

Where is this mail? It's likely to be in the spool file: /var/mail/$USER or /var/spool/mail/$USER are the most common locations on Linux and BSD. (Other locations are possible โ€“ check if $MAIL is set โ€“ but by default, the system only informs you about...

How can I find the implementations of Linux kernel system calls?

System calls aren't handled like regular function calls. It takes special code to make the transition from user space to kernel space, basically a bit of inline assembly code injected into your program at the call site. The kernel side code that "catches" the...

Is a composite index also good for queries on the first field?

It certainly is. We discussed that in great detail under this related question: Working of indexes in PostgreSQL Space is allocated in multiples of MAXALIGN, which is typically 8 bytes on a 64-bit OS or (much less common) 4 bytes on a 32-bit OS. If you are not...

Explaining computational complexity theory

Hoooo, doctoral comp flashback. Okay, here goes. We start with the idea of a decision problem, a problem for which an algorithm can always answer "yes" or "no." We also need the idea of two models of computer (Turing machine, really): deterministic and...

Building a multi-level menu for umbraco

First off, no need pass the a parent parameter around. The context will transport this information. Here is the XSL stylesheet that should solve your problem: <!-- update this variable on how deep your menu should be --> <xsl:variable...

How to generate a random string?

My favorite way to do it is by using /dev/urandom together with tr to delete unwanted characters. For instance, to get only digits and letters: tr -dc A-Za-z0-9 </dev/urandom | head -c 13 ; echo '' Alternatively, to include more characters from the OWASP...

How to copy a file from a remote server to a local machine?

The syntax for scp is: If you are on the computer from which you want to send file to a remote computer: scp /file/to/send username@remote:/where/to/put Here the remote can be a FQDN or an IP address. On the other hand if you are on the computer wanting to...

What is the difference between curl and wget?

The main differences are: wget's major strong side compared to curl is its ability to download recursively. wget is command line only. There's no lib or anything, but curl's features are powered by libcurl. curl supports FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP,...

Using ‘sed’ to find and replace [duplicate]

sed is the stream editor, in that you can use | (pipe) to send standard streams (STDIN and STDOUT specifically) through sed and alter them programmatically on the fly, making it a handy tool in the Unix philosophy tradition; but can edit files directly, too,...

How do I loop through only directories in bash?

You can specify a slash at the end to match only directories: for d in */ ; do echo "$d" done If you want to exclude symlinks, use a test to continue the loop if the current entry is a link. You need to remove the trailing slash from the name in order for -L to...

How to clear journalctl

The self maintenance method is to vacuum the logs by size or time. Retain only the past two days: journalctl --vacuum-time=2d Retain only the past 500 MB: journalctl --vacuum-size=500M man journalctl for more information. You don't typically clear the journal...

How can I run a command which will survive terminal close?

One of the following 2 should work: $ nohup redshift & or $ redshift & $ disown See the following for a bit more information on how this works: man nohup help disown Difference between nohup, disown and & (be sure to read the comments too) If your...