this post was submitted on 13 Aug 2023
733 points (93.5% liked)
Memes
45741 readers
2574 users here now
Rules:
- Be civil and nice.
- Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I guess if you don't know what a rootkit is it could seem like one.
This is the calmest, most insulting thing you could have possibly said.
Thanks, often that's what I'm going for.
Yeah. This meme makes no sense..
Let's avoid misinforming people please. The reality is bad enough, no need to start lying and deceiving
Memes can still inform (and misinform)
Yes specially if people don't know what a rootkit is. They'll think "ah, so this is an example of a rootkit, it must be because it is upvoted a lot, nice meme *upvotes"
But the meme has the right intention. Google WILL deploy a rootkit to make it make sense
I am painfully aware
Not fully, without affecting stability
Stock roms may not play well with microG signature spoofing :P
Which phone?
Which android version?
It should be supported by magisk I think
It's actually riskier with a custom recovery since it's not officially supported by the root solution developer(magisk in this case)
You can, with fastboot
If you have a mediatek device, there's sp flash tool
Btw you got some gsi potential
While WEI definitely doesn’t qualify as a rootkit itself, any useful attester is going to require aspects of one - whether it’s a phone asserting that it hasn’t been rooted, or a PC running with approved SecureBoot and TPM keys.
That's still not a rootkit. What do people think rootkits are?
Sure it is. A rootkit is a mechanism for hooking access to highly privileged execution levels of a device, masking its own presence, and persisting itself against removal. TPM + SecureBoot runs in firmware, more privileged than kernel mode. It analyzes the bootloader and other key boot parameters to verify they have not been tampered with. They can’t be disabled from within the OS. And sometimes they can’t be removed or disabled at all without someone finding a vulnerability, as in the case with phone rooting.
Great, but using the TPM as intended is not a rootkit or anything like a rootkit. It's using a security device as intended.
Although often associated with it, a rootkit does not inherently need to be malware. In the case of phones, and likely future PCs, they are used to prevent users and owners from modifying their device.
There’s no way to say this one way or the other until it’s implemented.
However to “verify” a system from a hardware level to any decent level of accuracy would require kernel level access.
Technically you’re correct, until you’re not.
That's still not what a rootkit is. Lol