I have just created a secondary user however I am unable to get root access. Titanium Backup just says that it failed to acquire root. Main user has root with no issues.
Any ideas? Thanks.
*Bump*
Yes, the idea is: wait until Chainfire (or someone else) figured it out. Root is currently only possible on the tablet owner profile. Check SuperSU on the Play Store for the same information.
Related
I have rooted my wildfire with revoked3. right now whatever I use a root app, it will prompt me to provide access to root EVERYTIME it needs to accesss the root. I have checked "remember" but it doesn't seem to work against it.
When I use titanium backup, it keeps on pop up root request for me to accept. It's getting a bit annoying. Please help, thanks!
I have a stock N7 with 4.2.1 and rooted. Everything works OK in terms of rooted apps (SuperUser, SU, Titanium, etc.)
I setup a 2nd user account (Jellybean multi-user account function) and that works OK too.
However, when I login to the N7 as the 2nd user account, all root function is disabled. SuperUser is still there, but any apps requiring root like Titanium Backup no longer works.
Is there any way I can get the 2nd user account root access?
Looks like ChainSDD's Superuser 3.3 supports multiuser root function, found this over in the Nexus 10 forum:
http://forum.xda-developers.com/showthread.php?p=35562818
Can anyone confirm this?
we can continue here I guess http://forum.xda-developers.com/showthread.php?t=2042605
I followed the rooting guide and rooted my new Nexus 4 phone. But when I looking for apps to install on a rooted phone, I stumbled upon a blog post that said that rooting is a huge security risk that allows any installed application to gain root privilege. Is this correct? Is there anything special that I must do to secure root access? I already have SuperSU (free) installed.
The simple answer is that you're already fairly secure with SuperSU or SuperUser. The reality is a bit more complicated though. SuperSU (and SuperUser) are designed to prompt you to provide access to any applications that request root. Any application that 1) does not request root access or 2) is denied root access by the user when prompted, will not have access to root privileges. In theory, I imagine an application could find some obscure exploit in the SuperSU code and get around the access blocking provided by SuperSU, but I think that is fairly unlikely and would be patched quickly after the exploit was found.
As long as you're careful about what you provide root access to (and only provide root access to apps that you think need root, not every app that you think you trust that asks for access) then you should be fine.
raptir said:
The simple answer is that you're already fairly secure with SuperSU or SuperUser. The reality is a bit more complicated though. SuperSU (and SuperUser) are designed to prompt you to provide access to any applications that request root. Any application that 1) does not request root access or 2) is denied root access by the user when prompted, will not have access to root privileges. In theory, I imagine an application could find some obscure exploit in the SuperSU code and get around the access blocking provided by SuperSU, but I think that is fairly unlikely and would be patched quickly after the exploit was found.
As long as you're careful about what you provide root access to (and only provide root access to apps that you think need root, not every app that you think you trust that asks for access) then you should be fine.
Click to expand...
Click to collapse
Thanks raptir. I have one more question. Now that I have rooted the phone, can I block the su binary and enable it only when I need to provide another application with root access? If I do that, will the already approved applications too loose root access?
You could completely unroot the phone which would require you to go through the rooting process again. You could also use a "temp unroot" option like Voodoo OTA Rootkeeper allows, but it wouldn't add anything to security since all it does is move the su binary, not disable it completely. A malicious app could still be written to move the binary back to the proper location.
JoyceBabu said:
Thanks raptir. I have one more question. Now that I have rooted the phone, can I block the su binary and enable it only when I need to provide another application with root access? If I do that, will the already approved applications too loose root access?
Click to expand...
Click to collapse
You can go into SuperSU or SuperUser app and remove "root" access to any apps you have granted "root" to.
baseballfanz said:
You can go into SuperSU or SuperUser app and remove "root" access to any apps you have granted "root" to.
Click to expand...
Click to collapse
Actually, my question was not that. I wanted to retain root access for the apps that I have already given. But no new app should be able to get root access, so that a malicious app will not exploit any security vulnerability of SuperSU as raptir mentioned.
JoyceBabu said:
Actually, my question was not that. I wanted to retain root access for the apps that I have already given. But no new app should be able to get root access, so that a malicious app will not exploit any security vulnerability of SuperSU as raptir mentioned.
Click to expand...
Click to collapse
Gotcha! Any new app will ask for root permission. You can deny them.
Yeah, I threw that part in about the potential for an app to circumvent the security just as a disclaimer. As far as I know it has never happened, and it may not even be possible.
Hello to everyone,
I own a Galaxy S5 G900F, (Unlocked Variant).
I have downloaded and installed LOLLIPOP AMBASADII.ODEX.V6.1 ROM with Aroma Installer and I am using Amplitude Kernel.
The rom came pre-rooted, with SuperSU Installed. I Only updated the app from the PlayStore. The program DID NOT prompt me for Binaries Update. I also have BusyBox installed.
When I check the root status with Root Checker, it says Success, which means there is root permission. Also, I checked it with Platinum Backup, and it also gives permission for root access. Finally, I downloaded a Root Browser, and that works fine as well.
The problem is with value-changing apps like game killer, game cih, haXplorer and game guardian. Although they prompt me to give permissions, and I chose "allow", none of them is able to work.
In game killer, it says "root privilage is needed"
In haXplorer, as soon as I open it is says "shutdown"
In game guardian, the program auto closes instantly.
All the above issues have to do with proper root Access.
So, how is it possible for programs like FX File Explorer (root), titanium (root), root checker and others to have root access, while others don't?
I would really like your answer on this, as I am trying for one week to solve this issue with no results.
Thank you.
Once you get root access, it is sytem wide, not by app.
worf_1977 said:
Once you get root access, it is sytem wide, not by app.
Click to expand...
Click to collapse
Thank you for the reply. Yeah I know that, so what should be the problem?
Maybe you need an app to hide or cloak root status.
That such thing exists for Xposed framwork, but thus it is not comparible with 5.0 TW ROMs, you will have to downgrade back to 4.4.2 in order to use it.
Since we now have sort of root I wanted to have a thread where you guys could list all root apps you use and what they do.
When I used to root and do custom roms the apps I would use was adaway,root checker,sometimes titanium backup,and xposed with some tweaks.
The reason I made this thread and I hope someone else didn't make one if they did (mod close this) was to know which root apps you guys use with temp root (until we get perma root) which at this point I think we will have soon.
When I have time I can add lists of apps you guys use or suggest here in OP.
Thanks!
** List Of Apps :
Root Checker - Checks to make sure root works
Titanium Backup - Easy way of remove bloat apps
I was able to use AdAway/AdFree successfully, however on reboot the host file was reverted back.