• michaelmrose@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 months ago

    SU software has been a thing for about as long as android about 20 years or about. Has otherwise legitimate su been a source of unattended exploiting?

    The obvious risk factors are that users shall be tricked into granting inappropriate permissions to otherwise malicious or compromised software that they have deliberately installed. Outside of mobile platforms this is considered an acceptable risk that competent users can consistently successfully manage on their own hardware.

    In fact if you look at actual users even those with very limited technical know how the primary thing that

    The secondary risk is that users with no legit source of tools to root