2020-03-10 10:03:45

Rooted / jailbreak devices: what are the risks?

Rooted / jailbreak devices: what are the risks?

Rooted / jailbreak devices: what are the risks?

What is a rooted device?

Rooting devices, no matter what the operating system, usually means discovering a bug of some sort that lets you bypass internal protections and gain complete control over the operating system — to become the “root” user, who has all privileges and all access. Rooting on iOS devices is called “jailbreak,” as it allows the user to break out of constraints of the operating system.

Is rooting a device a security risk?

It is no secret that tooting disables some of the built-in security features of the operating system. Since today’s smartphones operate in an environment filled with threats from attackers, buggy or malicious applications - anything that reduces the internal controls in the operating system represents a higher risk.

Why we do not recommend using BTC-Alpha on rooted / jailbreak devices?

The rooted device makes it possible to permit programs to read data from other programs. This is a potential risk of user data leakage. However, the application does not recognize this leak. Therefore, we do not recommend using our programs on rooted or jailbreak devices.

Learn more

© 2020 BTC-ALPHA LTD , The Business Resource Network, 53 Whateleys Drive, Kenilworth, Warwickshire, United Kingdom© 2020 AlphaGlobal OU, Harju Maakond, Tallinn, Kesklinna linnaosa, Tornimae tn 7-132 10145
Server time: