Content deleted Content added
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5) (Ashune - 25071 |
m fix links |
||
Line 285:
The [[flash storage]] on Android devices is split into several partitions, such as <code>/system/</code> for the operating system itself, and <code>/data/</code> for user data and application installations.<ref>{{cite news |last=Raja |first=Haroon Q. |url=http://www.addictivetips.com/mobile/android-partitions-explained-boot-system-recovery-data-cache-misc/ |title=Android Partitions Explained: boot, system, recovery, data, cache & misc |newspaper=Addictivetips |publisher=Addictivetips.com |date=May 19, 2011 |access-date=September 15, 2012 |url-status=live |archive-url=https://web.archive.org/web/20120922024642/http://www.addictivetips.com/mobile/android-partitions-explained-boot-system-recovery-data-cache-misc/ |archive-date=September 22, 2012 }}</ref>
In contrast to typical [[desktop Linux]] distributions, Android device owners are not given [[superuser|root]] access to the operating system and sensitive partitions such as <code>/system/</code> are partially [[read-only memory|read-only]]. However, [[Filesystem Hierarchy Standard|root access]] can be obtained by exploiting [[Vulnerability (computing)|security flaws]] in Android, which is used frequently by the [[#Open-source community|open-source community]] to enhance the capabilities and customizability of their devices, but also by malicious parties to install [[computer virus|viruses]] and [[malware]].<ref>{{cite web |author=Jools Whitehorn |url=http://www.techradar.com/news/phone-and-communications/mobile-phones/android-malware-gives-itself-root-access-1062294 |title=Android malware gives itself root access | News |date=February 10, 2012 |publisher=TechRadar |access-date=September 15, 2012 |url-status=live |archive-url=https://web.archive.org/web/20120901170804/http://www.techradar.com/news/phone-and-communications/mobile-phones/android-malware-gives-itself-root-access-1062294 |archive-date=September 1, 2012 }}</ref> Root access can also be obtained by [[Bootloader unlocking|unlocking the bootloader]] which is available on most Android devices, for example on most [[Google Pixel]], [[OnePlus]] and [[Nothing (company)|Nothing]] models <code>OEM Unlocking</code> option in the developer settings allows the user to unlock the bootloader with [[Fastboot]], afterward, custom software may be installed. Some OEMs have their own methods. The unlocking process [[factory reset|resets the system to factory state]], erasing all user data.<ref>{{cite web |date=April 29, 2016 |title=Bootloader, Recovery, and the joy of unlocking |url=https://ifixit.com/Anleitung/Bootloader+Recovery+and+the+joy+of+unlocking/62398 |website=iFixit }}{{Dead link|date=August 2023 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> Proprietary frameworks like [[Samsung Knox]] limit or block attempts at rooting. Google's [[
=== Software stack ===
|