View Single Post
Capt'n Corrupt's Avatar
Posts: 3,524 | Thanked: 2,958 times | Joined on Oct 2007 @ Delta Quadrant
#2558
Originally Posted by danramos View Post
For one, identifying said trojans would be a good reason alone--but you should also consider zero-day exploits. So long as you can root a device, you also have exploits (the two go hand-in-hand). rageagainstthecage is how Droid people root their handsets, but it's also precisely how that last HUGE bunch of trojans also managed to quietly root and take hold.
Quick question: did rageagainstthecage also require you to accept permissions upon installation, or was it an exploit that moonlighted as a low-permission app only to gain root perms?