Jump to content

Bootloader unlocking

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by PhotographyEdits (talk | contribs) at 15:14, 3 August 2021 (Create page). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Bootloader unlocking is the process of disabling the security that makes secure boot possible. A bootloader is the first program that runs on your device, which initializes the hardware.

Android

Android bootloaders are typically proprietary software and based on the Qualcomm bootloader Little Kernel.[1]

In the context of Android, it is also called OEM Unlock.

The bootloaders of Nexus devices can be unlocked by using the fastboot command oem unlock.[1] Motorola requires accepting terms and conditions and creating an account before the bootloader can be unlocked for a Moto G.[2] Sony requires the IMEI number to be filled in on their website for unlocking the bootloader.[3]

Bootloaders can be unlocked using an exploit, or using a way that the vendor supplied. The latter method usually requires wiping all data on the device.[4]

Downsides

Unlocking the bootloader makes it susceptible to data theft.[5]

See also

References

  1. ^ a b Elenkov, Nikolay (2015). Android Security Internals : an In-Depth Guide to Android's Security Architecture. San Francisco, CA: No Starch Press. p. 350. ISBN 1-59327-581-1. OCLC 896723300.
  2. ^ Viscomi, Rick (2015). Using WebPageTest : web performance testing for novices and power users. Andy Davies, Marcel Duran (First edition ed.). Sebastopol, CA. ISBN 978-1-4919-0281-3. OCLC 927108295. {{cite book}}: |edition= has extra text (help)CS1 maint: location missing publisher (link)
  3. ^ Kotipalli, Srinivasa Rao (2016). Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats. Mohammed A. Imran. Birmingham, UK. ISBN 978-1-78588-800-7. OCLC 957298786.{{cite book}}: CS1 maint: location missing publisher (link)
  4. ^ Afonin, Oleg (2016). Mobile Forensics ' Advanced Investigative Strategies (1 ed.). Packt Publishing. ISBN 1-78646-408-X. OCLC 960040717.
  5. ^ Tamma, Rohit (2015). Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts. Donnie Tindall. Birmingham, UK. ISBN 978-1-78217-444-8. OCLC 910639389.{{cite book}}: CS1 maint: location missing publisher (link)