• lemmyvore
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    The rooting process itself often involves running an exploit

    It most certainly does not. Exploits were used a decade ago, nowadays you unlock the bootloader using a manufacturer-provided key. And regardless of the key you need physical access to the device and rebooting into a special runtime.