The 8 Best Root Vegetables to Eat This Winter
The 8 Best Root Vegetables to Eat This Winter
As the cold winter months approach, it can be harder to find fresh and local produce. Most of the growing season ends with the first frost. You can still find some of the healthiest vegetables year-round but eating somewhat seasonally can be both more economical and more nourishing for your health. The winter months are a perfect time to embrace root vegetables.
These types of vegetables grow underground and tend to persist through the colder months and are harvested during the fall and winter seasons. They are the edible root of the plant which means they store vitamins, minerals, and other nutrients for the plant, making them highly nutritional. Finally, as most root vegetables are somewhat starchy and rich in complex carbohydrates, they can be cooked into comforting, satisfyingly warm dishes on chilly days. Expand your palate this winter with the healthy winter root vegetables introduced below.
Organizing Components
Itβs common for an app to be organized into a tree of nested components:
For example, you might have components for a header, sidebar, and content area, each typically containing other components for navigation links, blog posts, etc.
To use these components in templates, they must be registered so that Vue knows about them. There are two types of component registration: global and local. So far, weβve only registered components globally, using Vue.component :
Globally registered components can be used in the template of any root Vue instance ( new Vue ) created afterwards β and even inside all subcomponents of that Vue instanceβs component tree.
Thatβs all you need to know about registration for now, but once youβve finished reading this page and feel comfortable with its content, we recommend coming back later to read the full guide on Component Registration.
Analyzing a watering hole campaign using macOS exploits
To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild. In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group. The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.
As is our policy, we quickly reported this 0-day to the vendor (Apple) and a patch was released to protect users from these attacks.
Based on our findings, we believe this threat actor to be a well-resourced group, likely state backed, with access to their own software engineering team based on the quality of the payload code.
In this blog we analyze the technical details of the exploit chain and share IOCs to help teams defend against similar style attacks.
Watering Hole
The websites leveraged for the attacks contained two iframes which served exploits from an attacker-controlled serverβone for iOS and the other for macOS.
iOS Exploits
The iOS exploit chain used a framework based on Ironsquirrel to encrypt exploits delivered to the victim's browser. We did not manage to get a complete iOS chain this time, just a partial one where CVE-2019-8506 was used to get code execution in Safari.
macOS Exploits
The macOS exploits did not use the same framework as iOS ones. The landing page contained a simple HTML page loading two scriptsβone for Capstone.js and another for the exploit chain.
The parameter rid is a global counter which records the number of exploitation attempts. This number was in the 200s when we obtained the exploit chain.
While the javascript starting the exploit chain checks whether visitors were running macOS Mojave (10.14) or Catalina (10.15) before proceeding to run the exploits, we only observed remnants of an exploit when visiting the site with Mojave but received the full non-encrypted exploit chain when browsing the site with Catalina.
The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021.
Remote Code Execution (RCE)
Loading a page with the WebKit RCE on the latest version of Safari (14.1), we learned the RCE was an n-day since it did not successfully trigger the exploit. To verify this hypothesis, we ran git bisect and determined it was fixed in this commit.
Sandbox Escape and Local Privilege Escalation (LPE)
It was interesting to see the use of Capstone.js, a port of the Capstone disassembly framework, in an exploit chain as Capstone is typically used for binary analysis. The exploit authors primarily used it to search for the addresses of dlopen and dlsym in memory. Once the embedded Mach-O is loaded, the dlopen and dlsym addresses found using Capstone.js are used to patch the Mach-O loaded in memory.
With the Capstone.js configured for X86-64 and not ARM, we can also derive the target hardware is Intel-based Macs.
Embedded Mach-O
After the WebKit RCE succeeds, an embedded Mach-O binary is loaded into memory, patched, and run. Upon analysis, we realized this binary contained code which could escape the Safari sandbox, elevate privileges, and download a second stage from the C2.
Analyzing the Mach-O was reminiscent of a CTF reverse engineering challenge. It had to be extracted and converted into binary from a Uint32Array.
Then the extracted binary was heavily obfuscated with a relatively tedious encoding mechanism—each string is XOR encoded with a different key. Fully decoding the Mach-O was necessary to obtain all the strings representing the dynamically loaded functions used in the binary. There were a lot of strings and decoding them manually would have taken a long time so we wrote a short Python script to make quick work of the obfuscation. The script parsed the Mach-O at each section where the strings were located, then decoded the strings with their respective XOR keys, and patched the binary with the resulting strings.
Once we had all of the strings decoded, it was time to figure out what capabilities the binary had. There was code to download a file from a C2 but we did not come across any URL strings in the Mach-O so we checked the javascript and saw there were two arguments passed when the binary is runβthe url for the payload and its size.
After downloading the payload, it removes the quarantine attribute of the file to bypass Gatekeeper. It then elevated privileges to install the payload.
N-day or 0-day?
Before further analyzing how the exploit elevated privileges, we needed to figure out if we were dealing with an N-day or a 0-day vulnerability. An N-day is a known vulnerability with a publicly available patch. Threat actors have used N-days shortly after a patch is released to capitalize on the patching delay of their targets. In contrast, a 0-day is a vulnerability with no available patch which makes it harder to defend against.
Despite the exploit being an executable instead of shellcode, it was not a standalone binary we could run in our virtual environment. It needed the address of dlopen and dlsym patched after the binary was loaded into memory. These two functions are used in conjunction to dynamically load a shared object into memory and retrieve the address of a symbol from it. They are the equivalent of LoadLibrary and GetProcAddress in Windows.
To run the exploit in our virtual environment, we decided to write a loader in Python which did the following:
- load the Mach-O in memory
- find the address of dlopen and dlsym
- patch the loaded Mach-O in memory with the address of dlopen and dlsym
- pass our payload url as a parameter when running the Mach-O
For our payload, we wrote a simple bash script which runs id and pipes the result to a file in /tmp. The result of the id command would tell us whether our script was run as a regular user or as root.
Having a loader and a payload ready, we set out to test the exploit on a fresh install of Catalina (10.15) since it was the version in which we were served the full exploit chain. The exploit worked and ran our bash script as root. We updated our operating system with the latest patch at the time (2021-004) and tried the exploit again. It still worked. We then decided to try it on Big Sur (11.4) where it crashed and gave us the following exception.
The exception indicates that Apple added generic protections in Big Sur which rendered this exploit useless. Since Apple still supports Catalina and pushes security updates for it, we decided to take a deeper look into this exploit.
Elevating Privileges to Root
The Mach-O was calling a lot of undocumented functions as well as XPC calls to mach_msg with a MACH_SEND_SYNC_OVERRIDE flag. This looked similar to an earlier in-the-wild iOS vulnerability analyzed by Ian Beer of Google Project Zero. Beer was able to quickly recognize this exploit as a variant of an earlier port type confusion vulnerability he analyzed in the XNU kernel (CVE-2020-27932). Furthermore, it seems this exact exploit was presented by Pangu Lab in a public talk at zer0con21 in April 2021 and Mobile Security Conference (MOSEC) in July 2021.
In exploiting this port type confusion vulnerability, the exploit authors were able to change the mach port type from IKOT_NAMED_ENTRY to a more privileged port type like IKOT_HOST_SECURITY allowing them to forge their own sec_token and audit_token, and IKOT_HOST_PRIV enabling them to spoof messages to kuncd.
MACMA Payload
After gaining root, the downloaded payload is loaded and run in the background on the victim's machine via launchtl. The payload seems to be a product of extensive software engineering. It uses a publish-subscribe model via a Data Distribution Service (DDS) framework for communicating with the C2. It also has several components, some of which appear to be configured as modules. For example, the payload we obtained contained a kernel module for capturing keystrokes. There are also other functionalities built-in to the components which were not directly accessed from the binaries included in the payload but may be used by additional stages which can be downloaded onto the victim's machine.
Notable features for this backdoor include:
- victim device fingerprinting
- screen capture
- file download/upload
- executing terminal commands
- audio recording
- keylogging
Conclusion
Our team is constantly working to secure our users and keep them safe from targeted attacks like this one. We continue to collaborate with internal teams like Google Safe Browsing to block domains and IPs used for exploit delivery and industry partners like Apple to mitigate vulnerabilities. We are appreciative of Appleβs quick response and patching of this critical vulnerability.
For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976). That campaign is not connected to the one described in todayβs post.
amfinder_interface.png
AMFinder interface: AMFinder is used either to predict fungal colonisation and intraradical hyphal structures within plant root images (prediction mode), or to train AMFinder neural networks (training mode).
AMFinder was developed using a deep learning system called convolutional neural networks (CNNs). This is a class of artificial neural network is often used to analyse images, where the computer model learns to extract relevant information from pre-analysed data. AMFinder adapts to a wide array of experimental conditions and produces accurate and reproducible analyses of plant root systems. Not only that, βAMFinder improves the way researchers document root colonisation by allowing them to go back to archived computer annotations if needed,β added Sebastian Schornack.
AMFinder accurately identifies colonised root sections and intraradical hyphal structures in several plant species commonly used in mycorrhiza research, including Nicotiana benthamiana, Medicago truncatula, Lotus japonicus, and Oryza sativa, and is compatible with the AM fungi Rhizophagus regularis, Claroideoglomus claroideum, Rhizoglomus microaggregatum, Funneliformis geosporum and Funneliformis mosseae.
This article is also highlighted in FacultyOpinions.
AMFinder Tool
Reference
Edouard Evangelisti, Carl Turner, Alice McDowell, Liron Shenhav, Temur Yunusov, Aleksandr Gavrin, Emily K. Servante, ClΓ©ment Quan, Sebastian Schornack (2021) Deep learning-based quantification of arbuscular mycorrhizal fungi in plant roots, New Phytologist
How to get rid of a toothache at night
A toothache is a painful annoyance, especially at night. Getting a toothache at night can make falling asleep or staying asleep very difficult.
However, there are a number of remedies that may help people find relief and get to sleep, including taking pain relievers or applying a cold compress or even cloves to the tooth.
In this article, learn more about nine home remedies for relieving a toothache at night.
Treating a toothache at night may be more difficult, as there is not much to distract a person from the pain.
However, people can try the following methods to relieve pain:
1. Oral pain medication
Share on Pinterest Oral pain medication may help treat a toothache at night.
Taking over-the-counter (OTC) pain medications such as acetaminophen (Tylenol) or ibuprofen (Advil) is a quick, simple way for many people to effectively reduce mild-to-moderate toothaches.
Always stay within the recommended dosage on the packaging.
If the toothache is severe, it is best to see a dentist and speak to them about stronger pain relievers.
2. Cold compress
Using a cold compress may help ease the pain of a toothache.
Applying a bag of ice wrapped in a towel to the affected side of the face or jaw helps constrict the blood vessels in the area, which can reduce pain to allow a person to fall asleep.
Applying a cold compress to the area for 15β20 minutes every few hours in the evening may also help prevent pain when going to bed.
3. Elevation
Pooling blood in the head may cause additional pain and inflammation. For some people, elevating the head with an extra pillow or two may relieve the pain enough for them to fall asleep.
4. Medicated ointments
Some medicated ointments may also help reduce toothache pain. OTC numbing gels and ointments that contain ingredients such as benzocaine may numb the area.
However, benzocaine is not suitable for use by young children.
5. Salt water rinse
A simple salt water rinse is a common home remedy for a toothache.
Salt water is a natural antibacterial agent , so it may reduce inflammation. This, in turn, helps protect damaged teeth from infection.
Rinsing with salt water may also help remove any food particles or debris stuck in the teeth or gums.
6. Hydrogen peroxide rinse
Periodontitis is a serious gum infection that generally occurs as a result of poor oral hygiene. It can cause issues such as soreness, bleeding gums, and teeth that come loose in their sockets.
The author of a 2016 study found that rinsing with hydrogen peroxide mouthwash helped reduce plaque and symptoms of periodontitis.
People should always dilute food-grade hydrogen peroxide with equal parts water. Swish the solution in the mouth, but do not swallow it.
This remedy is not suitable for children, as there is a risk they may accidentally swallow the mixture.
7. Peppermint tea
Swishing peppermint tea or sucking on peppermint tea bags may also help temporarily relieve pain from a toothache.
Researchers note that peppermint contains antibacterial and antioxidant compounds. Menthol, an active ingredient in peppermint, may also have a mild numbing effect on sensitive areas.
8. Clove
Eugenol, which is one of the main compounds in cloves, can reduce tooth pain. The results of a 2015 clinical trial indicated that people who applied eugenol to their gums and socket after having a tooth extracted had less pain and inflammation during healing.
Eugenol acts as an analgesic, which means that it numbs the area. To use clove for a toothache, soak ground cloves in water to make a paste. Then, apply the paste to the tooth, or put it in an empty tea bag and place it in the mouth.
Alternatively, gently chewing or sucking on a single clove and then allowing it to sit near the painful tooth may help relieve pain.
This is not a suitable remedy for children, as they may swallow too much clove. Single cloves can be spiky and painful if a person swallows them.
9. Garlic
Share on Pinterest The antibacterial effect of garlic may help kill bacteria in the mouth.
Garlic is a common household ingredient that some people use to relieve toothache pain.
Allicin, which is the main compound in garlic, has a strong antibacterial effect that may help kill the bacteria in the mouth that lead to cavities and tooth pain.
Simply chewing a clove of garlic and allowing it to sit near the tooth may help relieve pain. That said, the taste of raw garlic can be too strong for some people, so this may not be the right solution for everyone.
Tooth decay is a very common cause of a toothache. Tooth decay may lead to cavities if a person does not receive treatment.
Cavities occur when acids and bacteria break through the enamel and eat away at the delicate tissues inside the tooth. This can expose the nerve, causing mild-to-severe pain.
Sinus infections may also cause toothache in some people. This symptom occurs as the infection drains from the head. Symptoms such as pain and pressure from the infection may hurt more at night.
Other potential causes for a toothache include:
- losing a filling
- trauma to the jaw
- a wisdom tooth or adult tooth coming in
- food stuck in the teeth or gums
Toothaches can be painful in the day, but they may seem to get worse at night.
One reason that this may occur is because when a person is lying down, blood rushes to the head. This extra blood in the area may increase the pain and pressure that people feel from a toothache.
Another reason why many aches feel worse at night is because there are fewer distractions. With little else to focus on but the toothache, a person may find it difficult to fall asleep.
Gary Neville suggests root of Man United problems with Ole Gunnar Solskjaer sack prediction
Ole Gunnar Solskjaer is under huge pressure at Manchester United following a fourth defeat in their last six league games at the weekend.
- Share
- 13:00, 10 NOV 2021
Former captain Gary Neville believes Manchester United will stand by manager Ole Gunnar Solskjaer until the end of the season.
The Norwegian, who watched his side fall to a fourth defeat in their last six Premier League matches on Saturday, going down 2-0 to cross-city rivals Manchester City, is under enormous pressure, both from the supporters and the United hierarchy.
Despite the pressure on Solskjaer from the United board increasing, the club is not poised to pull the trigger on the former striker just yet, with him almost certain to take charge of next Saturday's clash with Watford at Vicarage Road.
The trip to Watford marks the beginning of a hugely difficult week for United, with trips to Villarreal and Chelsea to come after their visit to Vicarage Road.
Read More
Related Articles
Read More
Related Articles
Despite their recent woes, Neville believes United will continue to stand by Solskjaer, pointing to their lack of a succession plan being in place.
"The club aren't going to do anything here," Neville told Sky Sports. "Getting Antonio Conte was never, ever going to happen. The hierarchy were never going to appoint him, as great a manager as he is.
"The plan all season has been to stick with Ole Gunnar Solskjaer until the end of the season, and that's where I'm at, even after Saturday. They've got Watford away, Villarreal away and then Chelsea away. That's a horrid, horrid week. This is not going to get any easier in the short term.
"Being that far behind the top with 11 games gone, that can't happen. He's progressed from sixth to third to second, and should have won the Europa League final against Villarreal."
The defeat to Villarreal in Gdansk back in May was a bitter pill for United to swallow. It was seen as a golden opportunity to win their first trophy of the Solskjaer era and sign off for the summer in style.
Read More
Related Articles
Read More
Related Articles
Instead, United lost the contest on penalties, with goalkeeper David de Gea missing the decisive spot-kick.
For Neville, the defeat to Villarreal, as well as losing any cup match, can have a "real impact on players."
"I hark back to that because when you lose finals, it has a real impact on players," continued the former United defender. "If you win it, the medal around your neck, you get used to winning.
"Going out of the Carabao Cup to West Ham — it's a big problem. That can't happen, it's a trophy you can win.
"The league has almost gone, the Champions League is a long shot because of the quality of teams. The FA Cup and Carabao Cup cannot be dismissed, and going out to West Ham was a really bad situation for the club to be in.
"I think the fans left this stadium on Saturday tired and drained from what they've seen. Thinking: 'Where are we on our journey as a club?'"
United's recent performances, barring the 3-0 win over Tottenham Hotspur, have been more than questionable, especially the displays against both Liverpool and City.
Nevertheless, Neville believes the club had not prepared for questions over Solskjaer's position.
He added: "The club have not prepared for this, not prepared for a new manager, they didn't expect it, they thought everything was sort of plain sailing along.
"They've planned around a structure of way of working in the last two or three years that they're not going to veer away from, but in this moment in time they're going to have to put their helmets on if they're going to defend it."
Root-ΠΏΡΠ°Π²Π° Π½Π° Android: ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° ΠΈ Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΊΠΈ
Π‘ΡΡΠ΅ΡΡΠ²ΡΠ΅Ρ Π½Π΅ΠΌΠ°Π»ΠΎ ΡΡΠΊΠΎΠ²ΠΎΠ΄ΡΡΠ² Π΄Π»Ρ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Π΅ΠΉ, ΠΊΠ°ΠΊ ΠΏΠΎΠ»ΡΡΠΈΡΡ root-ΠΏΡΠ°Π²Π° Π½Π° ΡΠ²ΠΎΠ΅ΠΌ ΡΠΌΠ°ΡΡΡΠΎΠ½Π΅, Π½ΠΎ ΡΡΠΎ Π²ΠΎΠΎΠ±ΡΠ΅ ΡΠ°ΠΊΠΎΠ΅ «root» ΠΈΠ»ΠΈ «root-ΠΏΡΠ°Π²Π°»? Π ΡΡΠΎΠΉ ΡΡΠ°ΡΡΠ΅ ΠΌΡ ΡΠ°ΡΡΠΊΠ°ΠΆΠ΅ΠΌ, ΡΡΠΎ ΡΠ°ΠΊΠΎΠ΅ root, ΠΈ ΠΊΠ°ΠΊΠΈΠ΅ ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° ΠΈ Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΊΠΈ Π΅ΡΡΡ Ρ root-ΠΏΡΠ°Π².
Π ΠΎΡΠ½ΠΎΠ²Π΅ Android ΠΊΠ°ΠΊ ΡΠΈΡΡΠ΅ΠΌΡ Π»Π΅ΠΆΠΈΡ ΡΠ΄ΡΠΎ Linux Ρ ΠΎΡΠΊΡΡΡΡΠΌ ΠΈΡΡ ΠΎΠ΄Π½ΡΠΌ ΠΊΠΎΠ΄ΠΎΠΌ (Open Source System), ΠΏΠΎΡΡΠΎΠΌΡ ΠΈ ΡΠ°ΠΌ Android — ΡΡΠΎ ΡΠΈΡΡΠ΅ΠΌΠ° Ρ ΠΎΡΠΊΡΡΡΡΠΌ ΠΈΡΡ ΠΎΠ΄Π½ΡΠΌ ΠΊΠΎΠ΄ΠΎΠΌ. ΠΠ½ΠΎΠ³ΠΈΠ΅ ΡΠ΅ΡΠΌΠΈΠ½Ρ, ΡΠ°ΠΊΠΈΠ΅ ΠΊΠ°ΠΊ Β«rootΒ», ΠΈΠ·Π½Π°ΡΠ°Π»ΡΠ½ΠΎ ΠΎΡΠ½ΠΎΡΠΈΠ»ΠΈΡΡ ΠΊ ΡΠΈΡΡΠ΅ΠΌΠ΅ Linux / Unix. Π ΠΏΡΠΈΠ½ΡΠΈΠΏΠ΅, Β«rootΒ» ΠΎΠ±ΠΎΠ·Π½Π°ΡΠ°Π΅Ρ Π°ΠΊΠΊΠ°ΡΠ½Ρ, Ρ ΠΊΠΎΡΠΎΡΠΎΠ³ΠΎ Π΅ΡΡΡ ΠΏΠΎΠ»Π½ΡΠΉ Π΄ΠΎΡΡΡΠΏ ΠΊΠΎ Π²ΡΠ΅ΠΌ ΡΠ°ΠΉΠ»Π°ΠΌ Π² ΡΠΈΡΡΠ΅ΠΌΠ΅ ΠΈ ΠΏΡΠ°Π²Π° Π½Π° Π·Π°ΠΏΠΈΡΡ. ΠΠΎΡΡΠΎΠΌΡ ΠΊΠΎΡΠ½Π΅Π²Π°Ρ ΡΡΠ΅ΡΠ½Π°Ρ Π·Π°ΠΏΠΈΡΡ ΠΈΠ»ΠΈ ΠΊΠΎΡΠ½Π΅Π²ΠΎΠΉ Π΄ΠΎΡΡΡΠΏ ΡΠ°ΡΡΠΎ ΡΡΠ°Π²Π½ΠΈΠ²Π°ΡΡΡΡ Ρ ΠΏΡΠ°Π²Π°ΠΌΠΈ Π°Π΄ΠΌΠΈΠ½ΠΈΡΡΡΠ°ΡΠΎΡΠ° ΠΏΠΎΠ΄ Windows, Ρ ΠΎΡΡ ΡΡΡΠ΅ΡΡΠ²ΡΡΡ ΠΈ Π½Π΅ΠΊΠΎΡΠΎΡΡΠ΅ ΡΠ°Π·Π»ΠΈΡΠΈΡ Π² Π΄Π΅ΡΠ°Π»ΡΡ .
Root-Π΄ΠΎΡΡΡΠΏ: ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° ΠΈ Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΊΠΈ
ΠΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° | ΠΠ΅Π΄ΠΎΡΡΠ°ΡΠΊΠΈ |
ΠΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ / Π΄ΠΎΠ±Π°Π²Π»Π΅Π½ΠΈΠ΅ ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡ Π½Π°ΡΡΡΠΎΠ΅ΠΊ (Π½Π°ΠΏΡΠΈΠΌΠ΅Ρ, ΠΎΠ±ΡΠ΅ΡΠΈΡΡΠ΅ΠΌΠ½ΡΠΉ ΡΠΊΠ²Π°Π»Π°ΠΉΠ·Π΅Ρ) | ΠΠΎΡΠ΅ΡΡ Π³Π°ΡΠ°Π½ΡΠΈΠΈ Π½Π° ΡΡΡΡΠΎΠΉΡΡΠ²ΠΎ |
ΠΠΎΠ΄ΠΊΠ»ΡΡΠ΅Π½ΠΈΠ΅ Π½Π΅ΡΠΊΠΎΠ»ΡΠΊΠΈΡ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»ΡΡΠΊΠΈΡ ΠΏΡΠΎΡΠΈΠ»Π΅ΠΉ (Multi-User) | ΠΡΠ΅Π΄ΠΎΠ½ΠΎΡΠ½ΠΎΠ΅ ΠΠ ΠΌΠΎΠΆΠ΅Ρ Π½Π°Π½Π΅ΡΡΠΈ Π±ΠΎΠ»ΡΡΠΈΠΉ Π²ΡΠ΅Π΄, ΡΠ΅ΠΌ ΡΡΠΎ Π±ΡΠ»ΠΎ Π±Ρ Π±Π΅Π· root-ΠΏΡΠ°Π² |
ΠΠ°ΡΡΡΠΎΠΉΠΊΠΈ CPU / GPU (Π½Π°ΠΏΡΠΈΠΌΠ΅Ρ, Π΄Π»Ρ ΡΠ²Π΅Π»ΠΈΡΠ΅Π½ΠΈΡ ΠΌΠΎΡΠ½ΠΎΡΡΠΈ) | ΠΠ΅ΡΠ΄Π°ΡΠ½ΡΠΉ ΠΏΡΠΎΡΠ΅ΡΡ ΡΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π²ΡΠ²ΠΎΠ΄ΠΈΡ ΡΠΌΠ°ΡΡΡΠΎΠ½ ΠΈΠ· ΡΡΡΠΎΡ (Soft-Brick / Hard-Brick) |
Π£Π΄Π°Π»Π΅Π½ΠΈΠ΅ ΠΏΡΠ΅Π΄ΡΡΡΠ°Π½ΠΎΠ²Π»Π΅Π½Π½ΡΡ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΉ | |
ΠΠ°ΡΡΡΠΎΠΉΠΊΠ° ΠΈΠ½ΡΠ΅ΡΡΠ΅ΠΉΡΠ° Android | |
ΠΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΡ ΡΠ΄Π΅Π»Π°ΡΡ ΠΏΠΎΠ»Π½ΡΠΉ Backup ΡΠΈΡΡΠ΅ΠΌΡ |
ΠΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° root-Π΄ΠΎΡΡΡΠΏΠ°
ΠΠ°ΠΊ ΡΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ ΠΏΠΎΠ»ΡΡΠ°Π΅Ρ ΠΏΡΠ°Π²Π° Π°Π΄ΠΌΠΈΠ½ΠΈΡΡΡΠ°ΡΠΎΡΠ° ΠΈΠ»ΠΈ ΠΏΡΠ°Π²Π° root Π½Π° ΡΠ²ΠΎΠ΅ΠΌ ΡΡΡΡΠΎΠΉΡΡΠ²Π΅, ΠΎΠ½ ΠΌΠΎΠΆΠ΅Ρ Π½Π°ΡΡΡΠΎΠΈΡΡ Π²ΡΡ ΡΠΈΡΡΠ΅ΠΌΡ Android ΠΏΠΎΠ΄ ΡΠ²ΠΎΠΈ ΠΏΠΎΡΡΠ΅Π±Π½ΠΎΡΡΠΈ. Π ΠΊΠ°ΡΠ΅ΡΡΠ²Π΅ ΠΎΡΠ½ΠΎΠ²Π½ΡΡ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠ΅ΠΉ ΠΌΠΎΠΆΠ½ΠΎ Π½Π°Π·Π²Π°ΡΡ ΠΏΠΎΠ»Π½ΡΡ ΠΏΠ΅ΡΠ΅Π½Π°ΡΡΡΠΎΠΉΠΊΡ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»ΡΡΠΊΠΎΠ³ΠΎ ΠΈΠ½ΡΠ΅ΡΡΠ΅ΠΉΡΠ°, Π° ΡΠ°ΠΊΠΆΠ΅ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΡΠΈΡΡΠ΅ΠΌΠ½ΡΡ Π½Π°ΡΡΡΠΎΠ΅ΠΊ. Π‘ ΠΏΠΎΠΌΠΎΡΡΡ root, Π½Π°ΠΏΡΠΈΠΌΠ΅Ρ, ΠΌΠΎΠΆΠ½ΠΎ ΡΡΡΠ°Π½ΠΎΠ²ΠΈΡΡ ΠΎΠ±ΡΠ΅ΡΠΈΡΡΠ΅ΠΌΠ½ΡΠΉ ΡΠΊΠ²Π°Π»Π°ΠΉΠ·Π΅Ρ, ΡΠ²Π΅Π»ΠΈΡΠΈΡΡ ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡΠ½ΡΡ Π³ΡΠΎΠΌΠΊΠΎΡΡΡ ΠΈ Π΄Π°ΠΆΠ΅ ΠΏΠ΅ΡΠ΅Π½Π°ΡΡΡΠΎΠΈΡΡ Π²ΡΡ Π½Π°Π²ΠΈΠ³Π°ΡΠΈΡ ΠΏΠΎ ΠΌΠ΅Π½Ρ. ΠΠΎΡΠ½Π΅Π²ΠΎΠΉ Π΄ΠΎΡΡΡΠΏ ΡΠ°ΠΊΠΆΠ΅ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ ΡΠ΄Π°Π»ΡΡΡ ΠΏΡΠ΅Π΄ΡΡΡΠ°Π½ΠΎΠ²Π»Π΅Π½Π½ΡΠ΅ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ, ΠΏΠΎΡΡΠ°Π²Π»ΡΠ΅ΠΌΡΠ΅ ΠΌΠ½ΠΎΠ³ΠΈΠΌΠΈ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡΠ΅Π»ΡΠΌΠΈ.
ΠΠΎΡΠΊΠΎΠ»ΡΠΊΡ Android — ΠΎΡΠΊΡΡΡΠ°Ρ ΡΠΈΡΡΠ΅ΠΌΠ°, ΠΡ ΠΌΠΎΠΆΠ΅ΡΠ΅ Π½Π΅ ΡΠΎΠ»ΡΠΊΠΎ Π²Π½ΠΎΡΠΈΡΡ ΡΠ²ΠΎΠΈ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡ, Π½ΠΎ ΠΈ ΠΏΠΎΠ»Π½ΠΎΡΡΡΡ ΡΠ΄Π°Π»ΠΈΡΡ ΡΠΈΡΡΠ΅ΠΌΡ ΠΈ ΡΡΡΠ°Π½ΠΎΠ²ΠΈΡΡ ΠΊΠ°ΡΡΠΎΠΌΠ½ΡΡ ΠΏΡΠΎΡΠΈΠ²ΠΊΡ. ΠΡΠΈ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»ΡΡΠΊΠΈΠ΅ ΠΏΡΠΎΡΠΈΠ²ΠΊΠΈ ΡΠ°ΡΡΠΎ ΠΎΡΠ½ΠΎΠ²Π°Π½Ρ Π½Π° Β«Android Open Source ProjectΒ» (AOSP) ΠΈ ΠΏΡΠ΅Π΄Π»Π°Π³Π°ΡΡ ΠΌΠ½ΠΎΠΆΠ΅ΡΡΠ²ΠΎ ΡΡΠ½ΠΊΡΠΈΠΉ, ΠΊΠΎΡΠΎΡΡΠ΅ Π½Π΅ ΠΏΡΠ΅Π΄ΠΎΡΡΠ°Π²Π»ΡΡΡΡΡ ΡΡΠ°Π½Π΄Π°ΡΡΠ½ΠΎΠΉ ΠΏΡΠΎΡΠΈΠ²ΠΊΠΎΠΉ. ΠΠ°ΠΆΠ΄ΡΠΉ ΡΠ°Π·ΡΠ°Π±ΠΎΡΡΠΈΠΊ ΠΠΠ£ ΡΡΡΠ°Π½Π°Π²Π»ΠΈΠ²Π°Π΅Ρ ΡΠ²ΠΎΠΈ ΡΠΎΠ±ΡΡΠ²Π΅Π½Π½ΡΠ΅ ΠΏΡΠΈΠΎΡΠΈΡΠ΅ΡΡ, ΡΠ°ΠΊΠΈΠ΅ ΠΊΠ°ΠΊ ΡΠ»ΡΡΡΠ΅Π½Π½ΡΠΉ ΡΡΠΎΠΊ ΡΠ»ΡΠΆΠ±Ρ Π±Π°ΡΠ°ΡΠ΅ΠΈ, Π±ΠΎΠ»Π΅Π΅ Π²ΡΡΠΎΠΊΠ°Ρ ΡΠΊΠΎΡΠΎΡΡΡ ΠΈΠ»ΠΈ Π°Π»ΡΡΠ΅ΡΠ½Π°ΡΠΈΠ²Π½ΡΠ΅ ΡΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΠΈΠΎΠ½Π½ΡΠ΅ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΠΈΠΈ. Π£ΡΡΠ°Π½ΠΎΠ²ΠΊΠ° ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»ΡΡΠΊΠΎΠ³ΠΎ ΠΠΠ£ ΡΡΠ΅Π±ΡΠ΅Ρ Π½Π΅ ΠΏΠΎΠ»ΡΡΠ΅Π½ΠΈΡ ΠΊΠΎΡΠ½Π΅Π²ΠΎΠ³ΠΎ Π΄ΠΎΡΡΡΠΏΠ°, Π° ΡΠ°Π·Π±Π»ΠΎΠΊΠΈΡΠΎΠ²ΠΊΠΈ Π·Π°Π³ΡΡΠ·ΡΠΈΠΊΠ°.
ΠΡΠ°Π²Π° Π°Π΄ΠΌΠΈΠ½ΠΈΡΡΡΠ°ΡΠΎΡΠ° Π² ΡΠΈΡΡΠ΅ΠΌΠ΅ Android ΡΠ΅Π°Π»ΠΈΠ·ΡΡΡΡΡ ΡΠ΅ΡΠ΅Π· ΡΠ°ΠΊΠΈΠ΅ ΠΊΠΎΡΠ½Π΅Π²ΡΠ΅ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ, ΠΊΠ°ΠΊ SuperSU ΠΈ Superuser, ΡΡΠΎ ΠΎΠ·Π½Π°ΡΠ°Π΅Ρ, ΡΡΠΎ Π»ΡΠ±ΠΎΠ΅ Π΄ΡΡΠ³ΠΎΠ΅ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠ΅, ΠΊΠΎΡΠΎΡΠΎΠ΅ ΡΡΠ΅Π±ΡΠ΅Ρ root-Π΄ΠΎΡΡΡΠΏΠ°, Π΄ΠΎΠ»ΠΆΠ½ΠΎ Π±ΡΡΡ Π²ΡΡΡΠ½ΡΡ Π·Π°ΠΏΡΡΠ΅Π½ΠΎ ΡΠ΅ΡΠ΅Π· ΠΎΠ΄Π½ΠΎ ΠΈΠ· Π²ΡΡΠ΅ΡΠΏΠΎΠΌΡΠ½ΡΡΡΡ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠΉ.
ΠΠ΅Π΄ΠΎΡΡΠ°ΡΠΊΠΈ root-Π΄ΠΎΡΡΡΠΏΠ°
ΠΠΎΠ»ΡΡΠ΅Π½ΠΈΠ΅ root-ΠΏΡΠ°Π² Π½Π΅ΡΠ΅Ρ Ρ ΡΠΎΠ±ΠΎΠΉ Π½Π΅ ΡΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ»ΠΎΠΆΠΈΡΠ΅Π»ΡΠ½ΡΠ΅ ΠΌΠΎΠΌΠ΅Π½ΡΡ. ΠΡΠ΅ΠΆΠ΄Π΅ ΡΠ΅ΠΌ Π·Π°ΠΏΡΡΡΠΈΡΡ ΠΏΡΠΎΡΠ΅Π΄ΡΡΡ ΡΡΡΠΎΠ²Π°Π½ΠΈΡ ΡΡΡΡΠΎΠΉΡΡΠ²Π°, ΠΏΡΠΎΡΠΈΡΠ°ΠΉΡΠ΅ ΠΎ Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΊΠ°Ρ : Π² ΠΏΡΠΎΡΠ΅ΡΡΠ΅ ΠΏΠΎΠ»ΡΡΠ΅Π½ΠΈΡ root-ΠΏΡΠ°Π² Π΅ΡΡΡ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΡΠΉ ΡΠΈΡΠΊ, ΡΠ°ΠΊ ΠΊΠ°ΠΊ Π² ΡΠ»ΡΡΠ°Π΅ Π½Π΅ΡΠ΄Π°ΡΠΈ ΠΡ ΠΌΠΎΠΆΠ΅ΡΠ΅ Π½Π°ΡΡΡΠΈΡΡ ΡΠ°Π±ΠΎΡΡ ΠΠ‘ Π²ΠΏΠ»ΠΎΡΡ Π΄ΠΎ ΠΏΠΎΠ»Π½ΠΎΠΉ ΠΏΠΎΡΠ΅ΡΠΈ Π΄Π°Π½Π½ΡΡ (ΠΏΡΠ΅Π²ΡΠ°ΡΠΈΡΠ΅ ΡΠ΅Π»Π΅ΡΠΎΠ½ Π² Β«ΠΊΠΈΡΠΏΠΈΡΒ»). Π Π°Π·Π»ΠΈΡΠ°ΡΡ Soft-Brick ΠΈ Hard-Brick. Soft-Brick β ΡΡΠΎ Π²ΡΠ΅Π³ΠΎ Π»ΠΈΡΡ ΠΎΡΠΈΠ±ΠΊΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠ½ΠΎΠ³ΠΎ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΡ, ΠΊΠΎΡΠΎΡΠ°Ρ Π½Π΅ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ ΡΠΌΠ°ΡΡΡΠΎΠ½Ρ Π·Π°Π³ΡΡΠΆΠ°ΡΡΡΡ Π΄ΠΎΠ»ΠΆΠ½ΡΠΌ ΠΎΠ±ΡΠ°Π·ΠΎΠΌ. ΠΡΠΎΠ±Π»Π΅ΠΌΠ° ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ ΡΠ΅ΡΠ΅Π½Π° ΠΏΡΠΎΡΡΠΎ ΠΏΡΡΠ΅ΠΌ ΡΡΡΠ°Π½ΠΎΠ²ΠΊΠΈ Π½ΠΎΠ²ΠΎΠΉ ΠΏΡΠΎΡΠΈΠ²ΠΊΠΈ. Soft-Brick ΠΌΠΎΠΆΠ½ΠΎ Π½Π°Π·Π²Π°ΡΡ Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ ΡΠ°ΡΠΏΡΠΎΡΡΡΠ°Π½Π΅Π½Π½ΠΎΠΉ ΡΠΎΡΠΌΠΎΠΉ Β«ΠΊΠΈΡΠΏΠΈΡΠ°Β». ΠΡΠ΅Π½Ρ ΡΠ΅Π΄ΠΊΠΎ ΠΏΡΠΎΡΠ΅ΡΡ ΠΏΠΎΠ»ΡΡΠ΅Π½ΠΈΡ root-ΠΏΡΠ°Π² ΠΌΠΎΠΆΠ΅Ρ Π·Π°Π²Π΅ΡΡΠΈΡΡΡΡ ΡΠ΅ΠΌ, ΡΡΠΎ ΡΠΌΠ°ΡΡΡΠΎΠ½ ΠΏΡΠ΅Π²ΡΠ°ΡΠΈΡΡΡ Π² ΠΏΠΎΠ»Π½ΠΎΡΡΡΡ Π½Π΅ΡΠ°Π±ΠΎΡΠΈΠΉ Π΄Π΅Π²Π°ΠΉΡ (Hard-Brick). Π ΡΠ°ΠΊΠΈΡ ΡΠ»ΡΡΠ°ΡΡ ΡΠΈΡΡΠ΅ΠΌΠ° ΠΏΠΎΠ²ΡΠ΅ΠΆΠ΄Π΅Π½Π° Π½Π°ΡΡΠΎΠ»ΡΠΊΠΎ, ΡΡΠΎ Π΄ΠΎΡΡΡΠΏ ΠΊ ΡΠΌΠ°ΡΡΡΠΎΠ½Ρ, Π°, ΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎ, ΠΈ Β«ΡΠΏΠ°ΡΠ΅Π½ΠΈΠ΅Β» ΡΠΈΡΡΠ΅ΠΌΡ Π½Π΅Π²ΠΎΠ·ΠΌΠΎΠΆΠ½Ρ.
ΠΡΠ±ΠΎΠ΅ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠ΅ Ρ ΠΏΡΠΈΠ²ΠΈΠ»Π΅Π³ΠΈΡΠΌΠΈ root Π΄ΠΎΠ»ΠΆΠ½ΠΎ Π·Π°ΠΏΡΠ°ΡΠΈΠ²Π°ΡΡ ΡΠ°Π·ΡΠ΅ΡΠ΅Π½ΠΈΠ΅ Π½Π° ΡΡΡΠ°Π½ΠΎΠ²ΠΊΡ
Π‘ΠΈΡΡΠ΅ΠΌΠ° Android ΡΠ΅ΡΠ΅Π· root-Π΄ΠΎΡΡΡΠΏ ΡΡΠ°Π½ΠΎΠ²ΠΈΡΡΡ ΠΎΡΠΊΡΡΡΠΎΠΉ, ΡΡΠΎ ΡΠ²Π΅Π»ΠΈΡΠΈΠ²Π°Π΅Ρ ΡΠΈΡΠΊ ΡΠ»ΡΡΠ°ΠΉΠ½ΠΎΠΉ ΡΡΡΠ°Π½ΠΎΠ²ΠΊΠΈ Π²ΡΠ΅Π΄ΠΎΠ½ΠΎΡΠ½ΠΎΠ³ΠΎ ΠΠ. Π₯ΠΎΡΡ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ Ρ ΠΏΡΠ°Π²Π°ΠΌΠΈ root ΠΈ ΠΏΡΠΎΠ²ΠΎΠ΄ΠΈΡ Π²ΡΠ΅ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΈ Π²ΡΡΡΠ½ΡΡ, Π½Π΅Π±ΡΠ΅ΠΆΠ½ΠΎΠ΅ ΠΏΡΠΈΠΊΠΎΡΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ ΠΏΠ°Π»ΡΡΠ΅ΠΌ ΠΈΠ»ΠΈ ΡΡΡΠ°Π½ΠΎΠ²ΠΊΠ° ΠΏΡΠ΅Π΄ΠΏΠΎΠ»ΠΎΠΆΠΈΡΠ΅Π»ΡΠ½ΠΎ Π±Π΅Π·ΠΎΠ±ΠΈΠ΄Π½ΠΎΠ³ΠΎ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ Π΄Π»Ρ ΠΊΠΎΡΠ½Π΅Π²ΠΎΠ³ΠΎ ΠΊΠ°ΡΠ°Π»ΠΎΠ³Π° ΠΌΠΎΠΆΠ΅Ρ ΠΏΡΠΈΠ²Π΅ΡΡΠΈ ΠΊ ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΡ Π²ΡΠ΅Π΄ΠΎΠ½ΠΎΡΠ½ΠΎΠ³ΠΎ ΠΠ ΠΈ Π½Π°Π½Π΅ΡΡΠΈ Π³ΠΎΡΠ°Π·Π΄ΠΎ Π±ΠΎΠ»ΡΡΠΈΠΉ ΡΡΠΎΠ½, ΡΠ΅ΠΌ Π΅ΡΠ»ΠΈ Π±Ρ root-ΠΏΡΠ°Π² Ρ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ Π½Π΅ Π±ΡΠ»ΠΎ.
Π Π°ΡΠΏΡΠΎΡΡΡΠ°Π½Π΅Π½ΠΈΠ΅ Π³Π°ΡΠ°Π½ΡΠΈΠΉΠ½ΡΡ ΠΎΠ±ΡΠ·Π°ΡΠ΅Π»ΡΡΡΠ² Π½Π° ΡΡΡΠΎΠ²Π°Π½Π½ΡΠΉ ΡΠΌΠ°ΡΡΡΠΎΠ½
ΠΠ»Ρ ΠΌΠ½ΠΎΠ³ΠΈΡ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Π΅ΠΉ Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ Π²Π°ΠΆΠ½ΡΠΌ ΠΌΠΎΠΌΠ΅Π½ΡΠΎΠΌ ΡΠ²Π»ΡΠ΅ΡΡΡ ΠΏΠΎΡΠ΅ΡΡ Π³Π°ΡΠ°Π½ΡΠΈΠΈ ΠΏΠΎ Π΄ΠΎΠ³ΠΎΠ²ΠΎΡΡ — Π³Π°ΡΠ°Π½ΡΠΈΡ ΠΏΠΎ Π·Π°ΠΊΠΎΠ½Ρ ΠΎΡΡΠ°Π΅ΡΡΡ. ΠΠ°Π²Π°ΠΉΡΠ΅ ΡΡΠΎΡΠ½ΠΈΠΌ: Π³Π°ΡΠ°Π½ΡΠΈΡ ΠΏΠΎ Π·Π°ΠΊΠΎΠ½Ρ — ΡΡΠΎ ΡΡΠΈΠ΄ΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΠΎΠ±ΡΠ·Π°ΡΠ΅Π»ΡΡΡΠ²ΠΎ, ΠΊΠΎΡΠΎΡΠΎΠ΅ ΠΏΡΠΎΠ΄Π°Π²Π΅Ρ Π΄ΠΎΠ»ΠΆΠ΅Π½ ΡΠΎΠ±Π»ΡΠ΄Π°ΡΡ, Π΅ΡΠ»ΠΈ ΠΊΠ»ΠΈΠ΅Π½Ρ ΠΎΠ±Π½Π°ΡΡΠΆΠΈΠ» Π² ΡΡΡΡΠΎΠΉΡΡΠ²Π΅ Π΄Π΅ΡΠ΅ΠΊΡ, ΡΡΡΠ΅ΡΡΠ²ΠΎΠ²Π°Π²ΡΠΈΠΉ Π½Π° ΠΌΠΎΠΌΠ΅Π½Ρ ΠΏΠΎΠΊΡΠΏΠΊΠΈ. ΠΠ°ΡΠ°Π½ΡΠΈΡ ΠΏΠΎ Π΄ΠΎΠ³ΠΎΠ²ΠΎΡΡ — Π΄ΠΎΠ±ΡΠΎΠ²ΠΎΠ»ΡΠ½Π°Ρ ΡΡΠ»ΡΠ³Π°, ΠΊΠΎΡΠΎΡΠ°Ρ Π³Π°ΡΠ°Π½ΡΠΈΡΡΠ΅Ρ ΠΏΠΎΠΊΡΠΏΠ°ΡΠ΅Π»Ρ Π½ΠΎΡΠΌΠ°Π»ΡΠ½ΠΎΠ΅ ΡΡΠ½ΠΊΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ ΡΠΎΠ²Π°ΡΠ° Π² ΡΠ΅ΡΠ΅Π½ΠΈΠ΅ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΠΎΠ³ΠΎ ΠΏΠ΅ΡΠΈΠΎΠ΄Π° Π²ΡΠ΅ΠΌΠ΅Π½ΠΈ ΠΏΠΎΡΠ»Π΅ ΠΏΠΎΠΊΡΠΏΠΊΠΈ.
ΠΡΠ»ΠΈ ΠΊΠ»ΠΈΠ΅Π½Ρ ΠΎΠ±Π½Π°ΡΡΠΆΠΈΠ²Π°Π΅Ρ Π΄Π΅ΡΠ΅ΠΊΡ, ΠΊΠΎΡΠΎΡΡΠΉ Π΅ΡΠ΅ Π½Π΅ ΡΡΡΠ΅ΡΡΠ²ΠΎΠ²Π°Π» Π²ΠΎ Π²ΡΠ΅ΠΌΡ ΠΏΠΎΠΊΡΠΏΠΊΠΈ, Π³Π°ΡΠ°Π½ΡΠΈΡ ΠΏΠΎ Π΄ΠΎΠ³ΠΎΠ²ΠΎΡΡ ΡΠ΅ΡΡΠ΅ΡΡΡ, Π΅ΡΠ»ΠΈ Π½Π° ΡΠ΅Π»Π΅ΡΠΎΠ½ Π±ΡΠ»ΠΈ ΠΏΠΎΠ»ΡΡΠ΅Π½Ρ root-ΠΏΡΠ°Π²Π°. ΠΠ΄Π½Π°ΠΊΠΎ ΠΈ Π·Π΄Π΅ΡΡ Π½Π΅Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ ΠΏΠΎΠ΄Π²Π΅ΡΡΠΈ Π²ΡΠ΅ ΡΠ»ΡΡΠ°ΠΈ ΠΏΠΎΠ΄ ΠΎΠ΄ΠΈΠ½ Π·Π½Π°ΠΌΠ΅Π½Π°ΡΠ΅Π»Ρ, ΠΏΠΎΡΠΎΠΌΡ ΡΡΠΎ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡΠ΅Π»ΠΈ Π² ΠΊΠ°ΠΆΠ΄ΠΎΠΌ ΡΠ»ΡΡΠ°Π΅ ΠΏΠΎΡΡΡΠΏΠ°ΡΡ ΠΏΠΎ-ΡΠ°Π·Π½ΠΎΠΌΡ. ΠΠ°ΠΏΡΠΈΠΌΠ΅Ρ, HTC ΠΊΠΎΡΠ²Π΅Π½Π½ΠΎ ΡΠΎΠΎΠ±ΡΠ°Π΅Ρ, ΡΡΠΎ Π³Π°ΡΠ°Π½ΡΠΈΡ ΡΠΎΡ ΡΠ°Π½ΡΠ΅ΡΡΡ, Π΅ΡΠ»ΠΈ Π΄Π΅ΡΠ΅ΠΊΡ Π½Π΅ Π²ΡΠ·Π²Π°Π½ ΡΡΡΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ ΡΡΡΡΠΎΠΉΡΡΠ²Π°. ΠΠ½ΠΎΠ³ΠΈΠ΅ Π΄ΡΡΠ³ΠΈΠ΅ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡΠ΅Π»ΠΈ Π·Π°ΠΌΠ°Π»ΡΠΈΠ²Π°ΡΡ ΡΡΠΎΡ Π²ΠΎΠΏΡΠΎΡ ΠΈΠ»ΠΈ ΡΡΠ°Π·Ρ ΡΠΊΠ°Π·ΡΠ²Π°ΡΡ Π½Π° ΠΏΠΎΡΠ΅ΡΡ Π³Π°ΡΠ°Π½ΡΠΈΠΈ Π² ΠΏΠΎΠ΄ΠΎΠ±Π½ΡΡ ΡΠ»ΡΡΠ°ΡΡ .
ΠΡΠ»ΠΈ Π²Ρ Π½Π΅ Π·Π½Π°Π΅ΡΠ΅, ΠΊΠ°ΠΊ ΠΏΠΎΡΡΡΠΏΠΈΡΡ, ΡΠΎ ΠΌΠΎΠΆΠ½ΠΎ ΠΏΠΎΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄ΠΎΠ²Π°ΡΡ Π»ΠΈΡΡ ΠΎΠ΄Π½ΠΎ: ΠΏΠΎΠΏΡΡΠ°ΠΉΡΠ΅ ΡΠ΄Π°ΡΡ, Π½ΠΎ Π΄ΠΎ ΡΡΠΎΠ³ΠΎ ΠΏΠΎΡΡΠ°ΡΠ°ΠΉΡΠ΅ΡΡ ΠΏΠΎ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠΈ ΡΠ΄Π°Π»ΠΈΡΡ Π²ΡΠ΅ ΡΠ»Π΅Π΄Ρ root-ΠΏΡΠ°Π² Π½Π° ΡΡΡΡΠΎΠΉΡΡΠ²Π΅.