ROOT ACCESS Posts on XDA

How to install TWRP and root with Magisk on the Moto G6

The Motorola Moto G6 is an entry level release from Lenovo under the Moto brand. With a 5.7-inch 18:9 IPS display (2160×1080), the G6 brings the newest trend of 2018 to the masses, alongside other reliable specifications such as a Qualcomm Snapdragon 450 SoC, 3/4GB of RAM, 32/64GB of storage, expandable storage, and dual 12...

Magisk v16.6 adds support for the Samsung Galaxy S9 and Project Treble GSIs

If you've ever looked into rooting your Android device, chances are you've heard of Magisk at some point. It's a systemless root, open source solution that's best known for its ability to pass SafetyNet—allowing you to use apps like Google Pay and Pokemon Go while rooted. It is developed by XDA Recognised Developer topjohnwu who...

LineageOS Introduces “Trust” – A Centralized Interface for Security and Privacy

The introduction of monthly security patches for Android was a welcome and much-needed move from Google. At that time, Android was infamous for its fragmentation issues, which negatively impacted how security vulnerabilities could be patched and then quickly distributed to devices. Monthly security patches provided a quick way for concerned users to judge how "secure"...

SuperSU Updated to work with TWRP on Pixel and Pixel XL

Last night, the first alpha release of TWRP was announced for the Google Pixel and Pixel XL. We delved into much detail about the release, including the changes to the installation procedure as well as what's new and what's broken. One of the caveats we mentioned in the article is that installing TWRP would cause...

New Rowhammer Exploits use Hardware Vulnerabilities to Root LG, Samsung, and Motorola Devices

Google is constantly at war with hackers seeking to maliciously exploit security vulnerabilities in their products. Back in the middle of 2014, Google assembled a team of security analysts called 'Project Zero' to report zero-day exploits to the company so they can be patched before any nefarious third-party can take advantage of the undisclosed security hole....