This may have been asked in previous posts but through searching this forum and other forums on the web I haven't been able to satisfy my thirst for this knowledge.
I am interested in rooting my phone (Samsung Fascinate / Verizon), mostly for sh**s and giggles but also to do some tweaking in the future. I have read numerous guides all over the Internet.
Anyway ... I'm looking through the files and while I trust the SDK released from Google I'm hesitant about that files included to assist with the rooting process.
What is ADB (Android Debugging Bridge?) -- is this a modified version of an original Google app? If so, are there any inherent security flaws that I should be aware of and do anyone know if there are any?
The same question applies to RAGE.bin (what is this, what does it do?).
SU (What is this? Where did it come from? How do I know what it's doing)
And Superuser.apk (what is this and where did it come from? How do I know what it's doing)?
Did these all originate from Android/Google and were then modified? I'm a little uncertain as to what is going on with this process.
It's seems to me, being that I am in a Risk Management field, someone who developed these apps to assist with the rooting process could easily slip in some malicious code that leaves the phone vulnerable to outside exploit and attack. I may be paranoid too.
But mostly, I'm curious. Could someone please help enlighten me?
Danke!
I went ahead and rooted the phone but now I cannot remove the root. Every time I try and remove Superuser.apk it says No such file or directory. From Mac Terminal or Phone Terminal with properly mounted rw access.
What gives
I never like to be trapped in something and I Feel like this phone is now trapped in Root mode.
I am interested in rooting my phone (Samsung Fascinate / Verizon), mostly for sh**s and giggles but also to do some tweaking in the future. I have read numerous guides all over the Internet.
Anyway ... I'm looking through the files and while I trust the SDK released from Google I'm hesitant about that files included to assist with the rooting process.
What is ADB (Android Debugging Bridge?) -- is this a modified version of an original Google app? If so, are there any inherent security flaws that I should be aware of and do anyone know if there are any?
The same question applies to RAGE.bin (what is this, what does it do?).
SU (What is this? Where did it come from? How do I know what it's doing)
And Superuser.apk (what is this and where did it come from? How do I know what it's doing)?
Did these all originate from Android/Google and were then modified? I'm a little uncertain as to what is going on with this process.
It's seems to me, being that I am in a Risk Management field, someone who developed these apps to assist with the rooting process could easily slip in some malicious code that leaves the phone vulnerable to outside exploit and attack. I may be paranoid too.
But mostly, I'm curious. Could someone please help enlighten me?
Danke!
I went ahead and rooted the phone but now I cannot remove the root. Every time I try and remove Superuser.apk it says No such file or directory. From Mac Terminal or Phone Terminal with properly mounted rw access.
What gives

Last edited: