User Tools

Site Tools


doc:appunti:hardware:xiaomi_mi_a1

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
doc:appunti:hardware:xiaomi_mi_a1 [2019/05/03 15:19] – [Xiaomi Mi A1 Android Phone] niccolodoc:appunti:hardware:xiaomi_mi_a1 [2019/05/19 19:46] – [Install Magisk, the SuperUser Tool] niccolo
Line 1: Line 1:
 ====== Xiaomi Mi A1 Android Phone ====== ====== Xiaomi Mi A1 Android Phone ======
 +
 +{{:img:star_full.png?nolink&28|}}
 +{{:img:star_full.png?nolink&28|}}
 +{{:img:star_full.png?nolink&28|}}
 +{{:img:star_full.png?nolink&28|}}
 +{{:img:star_full.png?nolink&28|}}
  
 ^ RAM              | 3.8 Gb  | ^ RAM              | 3.8 Gb  |
Line 7: Line 13:
 ^ Connector        | USB Type C  | ^ Connector        | USB Type C  |
 ^ Audio jack       | 3.5 mm  | ^ Audio jack       | 3.5 mm  |
 +^ A/B (Seamless) System Updates  | Yes  |
 ===== How to Gain root Privileges ===== ===== How to Gain root Privileges =====
  
Line 128: Line 134:
 When rooting an Android device we generally need the **su** binary program (the actual Unix tool used to switch from normal user to root), plus an **app to manage superuser permissions** granted (or denied) to other applications. Historically the most known app for this purpose was **SuperSU** by Chainfire, but something changed. Chainfire [[https://plus.google.com/+Chainfire/posts/6Sp6t9LxtQZ|retired from SuperSU development]] in October 2017 and new protecting schemas were introduced by Google into Android, mainly **[[https://developer.android.com/training/safetynet/|SafetyNet]]** and **[[https://source.android.com/security/verifiedboot/dm-verity|dm-verity]]**. The new leading-edge app for su management appears to be **Magisk**. When rooting an Android device we generally need the **su** binary program (the actual Unix tool used to switch from normal user to root), plus an **app to manage superuser permissions** granted (or denied) to other applications. Historically the most known app for this purpose was **SuperSU** by Chainfire, but something changed. Chainfire [[https://plus.google.com/+Chainfire/posts/6Sp6t9LxtQZ|retired from SuperSU development]] in October 2017 and new protecting schemas were introduced by Google into Android, mainly **[[https://developer.android.com/training/safetynet/|SafetyNet]]** and **[[https://source.android.com/security/verifiedboot/dm-verity|dm-verity]]**. The new leading-edge app for su management appears to be **Magisk**.
  
-The first step is to install the ZIP archive which provides the **su** binary, we already copied the **Magisk-v17.3.zip** file to the phone storag. Let's reboot into TWRP Recovery executing from the connected PC the following command:+The first step is to install the ZIP archive which provides the **su** binary, we already copied the **Magisk-v17.3.zip** file to the phone storage. Let's reboot into TWRP Recovery executing from the connected PC the following command:
  
 <code> <code>
doc/appunti/hardware/xiaomi_mi_a1.txt · Last modified: 2020/09/23 17:06 by niccolo