The act of rooting an Android phone has become a hot topic over the last few years. Heck, some individuals refuse to purchase a phone based on complex steps required to root the device in question. Prior to the launch of the Priv, we wrote an article questioning if the Priv would be able to be rooted, and if BlackBerry's history of secure devices would prevail. BlackBerry has previously touted the security found within the Priv, but has shied away from answering questions regarding the device's rooting capabilities or restrictions.
BlackBerry has taken the subject of rooting to heart, and have now posted an article over at Inside BlackBerry explaining how and why the Priv protects against rooting. The article explains the several advantages and disadvantages of rooting your device, while at the same time taking the time to elaborate on what exactly rooting means in an iOS or Android ecosystem.
BlackBerry Integrity Detection uses an application in the BlackBerry Secure Compound to provide a trust anchor and generate integrity reports. These reports are digitally signed with ECC-256 and backed by a certificate that chains up to a BlackBerry Certificate Authority, allowing third-party Enterprise Mobility Management solutions and monitoring apps to verify their authenticity. BlackBerry Integrity Detection integrates seamlessly with the new Good Secure EMM Suites and BES12, allowing IT administrators to monitor for rooted and jailbroken devices. If a potential compromise is detected, administrators can configure alerts, prevent the device from accessing the corporate network, or even remotely wipe the device.
- Checking the integrity of the kernel on device bootup
- Checking for unauthorized changes to the SELinux policy
- Monitoring file system mounting permissions
- Ensuring that unauthorized apps don’t acquire escalated privileges
- Disabling security sensitive applications such as pathtrust
You can read the full article here. What are you thoughts on the security of the BlackBerry PRIV? Let us know in the comments below!