Is McAfee installed as system app on your device,
if yes,you can uninstall it, i don't think it's any good over play protect.
Edit: disabling is better solution cause some time uninstalling system apps can cause issues, disabled apps can be re-enabled to solve any occurrence of new problems.
But if you don't want to uninstall it, you can disable notifications for system app via this app https://play.google.com/store/apps/details?id=com.aboutmycode.NotificationsOff
It requires root access and can be uninstalled after disabling problem notification.
You can use /d/gapps to get rid of google services if you have root. Many apps rely on google services though and don't have notifications or straight up refuse to open without them installed. There is a open source implementation of google services that is much lighter and doesn't send any data to google servers (unless you tell it to) called microG though. If your phone is supported by lineageOS I recommend installing LineageOS for microG it has microG and everything necessary built into lineageos which is an awesome rom.
Oh, dear...
Listen to the bot and get that off ASAP. Flash TWRP using TWRP Manager. After that, unroot your device through the KingRoot app and flash Magisk through TWRP.
No offense but you have a rather shitty and obscure device. The game is checking to make sure SafetyNet passes, and it obviously isn't. However you can double check with this.
To be honest, there isn't much you can do. It's a crappy no-name device and I'm not surprised that SafetyNet isn't passing (wouldn't be surprised if there is spyware on that thing as well). There are many things that can trip SafetyNet, with root being one of them. And while rooting with something like Magisk can be used to trick SafetyNet, I highly doubt you would be able to get that thing rooted. It seems that there is no development at all for it.
https://play.google.com/store/apps/details?id=com.contextlogic.geek
Seems to be made by the same people who make Wish. I certainly would not trust it with root access. Honestly I suggest against their services in general.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am not a bot, and this action was not performed automatically. I just wanted to reproduce the replay loop bug by auto moderator bot . Thanks !
If you are willing to flash a custom rom there is a fork of LineageOS with MicroG built in. See here for more info. Your device will be listed using its codename (Cheeseburger) in the downloads section.
Unfortunately you will not be able to use MicroG on a stock rom as signature spoofing capability is required. Stock roms are also odexed so you won't be able to patch the framework to support signature spoofing either.
EDIT. There is an Xposed module called Fakegapps (I think that's the name) but I'm not very familiar with it since I don't use Xposed so not sure whether this could work on a stock rom.
Magiskmanager.com is not affiliated with Magisk. Get the APK/Zip directly from XDA.
And to answer your question, you can use the latest version, it's not device or version specific.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
Just flash a boot.img file that includes Magisk, you don't need the whole ROM.
You can do this from the Magisk Manager app. Of course, you'll need the boot.img file first from your current ROM. Once you have that, follow the installation instructions here: https://forum.xda-developers.com/apps/magisk/official-magisk-v7-universal-systemless-t3473445
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am not a bot, and this action was a shitpost. Please do not [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a very trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
I wouldn't recommend using SuperSU. It's closed source and was recently sold off to an unknown Chinese company. No one knows what plans the new owners have in mind for SuperSU. That being said, it's closed source nature means we can't inspect it for bugs or exploits.
Thankfully superior options exists. If you're simply interested in root and nothing more, then you should just use the official LineageOS su, which is fully open source.
To get rid of SuperSU, simply wipe your /system partition and reflash your current ROM (no need to wipe your /data, you won't lose anything). Then immediately flash LineageOS Su or any other open-source alternatives.
Another option is Magisk - it's another open source su, but has a lot more features like hiding su from other apps/SafteyNet, modules support etc.
Depends.
You can actually get MORE security on a rooted device. But you can also lose security. When your phone is rooted, you have a root manager. This controls what apps have su access. As long as you only allow trusted apps, you'll be safe. There's also a root firewall app to prevent unwanted connections. Also, if you root you'll most likely want a custom ROM. Custom ROMS are usually more secure than stock. It also lets you get newer versions of android earlier, which can increase security. Plus, this has the added bonus of increasing longevity of your devices. I have the Motorola G3. Nougat won't even have an official OTA, but I can already get Nougat and already even Oreo through a custom ROM.
Links:
https://www.guidingtech.com/68346/secure-rooted-android/
https://lifehacker.com/rooted-vs-unrooted-android-your-best-arguments-1599101019
This executes the TRIM command on your phone's solid state storage just like on desktops/notebooks and their SSDs that require this command to be kept in top shape for their lifetime. This way you reduce stuttering as the underlying NAND is properly managed by the storage controller.
Android TRIMs flash since 4.3, but sometimes it's good to do it manually. It can be configured to be done every x days in the background. Have a look for the effect of this kind of app in old tablets like the Nexus 7, their performance got restored to day one... just by taking care of the flash storage as it should be.
I think you're looking for cSploit. It can do what you describe and much more.
F-Droid: https://f-droid.org/repository/browse/?fdid=org.csploit.android&fdpage=6&fdstyle=grid
XDA: https://forum.xda-developers.com/android/apps-games/app-csploit-android-network-toolkit-t3387103
A mention of SuperSU, CF-Auto-Root, TowelRoot (which both contain SuperSU), or some form of those 3 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
use magisk manager to patch the boot.img (which you can get like this if there's no official firmware to download) and flash with "fastboot flash boot boot.img"
then install kernel adiutor to overclock if the kernel supports it
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of a Samsung device was detected. Most US Snapdragon phones from Samsung have locked bootloaders, meaning Magisk or custom ROMs are impossible to install in most cases or require using dangerous exploits.
If you are sure that your phone DOES NOT have a Snapdragon processor, please add that to your post.
Samsung also requires use of Odin to flash their phones. An open-source alternative called Heimdall is available aswell, however might not work on newer phones. There is no official download link for Odin, as it is leaked software.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of a Samsung device was detected. Most US Snapdragon phones from Samsung have locked bootloaders, meaning Magisk or custom ROMs are impossible to install in most cases or require using dangerous exploits.
If you are sure that your phone DOES NOT have a Snapdragon processor, please add that to your post.
Samsung also requires use of Odin to flash their phones. An open-source alternative called Heimdall is available which should be used instead, as Odin is leaked software.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
Since you're >2.8.4 just follow this for mido
edit this assumes that you have the snapdragon version.
if you have the mediatek version here's one for nikel
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
I recently read that Magisk Beta supports the S9/S9+ now, so you should be good flashing TWRP, then flashing Magisk (you may have to remove the /data encryption by formatting data in TWRP before flashing Magisk).
https://forum.xda-developers.com/apps/magisk/beta-magisk-v13-0-0980cb6-t3618589
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a very trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a very trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a very trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a very trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
OK, I found a way to boot with Magisk, although it still hasn't solved my issue.
Here is the way to boot OnePlus devices with Oreo beta and Magisk (It worked for me, I don't take responsibility on any results while trying):
Your device will boot with Magisk!
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a very trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
Where'd you get that idea that rooting will help you recover lost data? Pretty sure this doesn't work like that. I searched on google, and all I've managed to find was horsecrap. You could try this as a last resort. https://play.google.com/store/apps/details?id=com.defianttech.diskdigger
But to answer you question, if the bootloader is not already unlocked, you phone will probably be wiped.
Hi there, best way far as I know on Samsung devices is this or by check it on Samsung pay & Secure Folder. These apps need Knox, a property security in-hardware manager. Once you root your device, Knox fuse gets tripped without any methods to reverse it.
power menu: built into some ROMs and i think there's a magisk module (that's true for several, just search what you want in magisk manager or on xda)
app downgrade: never used an android where that wasn't allowed by default
signature verification: there's a flashable zip on XDA, used mainly for microG. not sure if this is the same thing
screenshot: https://play.google.com/store/apps/details?id=com.icecoldapps.screenshotultimate
everything else: no idea
Alright, first you will need to download the Device ID app and copy the Google Services Framework ID. Then go Google’s Device Registration page and paste the ID and hit register. Re-sign in to Google Play Store and restart your phone. It can take a few minutes to activate :)
You could do this with the Edge Gestures app. Install the app and set the width and height of the edges to match your curvature. Once done, set the action as "Disabled until next touch". Or you could set it to launch a dummy application or something.
https://i.imgur.com/7KAyetq.png
I'm not sure how effective this would be on a curved screen device (I don't have one), but it's worth a shot - might need to play around with the settings bit to get it working the way you want.
If you can't do it via settings then you can connect your phone to your pc, install adb and change it with "adb shell wm density [value]" you can use this app to check the value and adjust according to that https://play.google.com/store/apps/details?id=com.nick.mowen.dpichecker
ADB restore shouldn't unroot your phone and it should only add back data and apps, it's not exactly a carbon copy of your unroot state.
Give it a go, I'm thinking that ADB backup is probably the only way to backup app and app data without root.
Edit: sorry nevermind, it needs root to backup app data.
I'd probably check out some other apps that backup your SMS. As for apps, this app looks quite promising. https://play.google.com/store/apps/details?id=org.swiftapps.swiftbackup
May I ask why you are trying to hide root access from your kid?
If the reason you're installing Cerberus is to keep track of your kid, then that's fair but I don't condone spying on people (even kids, they have a right to privacy too). What I suggest is getting the Trusted Contacts app. It allows you to request your child's location and they can accept or deny the request, but if they don't do either in a set timeout then it will automatically accept the request.
I highly recommend using FlashFire if you want to install an OTA while keeping root. But if you cant use it (like if you have locked flash), then you need to find the OTA instructios for your particular device and look up the structure of the OTA.zip. There should be images for several different partitions inside, and you only need some of them.
I guess I'll add the first one to this list. :) The Opal Travel app (Play Store link) used by NSW travellers in Australia is not compatible on a rooted device.
However, it is usable if root is hidden from it using Magisk on a stock ROM. I haven't had any luck on hiding root from apps on custom ROMs using Magisk.
Once we have a nice list going, we can put it in as a wiki page or a Google sheets spreadsheet.
A mention of SuperSU, CF-Auto-Root, TowelRoot (which both contain SuperSU), or some form of those 3 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root, TowelRoot (which both contain SuperSU), or some form of those 3 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root, TowelRoot (which both contain SuperSU), or some form of those 3 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root, TowelRoot (which both contain SuperSU), or some form of those 3 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root, TowelRoot (which both contain SuperSU), or some form of those 3 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root, TowelRoot (which both contain SuperSU), or some form of those 3 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
Knox trips and Samsung Pay, Knox MDM, Samsung Health*, Samsung Pass*, Secure Folder*, Warranty are permanently revoked, even after unrooting.
* Subject to workarounds while rooted but don't rely on it 100%.
If this is OK:
Create a backup (save photos and videos to the PC or the cloud, these and other stuff are reset)
Open the settings → about phone → software information then tap the build number a few times. A new setting is unlocked, developer options. Enable OEM unlock. Switch off the phone.
Obtain the PC program Odin + Samsung USB drivers, TWRP for the g950f, Magisk (obtain from the official source only), no verity opt encrypt, and RMM/KG bypass (v3).
Start the phone with power + bixby + volume down. Approve.
Connect the phone to the PC, allow time for the drivers to install.
Open Odin. Uncheck auto reboot in Odin.
Place TWRP .tar in the slot labeled AP.
Click on Start.
When it is done hold every key on the phone (volume down, volume up, bixby, power). When the downloading disappears, release volume down only
and continue holding volume up, bixby, and power. When Team Win Recovery Project appears, release everything.
If this isn't done successfully, use power + volume down + bixby for 7 seconds to return to download mode, don't start the phone normally yet.
Select wipe → format data → yes.
Transfer Magisk, no verity opt encrypt, RMM/KG bypass (v3) as if transferring photos from the PC.
Select install and install those .zips. Do not select reboot system in between. The installation can be done individually or queued.
Once all 3 are done, you may restart the phone, complete the setup, and install the Magisk app from the official source.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of a Samsung device was detected. Most US Snapdragon phones from Samsung have locked bootloaders, meaning Magisk or custom ROMs are impossible to install in most cases or require using dangerous exploits.
If you are sure that your phone DOES NOT have a Snapdragon processor, please add that to your post.
Samsung also requires use of Odin to flash their phones. An open-source alternative called Heimdall is available aswell, however might not work on newer phones. There is no official download link for Odin, as it is leaked software.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of a Samsung device was detected. Most US Snapdragon phones from Samsung have locked bootloaders, meaning Magisk or custom ROMs are impossible to install in most cases or require using dangerous exploits.
If you are sure that your phone DOES NOT have a Snapdragon processor, please add that to your post.
Samsung also requires use of Odin to flash their phones. An open-source alternative called Heimdall is available which should be used instead, as Odin is leaked software.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
Well you need the right version of gapps for your device... Arm7a if it's old and armv8 if it's 64bit... I don't know what crdroid is either... Why don't you just Google opengapps? https://opengapps.org/
You have to flash GApps separately. iirc Custom ROMs can't have it bundled together due to licensing reasons imposed by Google. You can run LOS and other custom ROMs with or without it.
Very good. I have the same device.
Here are the steps you need to fulfill.
Make a backup of any information you do not want to risk losing. Pics, vids, documents, etc etc
Enable developer Options. Go to Settings > About > Software Information (if applicable) > Build Number, tap it 7 times.
In Settings > Developer Options, enable "OEM unlocking" and ADB debugging
Download patched Odin or the open-source Heimdall. Grab G930F TWRP .tar image, flash it to your Recovery from a PC. Your phone does not support fastboot at all fyi.
Boot to TWRP, wipe your data THIS WIPES YOUR PHONE
Make a backup of your boot partition. Reboot back to Android. Do setup. Patch your boot.img with the Magisk app.
Lastly, reboot back to TWRP, flash your patched boot.img to your Boot partition.
Presto! You now have root. I've personally done this on my Exynos G930F, it's not that bad. It does take some patience and time.
In general - Use Odin or ADB to install TWRP custom recovery (make sure to use the right version, there are several variants of your phone). Then use TWRP to install Magisk (download from Github - link in the first post).
Do a bit of reading about the above so that you have at least half an idea what you're doing.
Your bootloader is unlocked?
You have the correct TWRP.img? https://twrp.me/oneplus/oneplus7pro.html
If you are using Powershell instead of CMD, did you enter "CMD" as your first command (this will let you use PS as CMD)
If you are using CMD, have you tried running it as Admin?
TWRP is a custom recovery. It is intended to replicate and enhance the options which can be done within the usual recovery mode for Android devices. They have a small blurb on their website: https://twrp.me/about/ We would use it to install/flash ZIPs.
Magisk is a widely used alternative to SuperSU since it's discontinuation. It manages root access for your apps and also has a built in module manager (plugins or mods).
there isn't twrp img files based on system version. this isn't a factor in the equation, simply just device model. you need to visit their website and input your device.
https://twrp.me/samsung/samsunggalaxytaba101wifi2016spen.html
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
These messages can be disabled by including suppressbotwarnings
somewhere in your comment/post.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
By the way, download this TWRP, it might be better than the one in the description of his video. His video was uploaded early after the Moto G5+'s release so there was only an unofficial version of TWRP. The official version exists now and it's in that link.
And the latest version of Magisk is here.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
The bootloader unlocking should be the same. I've looked at the forum for your device and I think this version of TWRP may be potentially newer: https://forum.xda-developers.com/honor-7x/development/recovery-twrp-3-1-1-1-openkirin-t3753140
Then flash Magisk instead of SuperSU: https://forum.xda-developers.com/apps/magisk/official-magisk-v7-universal-systemless-t3473445
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.
A mention of SuperSU, CF-Auto-Root (which contains SuperSU), or some form of those 2 has been detected. SuperSU used to be a trustworthy root program made by the developer Chainfire. However, awhile back he sold it to some unknown, foreign company named Coding Code Mobile Technology LLC. They claim to be in the US however that claim doesn't seem true. As Chainfire's involvement in the project is pretty much gone now, SuperSU can't really been trusted anyway. Because of this the community has put SuperSU aside in favor of other root programs such as Magisk.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/androidroot) if you have any questions or concerns.