The author goes into the weeds on the vulnerabilities that can be left following some rooting methods. All to the good.
Meanwhile, it's non-rooted phones that get endlessly compromised
by state sponsored cellbright attacks (LEO),
by blackhatted Israeli exploitive malware platforms
and from an endless array of general crapware, much
of it from handset manufacturers, wireless carriers and
their bloatware affiliates.
All that said, the article really does go into detail. I know enough to follow along but probably not enough to spot issues (if there are any).
WarOnPrivacy•58m ago
Meanwhile, it's non-rooted phones that get endlessly compromised
All that said, the article really does go into detail. I know enough to follow along but probably not enough to spot issues (if there are any).