Hello,
can tell me somebody, MI5 working with software MDM , such e.g. AirWatch, FAMOC,?
I was reading MI3 has identified as breach of rooted Android policy because ,
".....Xiaomi devices have a file with the SuperUser ID bit set as true that appears to have a debug shell:
o -rwsr-sr--root system shelld
• This file is not part of the standard Android production build. As a result, need to understand from Xiaomi the purpose of the file"
Best regards
Marek
can tell me somebody, MI5 working with software MDM , such e.g. AirWatch, FAMOC,?
I was reading MI3 has identified as breach of rooted Android policy because ,
".....Xiaomi devices have a file with the SuperUser ID bit set as true that appears to have a debug shell:
o -rwsr-sr--root system shelld
• This file is not part of the standard Android production build. As a result, need to understand from Xiaomi the purpose of the file"
Best regards
Marek