HTC G2 removes jailbreak apps

HTC's G2 device automatically removes unapproved apps once the phone reboots, reports state.

HTC G2

The HTC G2 Android device, sold through T-Mobile, has an anti-jailbreak functionality included in it, according to reports.

The phone automatically removes any changes made to the G2 by jailbreakers once the device has rebooted, meaning users will not be able to add their own or third-party applications that do not have approval.

Given the Android OS is known for its openness in that anyone can modify it, a number of users have raised concerns over the feature in the device.

While the phone is only available in the US, some are worried the technology used to remove unapproved apps will become a common feature of many devices.

"Adding a hardware capability to restore the phone to its original state could be something that occurs more often in the near future," said Dennis Fisher, writing on Kaspersky Lab's Threat Post service.

There are a number of theories on how hardware on the devices is capable of preventing unapproved apps and software from being uploaded.

Tech specialist and founder of People for Internet Responsibility, Lauren Weinstein, suggested "the HTC is using a firmware rewrite system to replace /system' mods with the official' firmware upon reboot."

"It is too early in the hacking process for anyone to state definitively that this mechanism will not be defeated," he added in his blog.

At the time of publication, HTC had not responded to a request for more information on the technology being used.

Apple cracked down on jailbreakers earlier this year when it closed vulnerabilities in its iOS to prevent the JailbreakMe app from working.

At the time, security experts warned the flaws could have allowed hackers to compromise iPhone devices as well as permit the use of non-approved services.

However, it is believed many iPhone users are still using jailbroken devices to upload unapproved apps.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021
What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021