Recent from talks
Contribute something
Nothing was collected or created yet.
Bootloader unlocking
View on WikipediaBootloader unlocking is the process of disabling the bootloader security that enforces secure boot during the boot procedure. It can allow advanced customizations, such as installing custom firmware. On smartphones, this can be a custom Android distribution or another mobile operating system. Some bootloaders are not locked at all and some are locked, but can be unlocked with a command, a setting or with assistance from the manufacturer. Some do not include an unlocking method and can only be unlocked through a software exploit.
Bootloader unlocking is also done for mobile forensics purposes, to extract digital evidence from mobile devices, using tools such as Cellebrite UFED.
Background
[edit]Unlocking the bootloader allows installing and running unsigned code on a device, including user customized software. Operating outside the manufacturer specification might usually result in voiding any warranties and may make the device susceptible to data theft, as the integrity of the operating system (as intended by the manufacturer) can no longer be guaranteed.[1] On Chromebooks, enabling developer mode makes the system less secure than a standard laptop running Linux.[2] Unlocking the bootloader may require reinitialization, formatting to factory settings, or otherwise lead to data loss on Android and ChromeOS devices. This is due to the fact that some user data is impossible to back up without root permission. This will also lead to certain security apps not working, such as Samsung Knox for which the counter would be stuck at "0x1."
Sascha Segan from PCMag considered a locked bootloader a mistake on the Qualcomm Snapdragon Insiders phone, which is targeted at advanced users.[3]
Platforms
[edit]Unlocking the bootloader is typically a prerequisite of obtaining root access and/or installing a custom ROM.
| Manufacturer | Difficulty level | Method |
|---|---|---|
| Easy (non-Verizon) Medium[4] (Verizon) |
Command-line (unlocked variant, not restricted to carrier, and non-Verizon carrier variants when paid off fully) | |
| Samsung | Complicated
|
Enable option that allows OEM unlock (if it exists) in Development settings, then unlock bootloader in Download mode.
Samsung Knox (on supported[8] devices) will be permanently tripped if modified or custom firmware is flashed, so Samsung Wallet, Secure Folder and applications made use of the Knox framework will be permanently unusable even if the bootloader is re-locked. Prior to One UI 8.0, Devices sold outside of North America had the OEM Unlock option to unlock the bootloader. From One UI 8.0, Samsung has removed the ability to unlock the bootloader in all regions.[9][10] |
| OnePlus | Easy (non-T-Mobile) Medium (T-Mobile) |
Command-line, except on T-Mobile US variants where an unlock code is needed |
| Xiaomi | Hard (MIUI powered devices) Very Hard (non-Chinese HyperOS powered devices) Impossible (China Mainland) |
Requires a 3-7 day old Mi account (limited to one device per month and three devices per year).
On devices with Xiaomi HyperOS outside mainland China, you need to request bootloader unlock permissions in the Xiaomi Community app before proceeding with bootloader unlocking. Requires a 1-month-old Xiaomi account. For Mainland China devices with HyperOS, bootloader unlock has not been available since February 2025. |
| Asus | Impossible | Unavailable since August 2023, when first-party apps were removed and servers were shut down. |
| Sony | Medium | Command-line, request code at Sony website |
| Fairphone | Medium | Command-line, request code at Fairphone website or forum |
| Motorola | Varies widely between model and SoC manufacturer[11]
Medium (Except Verizon, AT&T, TracFone) Impossible (Verizon, AT&T, TracFone) |
Command-line, request code at Motorola website |
| Realme | Medium-Hard (China Mainland and India) Impossible (global) |
Command-line, after installation of the in-depth test app and submitting an application for in-depth testing. |
| Nothing | Easy | Command-line |
| Huawei | Medium-Hard (Kirin SoCs, select Huawei phones)
Impossible (others) |
Select Huawei phones using the Kirin SoC can have their bootloader unlocked unofficially via potatonv: https://www.xda-developers.com/huawei-honor-bootloader-unlock-potatonv/
For other devices, bootloader unlock has not been available since July 2018. |
| OPPO | Easy (MediaTek) or phones that bought in mainland China[12] Medium (Snapdragon). |
Only certain Snapdragon-powered OPPO phones can be unlocked[13][better source needed] without a third-party paid tool such as UnlockTool.[citation needed] Unlocking is possible on some MediaTek SoCs via MTKClient. Note that certain fastboot binaries have been removed, or locked by RSA key.
MediaTek: MTKClient can be used for older devices, which sometimes requires using MTK bypass utility beforehand. This is unfeasible on modern Mediatek SoCs as they require a download agent file signed by the OEM and this file is not typically distributed. Any phones bought from mainland China and in depth-test's device support lists: Depth test regardless of SoC (the depth test app can be downloaded from Oppo's website). Command line using adb and fastboot. |
| HMD-Nokia | Medium (select models, e.g. Nokia 8) Impossible (Others) |
Possible with unofficial unlocking methods[14] |
| Vivo | Impossible as of May 2022.[15] | N/A |
| LG | Hard | Possible[16][better source needed] by flashing bootloaders with QFIL utility (Unofficial). |
| Tecno | Medium | Command-line. Requires Tecno ID account at least two weeks old. |
| Infinix | Medium | Command-line. Requires Inifinix ID account at least two weeks old. |
| Itel | Medium | Command-line. Requires Itel ID account at least two weeks old. |
| TCL | Medium (Ion V only)
Unknown (others) |
For the Ion V mobile phone, you can use a Python tool to reboot to a normally hidden fastboot. |
| Amazon | Medium | Command-line and unofficial. Requires using Linux to brick the device temporarily.[17][better source needed] |
History
[edit]The bootloaders of Nexus and Pixel devices can be unlocked with fastboot.[18]
When Motorola released a bootloader unlocking tool for the Droid Razr, Verizon removed the tool from their models.[19]
In 2011, Sony Ericsson released an online bootloader unlocking tool.[20] Sony requires the IMEI number to be filled in on their website.[21] For the Asus Transformer Prime TF201, Asus has released a special bootloader unlock tool.[22]
In 2012, Motorola released a limited tool for unlocking bootloaders.[23] They require accepting terms and conditions and creating an account before the bootloader can be unlocked for your Motorola device.[24]
A 2012 article by The Verge called the unlockable bootloaders a 'broken promise' and called for a fix.[25]
HTC phones have an additional layer of lock called "S-OFF/S-ON".
Bootloaders can be unlocked using an exploit or using a way that the vendor supplied. The latter method usually requires wiping all data on the device.[26] In addition, some manufacturers prohibit unlocking on carrier locked phones. Although Samsung phones and cellular tablets sold in the US and Canada do not allow bootloader unlocks regardless of carrier status, a service has allowed users on an earlier version to unlock their US/Canadian Samsung phone(s) and/or tablet(s)[27][28]
In 2018, a developer from XDA Developers launched a service which allowed users to unlock the bootloader of some Nokia smartphone models.[29] Similarly, another developer from XDA Developers launched a service to allow users to unlock the bootloaders of Samsung Galaxy S20 and Samsung Galaxy S21 Phones.
Huawei announced plans to allow users to unlock the bootloader of the Mate 30 series, but later retracted that.[30] Huawei has stopped providing bootloader unlock codes since 2018.[31] A bootloader exploit named checkm30 has been developed for HiSilicon based Huawei phones.[32][non-primary source needed]
When the bootloader of the Samsung Galaxy Z Fold 3 was unlocked, the camera became less functional. This could be restored by re-locking the bootloader.[33] This issue was later fixed by Samsung.[34] For the Samsung Galaxy S22 series, unlocking the bootloader has no effect on the camera.[35]
Others
[edit]Microsoft
[edit]The WPInternals tool is able to unlock bootloaders of all Nokia Lumia phones running Windows Phone, but not phones like the Alcatel Idol 4 or HP Elite x3.[36][37] Version 1.0 was released in November 2015.[38] In October 2018, the tool was released as open source software when the main developer René Lergner (also known as HeathCliff74) stepped down.[39]
The slab bootloader used by Windows RT could be unlocked using a vulnerability, but was silently patched by Microsoft in 2016.[40] UEFI Secure Boot on x86 systems can generally be unlocked.
Apple
[edit]The boot ROM protection on iOS devices with an A11 processor or older can be bypassed with a hardware exploit known as checkm8, which makes it possible to run other operating systems including Linux.[41]
The bootloader on Apple Silicon-based Macs can be unlocked.[42] However, other Apple devices like the iPhone and iPad cannot be bootloader unlocked even when using the same chip used in a Mac.
The equivalent of bootloader unlocking is called developer mode in Chromebooks.[43] Chromebooks use custom bootloaders that can be modified or overwritten by removing a Write-protect screw.[44] Some models lack a screw and instead may or may not require disabling the onboard Cr50 chip.[1]
In 2013, the bootloader of the Chromecast was hacked using an exploit.[45] In 2021, it was hacked again for newer versions.[46] In 2023, it was reported that the Chromecast HD could be unlocked without exploit.[47]
Asus
[edit]Asus used to provide an Unlocking tool for both of their smartphone lines, the Zenfone and ROG Phone. This worked as an installable .apk file that the user could install on their phone, then unlock the bootloader. The app worked by contacting Asus unlocking servers, then prompting the user to perform a factory reset.
In 2023 Asus removed the tool from their website and closed the unlocking servers, so even phones with the .apk file installed couldn't unlock their bootloaders. Representatives on the Asus forums claimed the tool would be available again, but as of March 2024 no additional information has been provided, even after the release of their latest device the ROG Phone 8 and the upcoming release of the Zenfone 11 Ultra.
A user on the popular forum XDA (website) filed a court claim application against Asus due to the unlock tool never being released and alleged that Asus censored comments about the unlock tool on their forum.[48]
SpaceX
[edit]In August 2022, security researcher Lennert Wouters applied a voltage injection attack to bypass firmware verification of a Starlink satellite dish from SpaceX.[49]
Relocking
[edit]After unlocking a bootloader, some devices allow users to relock it. Relocking is typically done to restore the device to a factory-like state, often for warranty purposes or to re-enable certain security features like verified boot. This process is usually carried out through fastboot commands or manufacturer-specific software.
However, the ability to relock a bootloader varies significantly across manufacturers and device models. Some manufacturers provide official methods to relock the bootloader without issue, especially if the device is running official, signed firmware. In contrast, other devices may experience functionality issues after relocking—such as the loss of access to certain features or the risk of a "soft brick"—particularly if any system modifications remain or if unofficial firmware is installed.
Importantly, relocking the bootloader does not always reverse all changes made during the unlocking process. For example, some devices will retain a bootloader unlock flag or record in the hardware's tamper logs, which may still void warranties or affect access to services like DRM-protected content.
As a result, users are advised to consult manufacturer-specific guidelines and ensure that all system components are restored to their official state before attempting to relock the bootloader.[50]
VNeID app changes
[edit]According to information from technology groups in Vietnam, after updating version 2.1.6 of the VNeID application released on May 30, 2024, some Android phone users have received warnings : "Your device is not safe, there is a risk of containing malicious code...". As a result, users are thrown to the main screen and cannot use the VNeID application, even though before the update they could still log in and use it normally.
This is because VNeID 2.1.6 update has added new security measures to stop working on Android devices with root access, unlocked bootloader and developer mode enabled. To use, users must disable root access to the device, relock bootloader and turn off developer options.
Shutdown of online services
[edit]In 2018, Huawei stopped providing bootloader unlock codes.[51] On 31 December 2021, LG shut down their website which provided bootloader unlock codes.[52] In August 2023, ASUS removed the unlocking tool from their website and shut down the servers used to unlock the bootloader.[53]
See also
[edit]References
[edit]- ^ Tamma, Rohit; Donnie Tindall (2015). Learning Android forensics: a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts. Birmingham, UK. ISBN 978-1-78217-444-8. OCLC 910639389.
{{cite book}}: CS1 maint: location missing publisher (link) - ^ Porup, J. M. (2017-06-19). "How to install Linux on a Chromebook (and why you should)". Ars Technica. Archived from the original on 2017-06-19. Retrieved 2021-09-06.
- ^ "Qualcomm Smartphone for Snapdragon Insiders Review". PCMag. 16 August 2021. Archived from the original on 2021-08-16. Retrieved 2021-09-06.
- ^ "Rooting your Bootlocked Pixel Phone (Verizon Edition)".
- ^ "[CLOSED][Android][UNSAMLOCK] Bootloader Unlock for Samsung US/Canada Devices". 8 January 2021.
- ^ "2023 SM-G950U/U1/W Rev8 Root Method Android 9 (Snapdragon models) Via Bootloader Unlock Token". 3 March 2020.
- ^ "Bootloader unlocking option removed from". XDA Forums. 2025-07-26. Retrieved 2025-07-27.
- ^ "Device Compatibility Knox Solutions | Samsung Knox". Archived from the original on 2024-12-07. Retrieved 2024-12-05.
- ^ "Bootloader unlocking option removed from One UI 8.0". XDA Forums. 2025-07-26. Retrieved 2025-07-27.
- ^ Leon, Jean (2025-07-26). "One UI 8 Could Be Killing Part of the Core Essence of Android". Android Headlines. Retrieved 2025-07-27.
- ^ "[Guide]Un/locking Motorola Bootloader". XDA Forums. 2020-04-08. Retrieved 2025-06-12.
- ^ "帖子详情 - Oppo社区".
- ^ "Proton Drive".
- ^ "[Guide] How to unlock the bootloader on Nokia Android Phones for free". techmesto. 21 June 2021. Retrieved 31 Oct 2025.
- ^ "vivo Smartphone FAQs | vivo India". www.vivo.com. Archived from the original on 2022-11-29. Retrieved 2022-11-29.
- ^ "V60 Bootloader Unlock and Magisk Root". XDA Forums. 8 November 2021. Retrieved 24 July 2025.
- ^ "[UNLOCK][ROOT][TWRP][UNBRICK] Fire HD 10 2017 (suez)". XDA Forums. 2019-03-21. Archived from the original on 2025-04-09. Retrieved 2025-04-19.
- ^ "Factory Images for Nexus and Pixel Devices | Google Play services". Google Developers. Archived from the original on 2017-04-04. Retrieved 2022-11-07.
- ^ Ingraham, Nathan (2011-10-24). "GSM Motorola RAZR hits the FCC; Verizon model has locked bootloader". The Verge. Archived from the original on 2022-10-01. Retrieved 2022-06-14.
- ^ By (2011-04-14). "Sony Ericsson Promotes Android Bootloader Unlocking". Hackaday. Archived from the original on 2022-05-28. Retrieved 2022-06-14.
- ^ Kotipalli, Srinivasa Rao; Mohammed A. Imran (2016). Hacking Android: explore every nook and cranny of the Android OS to modify your device and guard it against security threats. Birmingham, UK. ISBN 978-1-78588-800-7. OCLC 957298786.
{{cite book}}: CS1 maint: location missing publisher (link) - ^ Tiefenthäler, Ronald (22 February 2012). "Asus: Bootloader Unlock Tool für Tablet Transformer Prime TF201 verfügbar". Notebookcheck (in German). Archived from the original on 2021-08-04. Retrieved 2021-08-04.
- ^ Rodgers, Evan (2012-08-17). "Motorola unveils Android bootloader unlocking tool with limited device support". The Verge. Archived from the original on 2012-08-19. Retrieved 2021-09-10.
- ^ Viscomi, Rick; Andy Davies; Marcel Duran (2015). Using WebPageTest: web performance testing for novices and power users. Sebastopol, CA. ISBN 978-1-4919-0281-3. OCLC 927108295.
{{cite book}}: CS1 maint: location missing publisher (link) - ^ Kopfstein, Janus (2012-11-20). "Access Denied: why Android's broken promise of unlocked bootloaders needs to be fixed". The Verge. Archived from the original on 2017-02-10. Retrieved 2024-11-22.
- ^ Afonin, Oleg (2016). Mobile Forensics ' Advanced Investigative Strategies (1 ed.). Packt Publishing. ISBN 978-1-78646-408-8. OCLC 960040717.
- ^ "USA/Canada - Samsung Bootloader Unlock". Telegram. Retrieved 2024-06-18.
- ^ "[CLOSED][Android][UNSAMLOCK] Bootloader Unlock for Samsung US/Canada Devices". XDA Forums. 2021-01-08. Archived from the original on 2024-06-27. Retrieved 2024-06-18.
- ^ Rox, Ricci (2 April 2018). "Nokia users can now unofficially unlock their bootloaders but the methodology is as sketchy as it gets". Notebookcheck. Archived from the original on 2021-09-06. Retrieved 2021-09-06.
- ^ "Huawei Mate 30 will not have an unlocked bootloader". The Indian Express. 2019-09-25. Archived from the original on 2019-09-26. Retrieved 2021-09-06.
- ^ "Huawei will no longer offer bootloader unlock codes for its Android devices". 9to5Google. 2018-05-24. Archived from the original on 2021-09-06. Retrieved 2021-09-06.
- ^ "Checkmate Mate 30 - Attack the bootrom of Huawei smartphones" (PDF). Archived (PDF) from the original on 2021-09-06.
- ^ Clark, Mitchell (2021-08-24). "Samsung will let you unlock your Z Fold 3's bootloader, but at the cost of your cameras". The Verge. Archived from the original on 2021-08-24. Retrieved 2021-09-06.
- ^ "Unlocking the bootloader no longer kills the Galaxy Z Fold 3's cameras". xda-developers. 2021-12-07. Archived from the original on 2022-02-13. Retrieved 2022-03-14.
- ^ "Unlocking the bootloader doesn't break the camera on the Samsung Galaxy S22 series". xda-developers. 2022-02-26. Archived from the original on 2022-02-26. Retrieved 2022-02-26.
- ^ "Tool van Nederlandse ontwikkelaar kan custom roms op alle Lumia's flashen". Tweakers (in Dutch). Archived from the original on 2021-08-04. Retrieved 2021-08-04.
- ^ "Windows Phone Internals 2.2 Unlocks the Bootloader on all Windows 8 & 10 Lumia Smartphones". xda-developers. 2017-12-04. Archived from the original on 2021-08-04. Retrieved 2021-08-04.
- ^ Andrew Orlowski. "Rooting and modding a Windows Phone is now child's play". The Register. Archived from the original on 2022-09-28. Retrieved 2022-06-14.
- ^ "Windows 10 Mobile's bootloader unlocker is now open source". Neowin. Archived from the original on 2022-05-25. Retrieved 2022-06-14.
- ^ Francisco, Shaun Nichols in San. "Microsoft silently kills dev backdoor that boots Linux on locked-down Windows RT slabs". www.theregister.com. Archived from the original on 2021-09-06. Retrieved 2021-09-06.
- ^ Lundberg, Anders. "16-year-old runs Linux on iPhone 7". Macworld UK. Archived from the original on 2021-08-04. Retrieved 2021-08-04.
- ^ January 2021, Michelle Ehrhardt 19 (2021-01-19). "Linux is Finally on Apple M1...Kind Of". Tom's Hardware. Archived from the original on 2021-08-04. Retrieved 2021-08-04.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ December 2014, Lucian Armasu 31 (2014-12-31). "You Can Now Run Full Linux Apps Inside A Chrome OS Window". Tom's Hardware. Archived from the original on 2021-09-06. Retrieved 2021-09-06.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Robert, Foss (2017-03-08). "Quick hack: Removing the Chromebook Write-Protect screw". Collabora. Archived from the original on 2021-09-04. Retrieved 2021-09-04.
- ^ "Chromecast bootloader exploit surfaces, opens up plenty of possibilities (video)". Engadget. 28 July 2013. Archived from the original on 2020-09-04. Retrieved 2021-09-06.
- ^ "Modders ontgrendelen bootloader van Google Chromecast met Google TV". Tweakers (in Dutch). Archived from the original on 2021-08-01. Retrieved 2021-09-06.
- ^ Wilde, Damien (23 September 2022). "Chromecast with Google TV HD bootloader can be unlocked by default". 9to5Google.
- ^ "Court Action against Asus' false promise on bootloader unlock tool". XDA Forums. 2024-02-18. Retrieved 2024-03-23.
- ^ Hardcastle, Jessica Lyons. "Starlink satellite dish cracked on stage at Black Hat". The Register. Retrieved 2022-11-22.
- ^ Wilde, Damien (2021-09-09). "How to downgrade from Android 12 Beta to Android 11 on Google Pixel [Video]". 9to5Google. Archived from the original on 2021-10-18. Retrieved 2021-09-28.
- ^ "Huawei stopt met het uitdelen van codes om bootloader vrij te geven". Tweakers (in Dutch). Archived from the original on 2023-05-07. Retrieved 2023-05-07.
- ^ "LG stopt eind dit jaar met tool voor unlocken van smartphonebootloaders". Tweakers (in Dutch). Archived from the original on 2023-05-07. Retrieved 2023-05-07.
- ^ "ASUS is apparently killing the ability to root Zenfones". Android Authority. 8 August 2023. Archived from the original on 2024-01-30. Retrieved 2024-01-30.
External links
[edit]Bootloader unlocking
View on Grokipediaget_unlock_ability property set to 1.[1] Once enabled, the device is rebooted into bootloader mode—often via commands like adb reboot [bootloader](/page/Bootloader) or hardware key combinations—and the unlocking is executed using the fastboot flashing unlock command from a connected computer.[1] This action prompts a critical warning about potential issues with unofficial images, followed by an automatic factory data reset to erase all user data and prevent unauthorized access to sensitive information.[1] The unlock state persists across reboots, but for security, the device clears non-essential RAM during the process and on subsequent boots to mitigate risks like data leakage from previous sessions.[1]
While unlocking expands customization possibilities, it carries significant risks and implications. Unlocking the bootloader may void the manufacturer's warranty, depending on the device and region (for example, it does not on Google Pixel devices but often does on others like Samsung).[3][4] It bypasses verified boot mechanisms that ensure only signed software runs, potentially exposing the device to malware or instability if incompatible images are flashed. Additionally, some carriers or manufacturers, like certain Samsung models, restrict unlocking to maintain security features such as Knox, which could permanently disable advanced protections once altered.[5] Users must back up data beforehand, as the reset is mandatory, and relocking the bootloader via fastboot flashing lock is possible but recommended only after verifying the flashed images to restore secure boot without issues.[1] Overall, bootloader unlocking remains a foundational step for Android modding communities but is advised only for those with technical expertise.
Fundamentals
Definition and Purpose
A bootloader is the initial firmware that executes upon powering on a mobile device, responsible for initializing hardware and loading the operating system kernel. It enforces secure boot mechanisms to verify the integrity and authenticity of the software it loads, thereby preventing the execution of unauthorized or tampered code that could compromise device security.[1] In addition to security considerations, Android original equipment manufacturers (OEMs) lock bootloaders partly for commercial reasons, to protect revenue streams from system-level advertisements and push notifications. Unlocking the bootloader and gaining root access enables users to block or remove these features, which directly impacts profits for vendors such as Xiaomi and OPPO.[6][7] Bootloader unlocking refers to the process of disabling these secure boot restrictions, which typically involves bypassing cryptographic signature verification. This allows the device to boot unsigned or custom software, such as modified kernels, custom ROMs, and alternative recovery environments.[1] The primary purposes of unlocking include enabling the installation of custom firmware for enhanced functionality or development, gaining root access to the operating system for advanced user privileges and system modifications, facilitating mobile forensics to extract data using specialized tools like Cellebrite UFED, and supporting hardware-level alterations such as overclocking or sensor tweaks.[8][9][10] The general steps for bootloader unlocking begin with enabling the OEM unlocking option in the device's developer settings, which verifies the user's intent and device eligibility. The device is then rebooted into bootloader mode, often via a command-line tool like ADB, followed by executing thefastboot flashing unlock command to initiate the process. This typically triggers a confirmation prompt on the device, after which a factory reset occurs to wipe user data and mitigate potential security risks.[1]
Risks and Benefits
Unlocking a device's bootloader offers several advantages, primarily centered on user control and device utility. It enables enhanced customization by allowing the installation of modified firmware and user interfaces, such as altering system themes, animations, or navigation gestures, which are often restricted in stock operating systems.[11] Additionally, it facilitates the use of custom ROMs, which can extend the device's lifespan by providing ongoing software updates and security patches long after the manufacturer has ended official support; for instance, devices like the Samsung Galaxy S10 can receive Android 15 or later through community-developed ROMs, reducing electronic waste and the need for premature hardware replacement.[12] Unlocking also grants access to root privileges, permitting advanced system tweaks like optimizing battery performance, removing bloatware, or integrating specialized modules for audio enhancement and automation.[13] In professional contexts, such as mobile forensics, an unlocked bootloader allows tools to elevate privileges during the boot process for extracting encrypted data, aiding investigations without full device decryption.[9] However, these benefits come with significant security risks. An unlocked bootloader bypasses secure boot mechanisms, which verify the integrity of the operating system and firmware before loading, thereby exposing the device to unsigned or malicious code that could introduce malware during the boot sequence.[14] This vulnerability increases the attack surface, particularly with physical access, allowing potential data theft or implantation of backdoors, as the bootloader no longer enforces cryptographic checks on loaded components.[15] On devices with advanced security like Samsung Knox, unlocking permanently trips a hardware fuse, disabling features such as real-time kernel protection and encrypted data vaults, rendering the system unable to attest its integrity to apps or networks.[16] Practically, bootloader unlocking often requires a mandatory factory reset on most Android devices, erasing all user data to mitigate risks from unauthorized access, which can disrupt workflows and necessitate backups.[1] It typically voids manufacturer warranties, as the process modifies core system components outside official support, leaving users liable for any hardware or software failures.[17] Furthermore, it leads to incompatibility with security-sensitive applications, such as banking software or digital wallets, which detect the unlocked state and refuse to operate; for example, Samsung Knox's tripped status blocks features like Secure Folder and Samsung Pay indefinitely.[16] Legally, unlocking may violate the device's terms of service or end-user license agreements, as manufacturers like Motorola explicitly warn that it waives all warranties and assumes user responsibility for compliance with applicable laws, potentially exposing individuals to liability for network disruptions or unauthorized modifications.[17] It can also breach carrier contracts if operating an unlocked device on a network without approval, as some carriers prohibit modifications that could affect network integrity. While not inherently illegal, in regions with stringent cybersecurity regulations, such as the EU's updated Radio Equipment Directive effective August 1, 2025, which requires protections against unauthorized software installation, some manufacturers have disabled bootloader unlocking on devices sold there to ensure compliance, though the directive does not explicitly prohibit unlocking.[18] For instance, as of 2025, Samsung has removed the OEM unlocking option in One UI 8 for EU-sold devices to align with these requirements.[19]Android Devices
Historical Development
The historical development of bootloader unlocking in the Android ecosystem traces back to the platform's inception in 2008, when its open-source nature under the Android Open Source Project (AOSP) facilitated early modifications, including on the HTC Dream (T-Mobile G1), which shipped with an unlocked bootloader to encourage developer experimentation. This developer-friendly approach extended to subsequent devices from HTC and Motorola, where community efforts often enabled unlocks without official resistance, aligning with Android's ethos of customization and openness. By 2010, Google advanced the process with the Nexus S, introducing the standardizedfastboot oem unlock command via the Android SDK, allowing users to disable secure boot verification and flash custom firmware directly.[20][21]
A pivotal milestone occurred in 2011, when Google formalized its policy encouraging bootloader unlocking to foster innovation; this prompted OEMs like HTC to commit to unlockable bootloaders on all devices released after September 2011, using a web-based tool for developers and enthusiasts. Motorola followed suit by announcing plans to unlock portions of its portfolio, marking a shift toward official support amid growing developer demand. However, carrier interventions began to counter this momentum; Verizon, for instance, enforced locked bootloaders on Motorola's Droid series starting with the DROID X in July 2010, citing network security and compatibility concerns, a policy that persisted through devices like the DROID Bionic in 2011 and DROID 4 in 2012. Despite these restrictions, Google maintained unlocked bootloaders on its Nexus lineup—and later Pixel devices—to provide factory images and tools for developers, reinforcing Android's role as a platform for customization.[22][23][24][25]
In the 2020s, the landscape shifted toward greater restrictions as manufacturers prioritized security amid evolving threats, with post-Android 10 updates emphasizing verified boot and hardware-backed protections to prevent unauthorized modifications. This era saw increased bootloader locks to comply with integrity checks like Google's Play Integrity API, which flags unlocked devices as potentially compromised, partly in response to supply chain vulnerabilities exposed by geopolitical tensions. Notable milestones include Huawei's May 2018 policy ceasing unlock codes for all new devices to enhance security and user experience, affecting models launched after that date, and LG's December 2021 shutdown of its entire bootloader unlocking service, ending official support for custom development on its Android phones. These changes reflected a broader industry trend balancing openness with fortified defenses against exploits.[1][26][27]
Manufacturer-Specific Methods
Bootloader unlocking procedures on Android devices vary significantly by manufacturer, reflecting differences in hardware security implementations, carrier agreements, and corporate policies. As of 2025, Google maintains relatively straightforward support for its Pixel and Nexus lineages, while other vendors impose increasing restrictions to enhance device security and comply with regional regulations.[1] For Google Pixel and Nexus devices, unlocking is achieved through the Android Debug Bridge (ADB) and fastboot tools, specifically by enabling the OEM unlocking toggle in developer options, then issuing thefastboot flashing unlock command, which wipes all user data as a security measure. Non-Verizon models receive full official support, allowing users to obtain unlock codes directly without additional barriers, though the process requires a USB connection to a computer with platform-tools installed. This method remains accessible for the Pixel 10 series (released August 2025) and earlier supported models, ensuring compatibility with custom recoveries and ROMs.[1]
Samsung's approach historically involved enabling OEM unlocking and USB debugging in developer options, powering off the device, entering download mode by holding Volume Up and Volume Down buttons while connecting to a PC via USB, and long-pressing Volume Up to confirm the unlock, which wipes all user data and trips the Knox security counter. This procedure applied to supported models like the Galaxy S20 FE, particularly international variants with Exynos chipsets, but was unavailable on many US Snapdragon models due to carrier restrictions that prevent official unlocking. The process was complicated by the Knox security suite, which flags modifications and voids warranty protections. However, with the release of One UI 8.0 on July 26, 2025, Samsung fully removed bootloader unlocking capabilities across all models, eliminating the OEM unlock toggle from settings and stripping related code from the firmware to prevent rooting and custom installations globally. This policy shift applies to devices like the Galaxy S25 series, rendering official unlocks impossible without exploits, which are not endorsed by the manufacturer.[28][29][30]
OnePlus devices generally support a fastboot-based unlock for non-carrier variants, involving the activation of OEM unlocking in settings followed by the fastboot oem unlock command after connecting to Wi-Fi for verification. However, starting August 2025 with ColorOS 16 (based on Android 16), users must submit an official application for approval through OnePlus channels before proceeding, adding restrictions for security and stability on eligible new devices. T-Mobile variants require a paid unlock token from OnePlus support or reliance on unofficial exploits due to carrier locks, as seen in models like the OnePlus 12, where standard fastboot access is restricted without authorization. This approach balances accessibility for unlocked users with carrier-specific and evolving security constraints.[31][32]
OPPO maintains a strict policy against official bootloader unlocking across its devices, a practice in place for years to enforce security and ecosystem integrity. This restriction partly serves commercial purposes by protecting revenue from system-level ads and push notifications, as unlocked devices would enable users to root and remove these features, thereby impacting vendor profits. Users of models like the Reno series must resort to unofficial methods, which are not supported by OPPO and may void warranties or pose security risks.[7]
Xiaomi employs the official Mi Unlock application for bootloader unlocking on eligible global models, requiring users to bind their Mi Account, enable developer options, and endure a mandatory 168-hour (seven-day) waiting period after initial setup to prevent unauthorized access, after which the tool facilitates the unlock via fastboot. Since early 2025, including February updates, stricter policies have been implemented, particularly for Chinese variants, limiting unlocks to one per account annually with extended waiting periods (up to 180 days in some cases); these measures are driven by security and regional mandates but also aim to safeguard revenue from system-level ads and push notifications by hindering rooting that allows their removal, affecting devices like the Xiaomi 14 series and often necessitating third-party services or bypass methods.[33][6]
To check if a Motorola device is eligible for bootloader unlocking, users should consult Motorola's official bootloader unlock portal and verify the exact model number in Settings > About phone. Motorola's process begins with toggling OEM unlocking in developer options on supported models, followed by booting into fastboot mode and running fastboot oem get_unlock_data to generate a key, which is then submitted to Motorola's official unlock portal for approval before executing fastboot oem unlock to complete the procedure, again wiping device data. Some Verizon models remain permanently locked without viable exploits, as carrier firmware excludes bootloader unlock eligibility entirely, impacting devices such as the Moto G series purchased through Verizon.[34]
Other Platforms
Apple Devices
Apple's iOS devices, including iPhones and iPads, employ a highly integrated security architecture where the bootloader is locked by the Secure Enclave, a dedicated coprocessor that enforces cryptographic verification of boot components to prevent unauthorized code execution. This mechanism ensures that only signed firmware from Apple can load, isolating the main application processor from potential tampering. The Secure Enclave processes boot integrity checks independently, using hardware-rooted keys to validate each stage of the boot chain, making traditional bootloader unlocking impossible without exploiting low-level vulnerabilities.[35][36] For devices with A5 through A11 chips (iPhone 4S through X), permanent bootloader unlocking can be achieved using the checkm8 bootrom exploit, a hardware-level vulnerability in the boot ROM that allows entry into a pwned DFU mode, bypassing Secure Enclave protections. Discovered by security researcher axi0mX in 2019, checkm8 targets the ARM TrustZone implementation and cannot be patched via software updates since it resides in read-only boot ROM. Tools like ipwndfu leverage this exploit to flash custom bootloaders, enabling persistent modifications such as jailbreaks. For devices with A12 and later chips (iPhone XS and subsequent models), no such permanent hardware exploits exist as of November 2025, with modifications limited to temporary software-based jailbreaks where available.[37][38][39][40] Historically, iOS versions 4 through 10 exhibited greater vulnerability to jailbreaks due to less mature Secure Enclave implementations and exploitable kernel bugs, allowing widespread use of tools like redsn0w and evasi0n. Post-2018, Apple has aggressively patched many vectors through security updates, such as those addressing WebKit and kernel flaws in iOS 12 and later, significantly raising the bar for new exploits; for instance, iOS 12.1.4 included fixes for vulnerabilities that could enable privilege escalation. For A12 and later devices, software-based jailbreaks like unc0ver use kernel vulnerabilities to gain root access without altering the bootloader directly, though these are semi-tethered or untethered and require re-jailbreaking after reboots or updates, with support limited to older iOS versions (up to iOS 14.8 as of 2021). As of November 2025, no permanent bootloader unlocking methods are available for devices with A12 and later chips, with software-based jailbreaks increasingly restricted on iOS 15 and beyond. These methods invariably require physical access to the device and specialized tools, often running on a separate computer in DFU or recovery mode.[41][42][43] On the macOS side, Intel-based Macs with the T2 security chip (introduced in 2018) can bypass bootloader restrictions via USB DFU mode, exploiting a debug interface left enabled that allows forced entry into firmware update state for root access. This vulnerability, demonstrated in 2020, combines checkm8-like flaws in the T2's ARM-based core with USB-C messaging to load custom payloads, potentially disabling Secure Boot. For Apple Silicon Macs (M1 and later), bootloader unlocking remains limited, with no full permanent exploits available; however, users can officially adjust security policies in the Startup Security Utility (accessible in Recovery mode) to enable reduced security, allowing loading of unsigned kernel extensions from identified developers and booting from external media for development or legacy support. These approaches often involve tools like OpenCore for patching boot processes on compatible hardware, though they are not true bootloader unlocks.[44][45][46] Apple provides no official support for bootloader unlocking on any devices, explicitly warning that such modifications void warranties and expose systems to risks including permanent bricking from failed flashes or corrupted firmware. Unlocking is typically pursued for sideloading unsigned apps outside the App Store or performing firmware downgrades to vulnerable versions for further customization, but it compromises the device's integrity protections and increases susceptibility to malware. Physical access and precise execution are mandatory, with errors potentially rendering the hardware inoperable.[47][48]Microsoft and Miscellaneous Devices
Bootloader unlocking on Microsoft platforms primarily involved legacy tools for Windows Phone devices, particularly Nokia Lumia models, during the 2014-2016 period. The WPInternals tool, developed by the Windows Phone hacking community, allowed users to unlock the bootloader on supported Lumia devices running Windows Phone 8.1 or Windows 10 Mobile, enabling root access and custom firmware installation. This process also facilitated an "interop unlock," which permitted sideloading of unsigned applications and access to developer-only features otherwise restricted by Microsoft's ecosystem. However, these methods were limited to specific hardware variants, such as Lumia 520, 620, and 920 series, and required careful execution to avoid bricking the device.[49] For Windows RT devices, such as the Microsoft Surface RT tablet, bootloader unlocking relied on exploiting vulnerabilities in the UEFI secure boot implementation until a critical patch in July 2016. Prior to this update, researchers and enthusiasts used techniques like the "Golden Keys" method or USB-based payloads to bypass Unified Extensible Firmware Interface (UEFI) locks, allowing installation of alternative operating systems or unsigned code. The 2016 firmware update from Microsoft closed this loophole by strengthening secure boot verification, rendering further unlocks impossible on updated devices without hardware modifications. This effectively ended community-driven customization for Windows RT hardware post-patch.[50] On Google Chrome OS devices like Chromebooks, bootloader unlocking is achieved through enabling developer mode, a built-in feature that disables OS verification and allows booting custom kernels or alternative operating systems. Activating developer mode involves a hardware key combination during boot—typically Escape + Refresh + Power—followed by a confirmation to wipe all local data via a "powerwash" process, which resets the device to factory settings and erases user files. Once in developer mode, verified boot can be bypassed to load unsigned firmware, but system updates automatically re-enable verified boot unless the device remains in this mode, potentially requiring repeated reconfiguration. This approach, while accessible, compromises the device's security model and is intended for developers rather than end-users.[51] Asus ROG gaming phones previously supported bootloader unlocking via an official app provided by the manufacturer, which connected to Asus servers to verify and authorize the process for models like the ROG Phone 3 and 5. This tool enabled rooting and custom ROM installation, aligning with Asus's developer-friendly policies in the early 2020s. However, since August 2023, unlocking has become impossible due to the permanent shutdown of Asus's unlock servers, affecting all ROG models regardless of release date, as confirmed by support communications. No alternative official methods exist, leaving these devices locked to stock firmware.[52] A notable hardware-based example outside traditional mobile platforms is the SpaceX Starlink satellite terminal, where bootloader access was demonstrated through a fault injection attack in August 2022. Security researcher Lennert Wouters developed a $25 modchip that uses voltage glitching on the bootloader pins to bypass secure boot protections, allowing execution of custom code on the terminal's embedded processor. This non-software method requires physical access and soldering to the hardware but enables installation of unauthorized firmware, potentially for research or modification of satellite connectivity features. Unlike software unlocks, it highlights vulnerabilities in embedded systems where traditional bootloader tools are unavailable.[53]Relocking
Procedures
The process of relocking a bootloader generally involves re-enabling secure boot verification to restore the device's original security state, typically requiring the reinstallation of official stock firmware to ensure compatibility with verified boot mechanisms.[1] This step clears any modifications made during unlocking, such as custom recoveries or ROMs, and sets a persistent flag to enforce signature checks on subsequent boots.[1] On compatible Android devices, the primary command isfastboot flashing lock executed in bootloader mode, which performs a factory reset and locks the device against unauthorized flashes.[1]
For Android devices, the procedure varies by manufacturer but centers on reverting to stock firmware before issuing the lock command. On Google Pixel devices, users must first flash the official factory image using the Android SDK platform-tools to restore signed partitions, followed by entering fastboot mode (via adb reboot bootloader or volume key combinations) and running fastboot flashing lock to re-enable secure boot.[25][1] This process wipes all user data and verifies the bootloader state through Android Verified Boot, ensuring only OEM-signed images load. For Samsung devices, relocking entails downloading the official stock ROM from authorized firmware repositories and flashing it via the Odin tool in download mode, which includes the bootloader partition (BL) to restore secure verification; the device then auto-relocks upon reboot with unmodified stock software.[54] However, some Samsung models implement permanent locks after modifications, preventing relocking without service center intervention.[55]
Relocking on Apple devices is uncommon due to the tightly integrated secure boot chain, but it can be achieved by restoring a signed iOS version through recovery or DFU mode using official tools like Finder or iTunes, which reinstalls the full signed firmware and re-establishes the chain of trust from the boot ROM onward.[56][57] Exploits like checkm8, which target the immutable boot ROM on devices from iPhone 4S to X (A5 to A11 chips), create semi-permanent unlocks that cannot be fully reversed without hardware replacement, as the vulnerability persists across software restores.[58]
After relocking, verification confirms the process by booting into the bootloader mode, where a locked state displays no unlock warning and enforces signature checks via Android Verified Boot or Apple's Secure Enclave; commands like fastboot getvar all or visual indicators (e.g., a secure lock icon) can further attest to the status.[59][60] In some cases, particularly with carrier-locked devices, relocking may necessitate re-certification to restore network privileges or DRM levels like Widevine L1, though bootloader status itself remains independent of SIM unlocks.[61][62]