Those of you who are familiar with jailbreaking, rooting or unlocking their smartphone will know that the tools that apply these modifications use an exploit – either in your device’s software or hardware – to get system-level access and allow other applications to do the same.

Continue reading... »