Right to root access

Scope of “right to root” and ownership

  • Many argue that if you own a computing device, you should be able to run any software on it, including replacing the OS and firmware.
  • Others counter that vendors have no obligation to support or expose root; they can sell “appliance-like” devices as long as this is disclosed.
  • Several posts tie root to property rights (right to exclude, right to repair), claiming locked bootloaders effectively mean you don’t fully own the device.
  • Some suggest legal protections should also restrict “fake ownership” models (perpetual licenses, rentals) that sidestep these rights.

Security, malware, and threat models

  • One camp worries that easy rooting massively increases malware, stalkerware, scams, and physical attacks (e.g., customs, police, thieves altering firmware).
  • Others say this is overblown: desktop OSes have long allowed admin/root, and security can be preserved via encryption, user-controlled locks, and good OS design.
  • Debate over whether bootloader unlocking actually weakens security if it forces a full wipe and shows visible warning states.
  • Hardware enclaves / TEEs are highlighted as a deeper loss of control: even with root, keys and some code remain outside user reach.

Vendor lock-in, attestation, and app restrictions

  • Many complain that banking, DRM, and government apps refuse to run on rooted or custom ROM devices, and that hardware attestation increasingly enforces this.
  • Some defend app vendors’ right to refuse “insecure” platforms; others note this is often inconsistent and anti-competitive, not genuinely about security.
  • Remote attestation and TEEs are seen as tools that can be used for anti-user measures (blocking VPNs, enforcing national ID apps, killing FOSS OSes).

Consumer choice vs regulation

  • One side: locked and unlocked devices should coexist; if you want openness, buy open hardware or Android; if you want “can’t be messed with,” buy iOS.
  • Other side: market isn’t really offering that choice—unlockable devices are shrinking, duopolies and network effects dominate, and regulation is needed.
  • Skeptics doubt political feasibility (even net neutrality is hard) and warn poorly scoped laws could kill general-purpose computing or be easy to evade.

E‑waste, longevity, and sustainability

  • Locked devices that can’t be repurposed after support ends are criticized as avoidable e‑waste.
  • Examples: phones, TVs, Sonos-like gear, and auto “Car Thing” style devices that become bricks.
  • Some point to thriving hacking communities around abandoned hardware as proof of the value of openness, and argue open devices are essential for true sustainability.

Implementation ideas

  • Common proposals:
    • Bootloader unlock requiring full wipe and explicit, non-trivial consent.
    • Hardware switches, internal jumpers, or screws to enable “developer mode,” possibly visibly tamper-evident.
    • Ability to add your own keys then re-lock, preserving secure boot but under owner control.
  • Disagreement remains on whether certain classes (implants, cars, critical infrastructure) should be treated as exceptions or strengthened examples of the same right.