The hacking of consumer electronics is a common practice that users perform to customize and modify their devices beyond what is typically possible.
When this is stored in a mutable storage device, these files can be modified to add functionality to the operating system, or to replace it entirely.
Typically, a root shell is aimed for, which grants administrative privileges, to let the user modify operating system files.
Root access can be obtained through the use of software exploits (i.e. bugs), through the bootloader console, or over a serial port embedded in the device, such as a JTAG or UART interface.
An instance of this was when Naomi Wu requested the GPLv2 licensed source code of the Linux Kernel branch of a smartphone vendor.
Device manufacturers often include countermeasures to hinder hardware hacking, one of which is the use of cryptography to prevent unauthorized code from being executed.
Whistleblower Edward Snowden showed Wired correspondent Shane Smith how to remove the cameras and microphones from a smartphone.
[18][19] In around 2010, the High-bandwidth Digital Content Protection encryption system, which encrypts data running between cable boxes, Blu-ray players, and other similar devices and displays was cracked, and a copy of the master key needed to decrypt HDCP protected streams was posted on the internet.