SuperSU, the fear and the plan

supersu

Let me start off by saying that we are grateful for everything that Chainfire has done for the community. From Mobile ODIN to SuperSU to FlashFire, the guy is a beast and has help the Android community more than anyone. That’s a fact. Thank you for everything you’ve done for us Chainfire!

We started using SuperSU at the beginning of 2014 and it still performs great! Chainfire has even work together with our very own Josh Chasky in getting our Pixel C (dragon) working with SuperSU. We love SuperSU! Back in September of 2015 the news broke out that Chainfire was selling SuperSU to a company named CCMT. We like everyone else had questions. Part of it was that was the unknown. We’re humans and is in our nature to get curious about the unknown. Back then we didn’t know much but that Chainfire had sold it to a company own by an individual or group of individuals that supposedly own other root apps and that it was a new company. A lot of rumors started to circulate. Everything from Chinese hackers to the owner of XDA to even Google. It got crazy and stayed crazy for a while but like all things, it died down. The community went back to using SuperSU and that was the end of it, at least until now.

A week or so ago, this conspiracy surfaced up again. Same demands, same arguments, just different usernames and more people shouting at the computer screen. We won’t take part in the mudslinging but we have to address this issue because Dirty Unicorns is a large AOSP project with many users and we do ship SuperSU with our builds as of right now. So allow me to put out the facts first.

1. We trust Chainfire. He’s a great contributor and developer and the community would not be the same without him.

2. CCMT has been pushing out updates for over a year now so if they were going to steal our soul here, they would of done it already.

http://forum.xda-developers.com/showpost.php?p=68546242&postcount=32

3. Chainfire has taken a look at their work and says that SuperSU is not collecting data even with the latest update, 2.78

http://forum.xda-developers.com/showpost.php?p=68540945&postcount=30

4. There’s been ZERO reports of anyone falling victim to identity theft that points back to SuperSU.

patrick

Here’s our plan!

We will continue to use SuperSU until there is something to talk about other than rumors and conspiracies. If SuperSU does stop working or there’s an issue that can’t be address by Chainfire or by us, we will move forward and use Koush’s open source alternative, Superuser.

screenshot_20160906-034714_1024

Superuser is what we were using back in 2014 when we switched to SuperSU. We’ve gone ahead and tested Superuser with our N builds (no ETA’s) and it performs good. We haven’t noticed any hiccups with any known root apps. I’ve had a few testers take it and try to make it crash or find issues and nothing.

So to wrap this up, please just know that we are prepared. If something does go wrong we will put this plan into motion but as of right now, we rather not jump to conclusions. Chainfire is a trustworthy developer and this company has been pushing updates for a year now so again, until there’s solid evidence of any wrong doing is business as usual!

Thank you again for your support!

#StayDirty

  • Langley Houge

    Good news.

  • Joshwin Aranha

    #StayDirty

  • Antonio Petrilli

    Who is the maintainer for the M8 dirty unicorns ?

  • Kevin Vesga

    What about phh’s superuser? I believe it is also based on Koush’s superuser but has active development.