• 1. What is "Root"?

    Root, no matter as a verb (root Android phone) or as a none (Android root software), means a priviledged access (Superuser permission) of your Android operating system. Let's take an easy example to illustrate this. Thinking yourself logged on a Windows computer as a guest account, which is similarly as you with your unrooted Android device, you can use applications, browse files, but you cannot make change in your system because you have no access. Rooting your Android is like logging on your computer as Administrator, which grants you the permission to alter files and customize it the way you like.

    Android Rooting

  • 2. How does "Kingo root" work?

    There are two universal ways to root your Android, one is by implementing "exploits", the other is through flashing custom recovery. The former one is relatively safe while the latter one can be risky. Kingo mainly focused on "exploits" method, but also covers "recovery" for certain tricky devices (hot ones with no exploit available).

  • 3. What is "exploit"?

    Every system/software has its vulnerability/loophole (a bug or glitch), which can be taken advantage of. This process, in the matter of Android rooting, we call it "exploit". As a result, it is highly possible that certain antivirus softwares may flag Kingo as malware. Kingo contains no malicious files and rest assured since the exploits is only applied to achieve one goal, get your device rooted, which is exactly why you use Kingo.

  • 4. Will Kingo work on your device?/ Is your device supported by Kingo?

    As stated before, Kingo mainly focused on "exploit" method. One thing about "exploit" is that there is no way to say which specific model is supported by the exploits kingo employed. Many vulnerabilities only present on a single device model or a subset of device models. Some bugs are only exploitable on a subset.
    And also, device models differ from each other:

    • Hardware (SoC, peripherals, CPU features, RAM size, etc)
    • Code changes (Made by various ecosystem players, Google, SoCs, OEMs, carriers, third parties.)
    • Compilation settings (ARM vs. Thumb)
    It just depends when it comes to the question of "support of not". It depends on your firmware version, latest firmware have less chance to be rooted. It depends on your hardware, and also your carrier. It depends on OEM patching. The best Kingo can provide is a summaried list based on our database (a lot of raw data). Instead of asking if it is supported or not, the better move may be just try and see.
  • 5. Device not listed on "Supported devices" page?

    For the same reason above.

  • 6. Why Kingo doesn't work anymore after you update your device?

    Because exploit (security loophole) present in one firmware will probably be patched with update. No exploit is permanent.

  • 7. Lose root after update, what can you do?

    If you want to have a chance to keep root after update, don't update with Kies or ODIN for samsung devices. Don't flash system partition. Always prefer OTA update and maybe use OTA survival feature in Superuser or SuperSU.

  • 8. Root succeed with no SuperUser installed after reboot?

    Two causes may be:

    • There is some additional protection on your device. (Occurs often on carrier-specific models like AT&T, or Manufacturers like HUAWEI)
    • Something goes wrong with SuperUser embedded in Kingo.
    There is no easy fix on the first cause. As to the second, please try and manually install Kingo Superuser application from Google Play.

  • 9. Will Kingo void your warranty?

    Yes, it indeed does. Rooting is essentially tampering with your device system. And it is strickly banned by manufacturers and carriers. If you want to return a phone with root access on it, and they happen to check it, they have every right to decline your request because your phone was tampered with.
    Rooting, in most cases, will not damage your hardware. It is merely a process of copying file to your system partition. SuperSU and Kingo all have "REMOVE ROOT/UNROOT" function built in themselves.
    As always, root at your own risk.

  • 10. Will you lose data during rooting?

    Theoretically, no. All kingo did during rooting process is moving files around. However, there is always a risk of "things happen" in any process. Only thing kingo can guarantee is that we will try as hard to make sure it is safe to use and minimize the possibilities of bad things.
    Always remember, Kingo only provided you a means of gaining root permission. It's what you do with this new found permission that actually change things.

  • 11. Will rooting brick your phone?

    See above.

  • 12. Get stuck. Root failed. What to do?

    Rule 101: Never Get Pissed!
    Take a deep breath. If still feel pissed, take a deeper one. Try again.
    Go to troubleshoot sector. Save log and contact support.

  • 13. Is Kingo malware? Why detected by antivirus software as malicious?

    The answer to this question may appear to be "he says what he says...". As stated before, the core of kingo rooting your device is through exploiting system vulnerabilities/security loopholes, which is and will always be "dangerous" to antivirus softwares. But in turn, using Kingo to root your device is your choice, and you are the one to employ these "dangerous" vulnerabilities, not being threatened by them. So rest assured.

  • 14. Can't OTA update after rooting?

    Firstly, you need to know that you may lose root after updating. Secondly, after rooting, have you uninstalled system apps, remove bloatware? If so, bingo, that's the reason. Failing upon OTA update installation is because the stock apps and bloatware being removed. Instead of removing them, you may try to freeze/disable it.

  • 15. Why don't you publish your source code?

    • We kind of hope, in the future, Kingo Android Root could generate revenue to support our staff (STILL FREE FOR USERS). We all know that, in the long run, interest alone cannot make a living. To develop better software, we need to be financially motivated aside from being driven by passion.
    • We manage to obtain root privilege of Android by exploiting certain undisclosed vulnerabilities, which we believe would be patched in no time once made public. And that would dysfunction this software that we've worked so hard for.