SuperSU is a discontinued proprietary Android application that can keep track of the root permissions of apps, after the Android device has beenrooted.[2][3] SuperSU is generally installed through a custom recovery such asTWRP.[4] SuperSU includes the option to undo the rooting.[5] SuperSU cannot always reliably hide the rooting.[6] The project includes awrapper library written inJava calledlibsuperuser for different ways of calling thesu binary.[7]
In September 2015, SuperSU was acquired by a Chinese company called Coding Code Mobile Technology LLC (CCMT), raising concerns about privacy and reliability, but Chainfire promised he was closely auditing the changes that CCMT made. MostAndroid users do not recommend using it now.[10]
In 2018, the application was removed from theGooglePlay Store[11] and the original developer Chainfire announced their departure of SuperSU development, although others continue to maintain it.[12] As of 2025[update], many users already switched toMagisk orKernelSU.[13]
^Immler, Christian (2016).Android Hacking Ihr Smartphone kann mehr, als Sie denken: Hacken Sie Ihr Gerät, bevor es andere tun ([1. Aufl.] ed.). Haar bei München. p. 54.ISBN978-3-645-60378-2.OCLC903695577.{{cite book}}: CS1 maint: location missing publisher (link)
^Elenkov, Nikolay (2015).Android Security Internals: an In-Depth Guide to Android's Security Architecture. San Francisco, CA: No Starch Press. p. 374.ISBN978-1-59327-581-5.OCLC896723300.