Skip to main content

Don't Use Rooted Devices

When using Gem Wallet, maintaining the security of your crypto assets is a top priority. While Android devices are supported and provide excellent accessibility, we strongly advise against using rooted Android devices. Rooting, while popular among advanced users for customization, introduces significant risks that can compromise the security of your wallet and sensitive information.

What is a Rooted Android Device?​

Rooting is a process that gives users administrative access to their Android device. While this allows for extensive customization and control, it also bypasses many of the built-in security features provided by the Android operating system.

Developer Options Enabled Root Disabled

Why Rooted Devices Pose a Security Risk​

  1. Reduced Security Protections
    Rooting disables critical security measures like sandboxing and permission restrictions, making it easier for malicious apps to access sensitive data, including private keys stored in your wallet.

  2. Higher Risk of Malware and Exploits
    Rooted devices are more vulnerable to malware and exploits. Apps with elevated permissions can perform actions without user consent, potentially exposing your crypto assets to theft.

  3. No Guaranteed Updates
    Rooting often prevents users from receiving official software updates, including important security patches. This leaves devices exposed to known vulnerabilities.

  4. Compromised System Integrity
    Rooted devices are less stable and secure due to modifications that may affect the operating system’s integrity. This makes it harder to ensure the safety of sensitive apps like Gem Wallet.


Best Practices for Using Gem Wallet on Android​

To ensure a secure experience with Gem Wallet on Android devices, follow these guidelines:

  • Avoid Rooted Devices
    Stick to stock (unrooted) Android devices to benefit from the built-in security features designed to protect your data.

  • Download Apps Only from Official Sources
    Install Gem Wallet exclusively from official app stores like Google Play Store or directly from the Gem Wallet website to avoid malicious software.

  • Keep Your Device Updated
    Regularly update your device’s operating system and apps to receive the latest security patches.

  • Use Strong Device Security
    Enable a strong lock screen password or biometric authentication to add an extra layer of protection.

Final Thoughts​

Gem Wallet is designed to offer a secure and seamless experience on both Android and iOS devices. However, using a rooted Android device can compromise the security of your wallet and expose your assets to unnecessary risks. By choosing a non-rooted device and following best security practices, you can confidently manage your crypto with Gem Wallet.