That's what I want to know. If yes - awesome, if no - who can we
"request" to root that thing?!? If maybe - what are the risks I'm running into?
How can I aver those risks? Backup? System Restore? What are my options.
Thanks!
"request" to root that thing?!? If maybe - what are the risks I'm running into?
How can I aver those risks? Backup? System Restore? What are my options.
Thanks!