At&t Galaxy S6 Edge users have been waiting for the root access to come their way since the device started hitting their pockets. The good news has just come today. XDA senior member idler1984, who rooted a number of Galaxy S6 variants 3 days back has now successfully achieved root access on our beloved At&t Galaxy S6 Edge as well. The cake on cream is, idler1984’s PINGPONG Root Tool doesn’t trip the Knox counter and thus keeps the warranty of the device safe and secure. The tool doesn’t hurt the bootloader of the device in anyway. This is a great development as the carriers like At&t and Verizon make it too tough for developers to gain root access on their devices.
Now that the root access is available, you’re all good to explore the open-nature Android OS running on your device in the best possible ways. The root application will let you root the device in just one tap. In case you’re still wondering how you will be able to do this, the following guide is going to help you. We will root At&t Galaxy S6 Edge G925A without tripping the Knox counter. Let’s go ahead and get it done now.
Some Important Instructions
- This tool will work for At&t Galaxy S6 Edge G925A running the firmware build UCU1AOCE. Trying it on any other firmware may result in bricking your device.
- This tool is safe and secure. Using it to root your device will not harm it in any way, neither will it void the warranty of your device.
How To Root At&t Galaxy S6 Edge G925A Without Tripping Knox Using PingPong
- Download pingpongroot_beta5.1.apk
- Copy the downloaded APK file to your phone.
- Now go to settings > system > security > all unknown sources.
- Open file manager and locate the downloaded APK file.
- Tap the APK file and follow on-screen instructions to complete installation.
- Once done, open the installed PINGPONG ROOT application from the app drawer.
- PINGPONG Root will now automatically install SuperSU.
- Once SuperSU is installed, in order to activate it tap “Open”.
- SuperSu will display an error message and exit back to PINGPONG Root. This is normaly, so no need to worry about anything.
- Once you are in PINGPONG ROOT , tap the “Get Root” button now and see the magic!
- Reboot your device once done.
- You may uninstall PINGPONG application after rooting your device successfully.
- That’s it. Pretty easy, isn’t it?
- Also install BusyBox from Play Store.
- Verify root access using Root Checker.
- That’s all. You’re now set to unleash the open source nature of Android.
That’s all.
FAQ
What is Knox Counter?
Knox Counter is Samsung’s security service implemented in Samsung Galaxy devices. Knox components activated within the device do not let the root applications to work properly, while the Knox counter implemented on the bootloader of Samsung Galaxy device records the number of custom installations. Default value for Knox counter is 0, after voiding it becomes 0x1. Flashing any custom recovery or CF-Autoroot through Odin trips the Knox counter and users are not eligible for claiming the warranty of their device anymore. Samsung introduced Knox counter with the Galaxy Note 3. Thefeature made its way to other devices with software updates later on.
What is Root Access?
Rooting your phone gives you complete access over all the data which is apparently locked by the manufacturers or carriers. This includes removal of the factory restrictions and making changes to the internal system and the operating system. Gaining the root access gives you the privileges to install various applications to enhance the performance of your device, allows you to remove the built-in applications/programs, helps you to upgrade the battery life of your device & install the apps which require the root access for the proper functionality and modify your device in so many other ways e.g using mods and custom roms.
Don’t forget to checkout the top ten root applications!
When I attempt to install pingpongroot, I get error message: “There is a problem parsing the package.” I followed your guide to the letter. Any suggestions? Thanks!
@cangrejero:disqus can you please your device’s android version and build number details?