Superuser
Superuser copied to clipboard
evade crippled functionality
With an uptick of cheeky app developers attempting to discover root'd devices to deny or cripple app functionality needlessly perhaps it is prudent to consider methods of denying such untowardly frippery? and not via obfuscation.
Each app with legitimate su employment claims could prompt user for path to uniquely named su binary should the default su not be located. Additionally allowing end user to pad su binary to evade hash value discovery might be wise.
For consideration
http://repo.xposed.info/module/com.devadvance.rootcloak
those apps not so easily circumvented.