Which two methods are commonly used to remove the default restrictions and protections added to mobile operating systems? (Choose two.)