Conversation

Replying to
"It cannot be bypassed by modifying or tampering with the operating system (OS) because it receives signed device information from the device's Trusted Execution Environment (TEE) including the verified boot state, operating system variant and operating system version."
2
1
Replying to
My Auditor app implements hardware-based attestation, not software-based attestation like SafetyNet where an attacker controlling the kernel / OS can simply spoof the expected values. SafetyNet doesn't fail based on key attestation results and doesn't do any kind of pairing.
1
Replying to
I see - You say '[it]...cannot be bypassed without exploiting either the TEE or bootloader' - how would a compromised bootloader be able to work around this?
1
Replying to
Exploiting the bootloader as it verifies the OS and then passing a fake result for the verification process to the TEE. The hardware-backed keystore would still be verifying the identity of the device but it would be attesting to a fake value from the compromised bootloader.
1
Show replies
Replying to and
Compromising the late stage bootloader during the verified boot process would also work since a fake verification result can be passed to the TEE. Either way, an exploit of the firmware is required. It's possible to fake UNPAIRED attestations with a leaked key but this app pairs.