Conversation

Replying to
"It cannot be bypassed by modifying or tampering with the operating system (OS) because it receives signed device information from the device's Trusted Execution Environment (TEE) including the verified boot state, operating system variant and operating system version."
2
1
Replying to
My Auditor app implements hardware-based attestation, not software-based attestation like SafetyNet where an attacker controlling the kernel / OS can simply spoof the expected values. SafetyNet doesn't fail based on key attestation results and doesn't do any kind of pairing.
1
Replying to
I see - You say '[it]...cannot be bypassed without exploiting either the TEE or bootloader' - how would a compromised bootloader be able to work around this?
1
Replying to and
The baseline security properties come from generating a hardware-backed key and verifying signatures generated with that key. The hardware-backed keystore isn't usable if verified boot fails. Key attestation is in addition to that and could really use some improvements for this.
1