Conversation

Replying to
To what extend can an app guarantee a state of the system when the underlying integrity is not verifiable? How do you know a sample is genuine (1) and (2) even if it is, we take the report from a system difficult to verify even if AOSP. I am really glad you cont. working on this
1
1
Replying to
There's verified boot for the entire operating system and information about it is surfaced via the key attestation feature. It provides a signed public key certificate for the key including verified boot state + fingerprint and versions of the boot, system and vendor images.
1
1
Replying to and
For example, consider an attacker compromising the OS after each boot and blocking updates to prevent fixing the vulnerabilities. Attestation will uncover the problem by showing that the OS is not truly being updated, even if the attacker tries to hide that information in the OS.
2
1
Replying to and
An attacker also can't pass off another attacker controlled device as the real device without compromising the hardware-backed keystore. For local verification, they would need to proxy back to the real device by relying on having network connectivity, which can be mitigated.
1
1
Show replies