Conversation

Replying to and
Those apps are choosing to depend on Play Services and use SafetyNet attestation to verify that it's a certified release without tampering. The issue is ultimately apps choosing to do that not Google improving SafetyNet attestation to make it less trivial for attackers to bypass.
2
SafetyNet attestation is just a weaker form of attestation than the standard hardware-based attestation feature provided by the Android Open Source Project on mobile devices. It doesn't really provide anything beyond portability to devices not launched with Android 8 or later.
Auditor can only support OSes leaving the security model for attestation and verified boot intact. If there's a way to grant root access to the application layer, that's not compatible with the security model. Verified boot accomplishes little if persistence as root is supported.
1
Show replies