Conversation

Replying to and
Those apps are choosing to depend on Play Services and use SafetyNet attestation to verify that it's a certified release without tampering. The issue is ultimately apps choosing to do that not Google improving SafetyNet attestation to make it less trivial for attackers to bypass.
2
Granting the ability to tamper with the core operating system and other applications breaks the security model for verified boot. There has to be a verified core OS not trusting the persistent state (including applications and their permissions) for the security model to work.
1
The hardware-based attestation provides basic information on verified boot state, patch level, etc. The hardware-based attestation feature supports chaining trust through the OS to the app and for that to be meaningful it has to protect Auditor from tampering by other apps, etc.
1
Show replies