Conversation

I added some very primitive kernel event logging to running on my phone and dumped it to an azure data store and piped to sentinel. For the first time I feel like I might actually have a chance to know if someone owned my phone.
3
98
Since I assume most phone attacks will involve memory corruption you can grab a lot of loggin data around allocation patterns from kasan, scudo, or hardened allocator. Whether that’s going to be useful for a given exploit is anyone’s guess but you can have it!
6
22
Replying to and
So if you wire up those events, you can have your own version of what SafetyNet provides to Google. These aren't reported to end users by SafetyNet but rather it detects failed attempts at exploitation across the ecosystem for Google to monitor.
1
1
Replying to and
It's the main basis for them saying whether or not they think a patched vulnerability is being actively exploited outside of targeted attacks. If they have this logging set up for the patched vulnerability the patched devices end up acting as canaries detecting mass exploitation.
1
2
Show replies