rene_mobile’s avatarrene_mobile’s Twitter Archive—№ 3,525

      1. Xposed has always been an interesting debugging/analysis/research tool, and we have used it as such in our previous work (e.g.usmile.at/user/66/publications / github.com/baer-devl/DAMN). HW key attestation with security modules (security.googleblog.com/2017/11/lock-it-up-new-hardware-protections-for.html) will still detect unprotected boot. @xdadevelopers/951134817692811264
    1. …in reply to @rene_mobile
      As @collinrm and @ikoz recently presented as well (mulliner.org/collin/publications/eu-17-Mulliner-Kozyrakis-Inside-Androids-SafetyNet-Attestation.pdf), hardware attestation is the game changer. Try e.g. with github.com/divegeek/AttestationExample by @shawnwillden to verify boot state from outside of (potentially tampered with root hiding) Android runtime.
  1. …in reply to @rene_mobile
    Note that e.g. on Pixel 2 devices, all this protection is available even for custom firmware if you check with your root key (and it is being used already: @CopperheadOS/951617012215640064).