Apps deliberately refusing to work on modded devices: Difference between revisions
Magnusmaster (talk | contribs) No edit summary |
Magnusmaster (talk | contribs) No edit summary |
||
Line 3: | Line 3: | ||
==How it works== | ==How it works== | ||
Phones and PCs include a Trusted Platform Module | Phones and PCs include a Trusted Platform Module | ||
<references><ref>{{Cite web |title= |url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1}}</ref> | <references> | ||
<ref>{{Cite web |title=TPM - Trusted Platform Module (IBM) |url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1}}</ref> | |||
</references> | |||
<nowiki>:</nowiki> a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called hardware attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly hardware attestation is impossible to spoof, even by the device's owner. | <nowiki>:</nowiki> a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called hardware attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly hardware attestation is impossible to spoof, even by the device's owner. | ||