Apps deliberately refusing to work on modded devices: Difference between revisions

Magnusmaster (talk | contribs)
No edit summary
Magnusmaster (talk | contribs)
No edit summary
Line 3: Line 3:
==How it works==
==How it works==
Phones and PCs include a Trusted Platform Module  
Phones and PCs include a Trusted Platform Module  
<references><ref>{{Cite web |title= |url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1}}</ref>https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1</references>
<references>
<ref>{{Cite web |title=TPM - Trusted Platform Module (IBM) |url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1}}</ref>
</references>
<nowiki>:</nowiki> a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called hardware attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly hardware attestation is impossible to spoof, even by the device's owner.
<nowiki>:</nowiki> a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called hardware attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly hardware attestation is impossible to spoof, even by the device's owner.