Apps deliberately refusing to work on modded devices: Difference between revisions
Magnusmaster (talk | contribs) No edit summary |
Magnusmaster (talk | contribs) No edit summary |
||
Line 4: | Line 4: | ||
Phones and PCs include a Trusted Platform Module | Phones and PCs include a Trusted Platform Module | ||
<references> | <references> | ||
<ref>{{Cite web |title=TPM - Trusted Platform Module | <ref>{{Cite web |first=IBM |title=TPM - Trusted Platform Module |url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1}}</ref> | ||
</references> | </references> | ||
<nowiki>:</nowiki> a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called hardware attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly hardware attestation is impossible to spoof, even by the device's owner. | <nowiki>:</nowiki> a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called hardware attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly hardware attestation is impossible to spoof, even by the device's owner. |