Apps deliberately refusing to work on modded devices: Difference between revisions

Magnusmaster (talk | contribs)
Add link
Magnusmaster (talk | contribs)
No edit summary
Line 2: Line 2:


==How it works==
==How it works==
Phones and PCs include a Trusted Platform Module [http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1]: a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly remote attestation is impossible to spoof, even by the owner of the device.  
Phones and PCs include a Trusted Platform Module <ref>{{Cite web |title=Trusted Platform module |url=http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1 |archive-url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1}}</ref>: a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly remote attestation is impossible to spoof, even by the owner of the device.  
==Why it is a problem==
==Why it is a problem==
The owner of the phone is unable to do the following (while continue to use applications that block modded devices)
The owner of the phone is unable to do the following (while continue to use applications that block modded devices)