Apps deliberately refusing to work on modded devices: Difference between revisions

Magnusmaster (talk | contribs)
Drakeula (talk | contribs)
How it works: TPM link
 
Line 1: Line 1:


Apps running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.<ref name=":0">{{Cite web |title=Apps & Games need PI |url=https://xdaforums.com/t/4677050/ |website=XDA Forums}}</ref><ref>{{Cite web |title=Configure API responses |url=https://developer.android.com/google/play/integrity/setup#configure-api |website=Google}}</ref>  
Apps running on [[Android]] and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.<ref name=":0">{{Cite web |title=Apps & Games need PI |url=https://xdaforums.com/t/4677050/ |website=XDA Forums}}</ref><ref>{{Cite web |title=Configure API responses |url=https://developer.android.com/google/play/integrity/setup#configure-api |website=Google}}</ref>  


==How it works==
==How it works==
Phones and PCs include a Trusted Platform Module <ref>{{Cite web |title=Trusted Platform Module |url=http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1 |archive-url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1 |archive-date=2016-08-03}}</ref>: a chip independent from the device's CPU which can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered with, and if so will block functionality or refuse to work altogether. If done properly, remote attestation is impossible to spoof, even by the owner of the device.  
Some phones and PCs include a [[Trusted Computing|Trusted Platform Module]] <ref>{{Cite web |title=Trusted Platform Module |url=http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1 |archive-url=https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1 |archive-date=2016-08-03}}</ref>: a chip independent from the device's CPU which can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered with, and if so will block functionality or refuse to work altogether. If done properly, remote attestation is impossible to spoof, even by the owner of the device.  
==Why it is a problem==
==Why it is a problem==
The owner of the phone is unable to do the following (while continuing to use applications that block modded devices)
The owner of the phone is unable to do the following (while continuing to use applications that block modded devices)