Applications deliberately refusing to work on modded devices: Difference between revisions
Magnusmaster (talk | contribs) mNo edit summary |
Magnusmaster (talk | contribs) Add link |
||
Line 1: | Line 1: | ||
Applications running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer. | Applications running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer. | ||
==How it works== | ==How it works== | ||
Phones and PCs include a Trusted Platform Module: a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called | Phones and PCs include a Trusted Platform Module [http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&aid=1]: a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly remote attestation is impossible to spoof, even by the owner of the device. | ||
==Why it is a problem== | ==Why it is a problem== | ||
The owner of the phone is unable to do the following (while continue to use applications that | The owner of the phone is unable to do the following (while continue to use applications that block modded devices) | ||
* | *update the device operating system once it is no longer supported by the device manufacturer | ||
*use alternative operating systems such as Linux or other Android-based operating systems that add new features | *use alternative operating systems such as Linux or other Android-based operating systems that add new features | ||
*remove all bloatware | *remove all bloatware | ||
*access all data stored on the device | *access all data stored on the device | ||
Since many businesses and governments require their customers to download their proprietary application to their phones in order to use their services, and many of those applications refuse to work on a modded device, people are unable to modify their phone as they wish, or else they wouldn't be able to interact with those businesses that require or heavily encourage their app. | Since many businesses and governments require their customers to download their proprietary application to their phones in order to use their services, and many of those applications refuse to work on a modded device, people are left unable to modify their phone as they wish, or else they wouldn't be able to interact with those businesses that require or heavily encourage their app. | ||
==Examples== | ==Examples== |
Revision as of 02:37, 10 June 2025
Applications running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.
How it works
Phones and PCs include a Trusted Platform Module [1]: a chip that controls the device's main processor can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly remote attestation is impossible to spoof, even by the owner of the device.
Why it is a problem
The owner of the phone is unable to do the following (while continue to use applications that block modded devices)
- update the device operating system once it is no longer supported by the device manufacturer
- use alternative operating systems such as Linux or other Android-based operating systems that add new features
- remove all bloatware
- access all data stored on the device
Since many businesses and governments require their customers to download their proprietary application to their phones in order to use their services, and many of those applications refuse to work on a modded device, people are left unable to modify their phone as they wish, or else they wouldn't be able to interact with those businesses that require or heavily encourage their app.
Examples