Applications deliberately refusing to work on modded devices: Difference between revisions
Magnusmaster (talk | contribs) mNo edit summary |
Magnusmaster (talk | contribs) fix references |
||
Line 1: | Line 1: | ||
Apps running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.<ref name=":0">{{title=Apps&Games need PI |url=https://xdaforums.com/t/apps-games-need-pi-list.4677050/ |website=XDA | Apps running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.<ref name=":0">{{Cite web |title=Apps & Games need PI |url=https://xdaforums.com/t/apps-games-need-pi-list.4677050/ |website=XDA Forums}}</ref><ref>{{Cite web |title=Configure API responses |url=https://developer.android.com/google/play/integrity/setup#configure-api |website=Google}}</ref> | ||
==How it works== | ==How it works== |
Revision as of 03:12, 10 June 2025
Apps running on Android and potentially other operating systems can detect if the device has been modded and refuse to function if that is the case. This can happen if the device allows the user to run applications as root or administrator, has an unlocked bootloader or runs a different operating system than the one provided by the manufacturer.[1][2]
How it works
Phones and PCs include a Trusted Platform Module [3]: a chip independent from the device's CPU and can only run software signed by the device manufacturer. This chip allows applications to use a technique called remote attestation to detect if the operating system has been tampered in any way and in such a case block functionality or refuse to work altogether. If done properly remote attestation is impossible to spoof, even by the owner of the device.
Why it is a problem
The owner of the phone is unable to do the following (while continue to use applications that block modded devices)
- update the device operating system once it is no longer supported by the device manufacturer
- use alternative operating systems such as Linux or other Android-based operating systems that add new features
- remove all bloatware
- access all data stored on the device
Since many businesses and governments require their customers to download their proprietary application to their phones in order to use their services (see Forced app download), and many of those applications refuse to work on a modded device, people are left unable to modify their phone as they wish, or else they wouldn't be able to interact with those businesses that require or heavily encourage their app.
Examples[1]
- Google Wallet
- VPN by Google for Pixel
- Netflix
- McDonald's App
- Google Messages (RCS does not work when device is modded)
- Uber Driver
- Twitter/X
- Twilio Authy Authenticator
References
- ↑ 1.0 1.1 "Apps & Games need PI". XDA Forums.
- ↑ "Configure API responses". Google.
- ↑ "Trusted Platform Module". Archived from the original on 2016-08-03.