

Stares at rooted A13+ phone passing 2/3 new integrity checks
It’s possible, but it’s annoying.
I’m a little teapot 🫖
Stares at rooted A13+ phone passing 2/3 new integrity checks
It’s possible, but it’s annoying.
on devices running Android 13 or later.
Sounds easy then: stay on the latest Lineage that does not incorporate A13.
This isn’t viable. You can’t run an older android version than a device ships with and eventually older hardware will become obsolete enough that it won’t be able to connect to current gen mobile networks.
For now, sure, you can run android 12 on an older device and bypass integrity easily, but sooner or later that won’t be viable.
Gee it sure is good we have well funded competent national cybersecurity folks and didn’t lay a bunch of them off
Always remember to say please and thank you
Not enough plaid skirt IMO
I just had my morning coffee and I need to head to the bathroom to create some content
It’s pretty good at proving digital chain of custody. You could, for example, handle public records on a block chain.
I’ve been hoping for a game platform that tokenizes game licenses so that we can sell or gift them to others when we’re done with them - basically steam but you own your copy of the game and can sell it on. This is incredibly unlikely to happen though, a secondary market for digital licenses would eviscerate profits.
Legacy client support. Old devices running old browser code can’t support a new format without software updates, and that’s not always possible. Decoding jxl on a 15yo device that’s not upgradable isn’t good UX. Sure, you probably can work around that with slow JavaScript decoding for many but it’ll be slow and processor intensive. Imagine decoding jxl on a low power arm device or something like a Celeron from the early 2010s and you’ll get the idea, it will not be anywhere near as fast as good old jpeg.
The best I can do is an ML model running on an NPU that parses JSON in subtly wrong and impossible to debug ways
No, they’re absolutely not. Check out tricky store and play integrity fork to see how we’re faking a trusted environment on custom and rooted roms. You can pass new basic+device integrity (equivalent to old strong) with a valid unrevoked keybox on A13+ and strong on <A12.
It’s a new stage in the arms race for sure but it’s still possible to bypass until all of the keys used to sign keyboxes are revoked.
Edit: the device fingerprint is just as important as the keybox too, either can cause you to fail integrity checks. It’s way more annoying to manage than the legacy “just flash PIF” bypass ever was.