Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Just root with Magisk and add the app to the DenyList. Poof.


Can you please explain what this means? Is this a way to bypass rooted device detection aka attestation?


This will only work until Google starts mandating TEE attestation of bootloader status for SafetyNet.


Which will then be bypassed using some other way, just like every DRM so far ended up being cracked.


Sure, but can it be done in software, or will it require a scanning tunneling microscope?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: