Comment by ChocolateGod

8 hours ago

You would have to somehow compromise the security coprocessors, even on Android where more of the system is open source, Play Integrity relying on this has killed pretty much all methods of tricking application code that the system is stock outside of downgrade attacks (by convincing the application the phone doesn't support newer verification methods).

We can run tasks on them that only produces valid output if the boot chains is verified.