Comment by gruez
4 days ago
>and there's plenty of ways to pass even the strictest Play Integrity checks.
Examples? My impression is that strong integrity is hard to spoof because it's validated through hardware attestation.
4 days ago
>and there's plenty of ways to pass even the strictest Play Integrity checks.
Examples? My impression is that strong integrity is hard to spoof because it's validated through hardware attestation.
By taking the hardware keys of a compromised device and using it to emulate key master calls
See TrickyStore for more info
How do you get unrevoked keys? Searching around it seems like there aren't any public sources for said keys, and they're only available in semi-public telegram channels. Even then, it's a cat and mouse game, and the more popular the key, the more likely it'll get revoked.