Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I am reading more about Free / open source alternatives to Google's Play Integrity tooling, sometimes called "attestation".

I am reading more about Free / open source alternatives to Google's Play Integrity tooling, sometimes called "attestation".

Scheduled Pinned Locked Moved Uncategorized
androidunifiedattestatattestationfoss
14 Posts 7 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • neil@mastodon.neilzone.co.ukN This user is from outside of this forum
    neil@mastodon.neilzone.co.ukN This user is from outside of this forum
    neil@mastodon.neilzone.co.uk
    wrote last edited by
    #1

    I am reading more about Free / open source alternatives to Google's Play Integrity tooling, sometimes called "attestation".

    It is the ability for an app developer to set guidelines, which dictate whether an app can run on a user's computer or not.

    The more I read, the more important I feel it is for users to be in control.

    A user must be able to choose whether or not to follow an attestation guideline or not.

    Simply making attestation open source, without giving user's choice and control over what they can run on their computer, is insufficient.

    #Android #UnifiedAttestation #attestation #FOSS

    neil@mastodon.neilzone.co.ukN rogerbw@discordian.socialR jonpsp@mstdn.socialJ david_chisnall@infosec.exchangeD 4 Replies Last reply
    0
    • neil@mastodon.neilzone.co.ukN neil@mastodon.neilzone.co.uk

      I am reading more about Free / open source alternatives to Google's Play Integrity tooling, sometimes called "attestation".

      It is the ability for an app developer to set guidelines, which dictate whether an app can run on a user's computer or not.

      The more I read, the more important I feel it is for users to be in control.

      A user must be able to choose whether or not to follow an attestation guideline or not.

      Simply making attestation open source, without giving user's choice and control over what they can run on their computer, is insufficient.

      #Android #UnifiedAttestation #attestation #FOSS

      neil@mastodon.neilzone.co.ukN This user is from outside of this forum
      neil@mastodon.neilzone.co.ukN This user is from outside of this forum
      neil@mastodon.neilzone.co.uk
      wrote last edited by
      #2

      For corporate devices? Sure, up to the corporate to make those decisions.

      For users who are content to have attestation enabled? Sure! That's a valid choice.

      For users who want to choose what software they run on their own devices? They get to pick whether attestation is on or off generally, with the ability to apply or disapply the rules per piece of software too.

      1 Reply Last reply
      0
      • neil@mastodon.neilzone.co.ukN neil@mastodon.neilzone.co.uk

        I am reading more about Free / open source alternatives to Google's Play Integrity tooling, sometimes called "attestation".

        It is the ability for an app developer to set guidelines, which dictate whether an app can run on a user's computer or not.

        The more I read, the more important I feel it is for users to be in control.

        A user must be able to choose whether or not to follow an attestation guideline or not.

        Simply making attestation open source, without giving user's choice and control over what they can run on their computer, is insufficient.

        #Android #UnifiedAttestation #attestation #FOSS

        rogerbw@discordian.socialR This user is from outside of this forum
        rogerbw@discordian.socialR This user is from outside of this forum
        rogerbw@discordian.social
        wrote last edited by
        #3

        @neil What the bank thinks they're getting: if the device has some strange rootkit with flashing red and black, our app won't run so we won't have to pay for the customer's loss.
        What the bank is getting: the customer must sign over all their data to an American corporation that is complicit in genocide. Also the above, maybe.

        athanspod@social.linux.pizzaA 1 Reply Last reply
        0
        • neil@mastodon.neilzone.co.ukN neil@mastodon.neilzone.co.uk

          I am reading more about Free / open source alternatives to Google's Play Integrity tooling, sometimes called "attestation".

          It is the ability for an app developer to set guidelines, which dictate whether an app can run on a user's computer or not.

          The more I read, the more important I feel it is for users to be in control.

          A user must be able to choose whether or not to follow an attestation guideline or not.

          Simply making attestation open source, without giving user's choice and control over what they can run on their computer, is insufficient.

          #Android #UnifiedAttestation #attestation #FOSS

          jonpsp@mstdn.socialJ This user is from outside of this forum
          jonpsp@mstdn.socialJ This user is from outside of this forum
          jonpsp@mstdn.social
          wrote last edited by
          #4

          @neil I have concerns about the UK's promised digital ID. If it's dependent on Google Play Integrity (ignoring Apple phones for the moment), apart from not allowing people to use other operating systems (e.g. Sailfish) or Android forks, it will surely mean that if the American Government applies sanctions to someone, say for prosecuting war crimes, they effectively block someone from using the UK Digital ID app, thus making them a non-person.

          1 Reply Last reply
          0
          • neil@mastodon.neilzone.co.ukN This user is from outside of this forum
            neil@mastodon.neilzone.co.ukN This user is from outside of this forum
            neil@mastodon.neilzone.co.uk
            wrote last edited by
            #5

            @teezeh Yes, mobile devices (phones, tablets etc) are computers.

            1 Reply Last reply
            0
            • neil@mastodon.neilzone.co.ukN neil@mastodon.neilzone.co.uk

              I am reading more about Free / open source alternatives to Google's Play Integrity tooling, sometimes called "attestation".

              It is the ability for an app developer to set guidelines, which dictate whether an app can run on a user's computer or not.

              The more I read, the more important I feel it is for users to be in control.

              A user must be able to choose whether or not to follow an attestation guideline or not.

              Simply making attestation open source, without giving user's choice and control over what they can run on their computer, is insufficient.

              #Android #UnifiedAttestation #attestation #FOSS

              david_chisnall@infosec.exchangeD This user is from outside of this forum
              david_chisnall@infosec.exchangeD This user is from outside of this forum
              david_chisnall@infosec.exchange
              wrote last edited by
              #6

              @neil

              It's also entirely security / compliance theatre in most cases. The theory is 'I require attestation for client apps for using my service, and now I can make systematic guarantees about how it will interact with the service'. Things like Outlook's corporate email features that allow you to prevent copy-and-paste work like this: Exchange will send the message only to Outlook, something like InTune attests that this really is a valid version of Outlook.

              The problem is that these things are sitting on tens, if not hundreds, of millions of lines of C/C++ code that all must be 100% bug-free for the attestations to mean anything. A single vulnerability in any of the lower levels makes it possible for a malicious client to forge the attestation. So you don't really lock out anyone willing to put a little bit of effort into the attack but you do prevent a lot of legitimate use.

              mwelchuk@mastodon.socialM 1 Reply Last reply
              0
              • rogerbw@discordian.socialR rogerbw@discordian.social

                @neil What the bank thinks they're getting: if the device has some strange rootkit with flashing red and black, our app won't run so we won't have to pay for the customer's loss.
                What the bank is getting: the customer must sign over all their data to an American corporation that is complicit in genocide. Also the above, maybe.

                athanspod@social.linux.pizzaA This user is from outside of this forum
                athanspod@social.linux.pizzaA This user is from outside of this forum
                athanspod@social.linux.pizza
                wrote last edited by
                #7

                @RogerBW @neil Also ..

                What the banks thinks it's getting: Their app running on a phone that is 'secure', because its bootlocker is still locked.

                What the bank may well be getting: Their app running on a phone that is definitely not secure, because despite the locked bootloader, and passing SafetyNet (or whatever Google are calling it now)... it's no longer receiving updates, has multiple vulnerabilities, and has spyware up the wazoo as a result.

                1 Reply Last reply
                0
                • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                  @neil

                  It's also entirely security / compliance theatre in most cases. The theory is 'I require attestation for client apps for using my service, and now I can make systematic guarantees about how it will interact with the service'. Things like Outlook's corporate email features that allow you to prevent copy-and-paste work like this: Exchange will send the message only to Outlook, something like InTune attests that this really is a valid version of Outlook.

                  The problem is that these things are sitting on tens, if not hundreds, of millions of lines of C/C++ code that all must be 100% bug-free for the attestations to mean anything. A single vulnerability in any of the lower levels makes it possible for a malicious client to forge the attestation. So you don't really lock out anyone willing to put a little bit of effort into the attack but you do prevent a lot of legitimate use.

                  mwelchuk@mastodon.socialM This user is from outside of this forum
                  mwelchuk@mastodon.socialM This user is from outside of this forum
                  mwelchuk@mastodon.social
                  wrote last edited by
                  #8

                  @david_chisnall @neil I get your point, but feel you're very much down playing the effort it takes to find an exploit on a properly updated device.

                  Regardless of whether the systems provide perfect levels of security or not, arguably blocking the installation of their app on rooted devices limits their exposure to systems that can perform operations they wish to block

                  mwelchuk@mastodon.socialM david_chisnall@infosec.exchangeD 2 Replies Last reply
                  0
                  • imeddles@mastodon.eddmil.esI This user is from outside of this forum
                    imeddles@mastodon.eddmil.esI This user is from outside of this forum
                    imeddles@mastodon.eddmil.es
                    wrote last edited by
                    #9

                    @teezeh
                    Attestation absolutely can be used on general computers as well as mobile phones, I've been playing around with the Linux tooling for it recently. It's a technology which has some really positive potential use cases, but as with anything like this, the potential for abuse by corporate interests if they get control is high.
                    @neil

                    1 Reply Last reply
                    0
                    • mwelchuk@mastodon.socialM mwelchuk@mastodon.social

                      @david_chisnall @neil I get your point, but feel you're very much down playing the effort it takes to find an exploit on a properly updated device.

                      Regardless of whether the systems provide perfect levels of security or not, arguably blocking the installation of their app on rooted devices limits their exposure to systems that can perform operations they wish to block

                      mwelchuk@mastodon.socialM This user is from outside of this forum
                      mwelchuk@mastodon.socialM This user is from outside of this forum
                      mwelchuk@mastodon.social
                      wrote last edited by
                      #10

                      @david_chisnall @neil I think is may also allow them to restrict their app from being installed on systems that are on older versions of the OS which aren't going to be getting security updates, etc.

                      Please don't get me wrong, I much prefer running systems where I retain control to install and use things as I wish. Though I'm also under no illusion that rights holders and those that are regulated to ensure a level of safety for their users aren't going to be willing to support such systems.

                      mwelchuk@mastodon.socialM 1 Reply Last reply
                      0
                      • mwelchuk@mastodon.socialM mwelchuk@mastodon.social

                        @david_chisnall @neil I think is may also allow them to restrict their app from being installed on systems that are on older versions of the OS which aren't going to be getting security updates, etc.

                        Please don't get me wrong, I much prefer running systems where I retain control to install and use things as I wish. Though I'm also under no illusion that rights holders and those that are regulated to ensure a level of safety for their users aren't going to be willing to support such systems.

                        mwelchuk@mastodon.socialM This user is from outside of this forum
                        mwelchuk@mastodon.socialM This user is from outside of this forum
                        mwelchuk@mastodon.social
                        wrote last edited by
                        #11

                        @david_chisnall @neil There's a balance to be struck here. Unfortunately, this is something I'd argue that won't happen without regulation. But it is also super critical that the open source community learns how to effectively talk to politicians to ensure that our views are taken into account. This means we need to effectively show and communicate the harms that allowing the unlimited locking of systems presents to users, especially, say, their more vulnerable constituents.

                        mwelchuk@mastodon.socialM 1 Reply Last reply
                        0
                        • neil@mastodon.neilzone.co.ukN This user is from outside of this forum
                          neil@mastodon.neilzone.co.ukN This user is from outside of this forum
                          neil@mastodon.neilzone.co.uk
                          wrote last edited by
                          #12

                          @teezeh I am not sure that it really matters for this purpose whether someone does their computing on a phone, a laptop, a tablet, a desktop etc?

                          1 Reply Last reply
                          0
                          • mwelchuk@mastodon.socialM mwelchuk@mastodon.social

                            @david_chisnall @neil There's a balance to be struck here. Unfortunately, this is something I'd argue that won't happen without regulation. But it is also super critical that the open source community learns how to effectively talk to politicians to ensure that our views are taken into account. This means we need to effectively show and communicate the harms that allowing the unlimited locking of systems presents to users, especially, say, their more vulnerable constituents.

                            mwelchuk@mastodon.socialM This user is from outside of this forum
                            mwelchuk@mastodon.socialM This user is from outside of this forum
                            mwelchuk@mastodon.social
                            wrote last edited by
                            #13

                            @david_chisnall @neil And/or effectively communicating to them in terms the politicians understand how it will benefit their constituents.

                            We are generally terrible at doing this.

                            1 Reply Last reply
                            0
                            • mwelchuk@mastodon.socialM mwelchuk@mastodon.social

                              @david_chisnall @neil I get your point, but feel you're very much down playing the effort it takes to find an exploit on a properly updated device.

                              Regardless of whether the systems provide perfect levels of security or not, arguably blocking the installation of their app on rooted devices limits their exposure to systems that can perform operations they wish to block

                              david_chisnall@infosec.exchangeD This user is from outside of this forum
                              david_chisnall@infosec.exchangeD This user is from outside of this forum
                              david_chisnall@infosec.exchange
                              wrote last edited by
                              #14

                              @MWelchUK @neil

                              The problem is, you don't have to find an exploit on a properly updated device, you have to find an exploit on a device that you control, with an OS version that provides PCR values that the remote attestation thing trusts in building its chain of trust. That's a much easier problem, because you can usually use publicly disclosed vulnerabilities, often ones with PoCs attached to the disclosure.

                              Linux averages one CVE per 1.5 days. How hard do you think it is to find a local privilege elevation that can compromise an Android kernel or part of the attestation infrastructure?

                              1 Reply Last reply
                              1
                              0
                              • R relay@relay.infosec.exchange shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups