Molly’s remote attestation concept
At its core, Molly’s remote attestation is about verifying the person on the other end by verifying their device. When both people turn it on, each phone proves that Molly is running on that device with the operating system in a known-good state. It’s built on Android’s hardware-backed key attestation and Verified Boot, the same chain of trust that controls whether a Pixel will even start if the system has been tampered with. In plain terms: we’re not just trusting a phone number or a safety code, we’re getting a cryptographic statement from the device’s secure chip about its own integrity.
What does that actually check? The phone proves its bootloader is locked and reports the verified boot state, along with data that lets Molly “pin” the device’s boot key and a fingerprint of the OS image. The attestation includes Molly’s package/signing identity, so a modified or fake client will show up as Not Molly and the badge fails. In short: unlocks, downgrades, OS tampering—or using anything other than genuine Molly—get caught.
The attestation includes the android version and security patch levels, so Molly can show a clear status like “verified device / patch level: 2025-10” and warn if a phone falls behind, for example, if the patch level is older than a month. This turns abstract security posture into something we can actually act on: keep chatting with confidence when it’s green; nudge your contact to update when it’s stale; pause if the device has drifted from what you both pinned.
The proof is exchanged device-to-device inside the existing end-to-end encryption; there’s no server and no third-party metadata. Android treats hardware key attestation and “ID attestation” as separate things; we don’t need to include serial numbers or IMEIs to verify device integrity, and GrapheneOS is designed with this model in mind. In other words, you gain a strong signal about device state without exposing personal identifiers or who’s talking to whom.
Why this is a game changer? It upgrades trust from “the keys match today” to “the right app on a verified device that is up to date, every time.” It catches silent compromises (unlocking, tampering, downgrades), it supports GrapheneOS by allowing us to pin its official boot keys, and it’s anchored in the same hardware security android itself depends on to protect the platform.