crowbahr hey, thanks for expressing the interest.
Before someone gets the gory details, I'm curious how does your organisation reconcile Google-certified phones not getting updates since several years and considering vulnerable Android 12 or 13 (eg: Pixel 4) systems as safe/trusted (because certified by Google) - knowing many of these vulnerabilities could be used to temporarily root the device and hide this fact
At the same time GOS handset that passes hw attestation is not rooted and not modified. Basically pure, safer AOSP without privileged Google services :)
Last time I checked (few months ago), my ancient Xperia Z5 could still runs most of the apps, including two of my four banking apps.
I'm really just wondering what your position is, because it likely has been discussed in your team.
exactly what would fail in the Play check
Play Integrity API checker (gr.nikolasspyr.integritycheck) says my handset passes MEETS_BASIC_INTEGRITY but fails MEETS_DEVICE_INTEGRITY and MEETS_STRONG_INTEGRITY.
"appIntegrity": {
"appRecognitionVerdict": "PLAY_RECOGNIZED",
[...]
"deviceIntegrity": {
"deviceRecognitionVerdict": [
"MEETS_BASIC_INTEGRITY"
],
"recentDeviceActivity": {
"deviceActivityLevel": "UNEVALUATED"
},
"deviceAttributes": {
"sdkVersion": 36
}
},
"accountDetails": {
"appLicensingVerdict": "LICENSED"
},
"environmentDetails": {
"playProtectVerdict": "NO_ISSUES",
"appAccessRiskVerdict": {
"appsDetected": [
"KNOWN_INSTALLED",
"UNKNOWN_INSTALLED"
]
}
Thanks! (And thanks a lot for the interest, it may help other devs as well)