upvote
> I'm not privy to device-wide bypasses of Play Integrity that ship with Trusted Execution Environment (which is pretty much all ARM based Androids), Secure Element, and/or Hardware Root of Trust, but I'd appreciate if you have some significant exploit writeups (on Pixels, preferably) for me to look at?

Hi, you don't have the break the control on the strongest device. You only have to break it on the weakest device that's not blacklisted.

The situation is getting better as you note, but in the past the problem was that a lot of customers have potatos and you get a lot of support calls when you lock them out.

> think Pacemaker / Insulin monitoring apps; government-issued IDs; financial instruments like credit cards; etc

I agree with you on the need for trustworthy computing. I mainly disagree on who should ultimately control the trust roots.

reply
We can only hope they continue to be found so there would at least be a small cost for this kind of indignity.
reply
> Insulin monitoring apps

A monitoring app doesn't even interact with systems you don't own. Just put a liability disclaimer for running modified versions.

> warranted

Decided by whom? And why is Google trusted, not me? At minimum, I shouldn't face undue hardship with the government due to refusing to deal with a third party, unless we first remove most of Google's rights to set the terms.

reply
> A monitoring app doesn't even interact with systems you don't own. Just put a liability disclaimer for running modified versions.

This is unserious when Insulin overdose can be fatal.

> And why is Google trusted, not me?

(Hardware-assisted) Attestation on Android doesn't require apps to "trust Google".

reply