upvote
Apple has their own remote attestation infrastructure and you will not be able to impersonate an Apple device without extracting private key material from the secure enclave of a legitimate Apple device or compromising Apple certificate authority private keys.
reply
Can they present themselves as... web browsers?
reply
Yes, and then they'll get served a QR code that you have to scan on a phone Google approves of.
reply