New blog post covering more #android #hacking and emulator bypasses:
Bypassing Hardware-Based Attestation Mechanisms for High-Security Android Apps (SafetyNet, Keystore, and StrongBox)
https://www.0x0v1.com/bypassing-hardware-based-attestation-mechanisms-for-high-security-android-apps-safetynet-keystore-and-strongbox-2/
=> More informations about this toot | More toots from 0v1@infosec.exchange
text/gemini
This content has been proxied by September (3851b).