• Sign in
  • Sign up
Elektrine
EN
Log in Register
Modes
Overview Chat Timeline Communities Gallery Lists Friends Email Vault DNS VPN
Back to Timeline
  • Open on johnmastodon.eu

Rainer Typke

@rainer@johnmastodon.eu
mastodon 4.5.9

Computer scientist with a focus on music information retrieval, EU administrator, entrepreneur. All posts only reflect my private views, not those of an employer or company.

0 Followers
0 Following
Joined March 22, 2018

Posts

Open post
In reply to
rainer
Rainer Typke
@rainer@johnmastodon.eu

Computer scientist with a focus on music information retrieval, EU administrator, entrepreneur. All posts only reflect my private views, not those of an employer or company.

johnmastodon.eu
Rainer Typke
Rainer Typke
@rainer@johnmastodon.eu

Computer scientist with a focus on music information retrieval, EU administrator, entrepreneur. All posts only reflect my private views, not those of an employer or company.

johnmastodon.eu
@rainer@johnmastodon.eu · 2d ago
@TimothyRoes @soulsource @khleedril @K4mpfie @ErikJonker @pojntfx Apparently, the standard Android hardware attestation API can attest more than just the hardware. From https://grapheneos.org/articles/attestation-compatibility-guide "The standard hardware attestation API can be used to verify the authenticity/integrity of the hardware, firmware, OS and the app running on it. It provides a verified boot key fingerprint for the OS for permitting secure aftermarket operating systems. The app ID, signing key fingerprint(s) and version code of the app enabling hardware attestation are included in the signed public key certificate for the generated key. This enables the app's service to make sure the app is genuine and unmodified along with chaining trust through the OS to the app which can sign messages with the attested hardware keystore key to prove they come from their app running on top of a verified OS, firmware and hardware. The only practical way to bypass hardware attestation is through exploiting the hardware keystore to obtain attestation signing keys, which is protected against by the ability to revoke keys that are being misused. "
View full thread on johnmastodon.eu
4
0
0
0
Open post
In reply to
rainer
Rainer Typke
@rainer@johnmastodon.eu

Computer scientist with a focus on music information retrieval, EU administrator, entrepreneur. All posts only reflect my private views, not those of an employer or company.

johnmastodon.eu
Rainer Typke
Rainer Typke
@rainer@johnmastodon.eu

Computer scientist with a focus on music information retrieval, EU administrator, entrepreneur. All posts only reflect my private views, not those of an employer or company.

johnmastodon.eu
@rainer@johnmastodon.eu · 2d ago
@soulsource @TimothyRoes @khleedril @K4mpfie @ErikJonker @pojntfx This hardware attestation is Android-specific, but at least not tied to Google. That fixes a major problem for a major platform. One still needs a solution for serving the rest of the market in a similarly acceptable way, of course.
View full thread on johnmastodon.eu
4
1
0
0
Open post
In reply to
rainer
Rainer Typke
@rainer@johnmastodon.eu

Computer scientist with a focus on music information retrieval, EU administrator, entrepreneur. All posts only reflect my private views, not those of an employer or company.

johnmastodon.eu
Rainer Typke
Rainer Typke
@rainer@johnmastodon.eu

Computer scientist with a focus on music information retrieval, EU administrator, entrepreneur. All posts only reflect my private views, not those of an employer or company.

johnmastodon.eu
@rainer@johnmastodon.eu · 2d ago
@TimothyRoes @khleedril @K4mpfie @ErikJonker @soulsource @pojntfx I guess an alternative is described here: https://github.com/eu-digital-identity-wallet/eudi-app-android-wallet-ui/issues/390
View full thread on johnmastodon.eu
2
1
0
0
313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: mail.elektrine.com:993

POP3: pop3.elektrine.com:995

SMTP: mail.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 19:46:47 UTC