GrapheneOS on Nostr: nprofile1q…fzr8z As an example, pretend that one of the 2 devices is compromised ...
nprofile1qy2hwumn8ghj7un9d3shjtnyd968gmewwp6kyqpqyrwhw6tgqnnrq2y7q7xh7dl6pdqxmpaenvqa49g8xy430ykfus9spfzr8z (nprofile…zr8z) As an example, pretend that one of the 2 devices is compromised and the attacker stops allowing security patches. This would be visible in the attestation metadata and the attacker wouldn't be able to fake it without an early boot chain or secure element exploit. It could similarly provide more than it does today such as warning if the device hasn't been rebooted for a certain amount of time. This would all work fine without root-based attestation. Our Auditor app provides this stuff.