Android SafetyNet Integrity Checks

The cluster discusses Android mechanisms like SafetyNet and Play Integrity for detecting device tampering, rooting, cracked apps, and ensuring integrity via app signing and attestation, including examples like McDonald's app and concerns over sideloading.

➡️ Stable 0.9x Security
3,986
Comments
20
Years Active
5
Top Authors
#8525
Topic ID

Activity Over Time

2007
1
2008
4
2009
19
2010
45
2011
67
2012
70
2013
129
2014
135
2015
126
2016
214
2017
198
2018
175
2019
272
2020
331
2021
518
2022
350
2023
377
2024
314
2025
618
2026
23

Keywords

APK e.g SafetyCheck ROM android.com OEM ycombinator.com i.e E.g OTA app apps google android attestation google play play code signing key

Sample Comments

out_of_protocol Jul 26, 2023 View on HN

E.g. McDonald's android app, at this moment. It doesn't launch on devices which fail Safety Net checks, i.e. modified firmware

entropy_ Oct 24, 2018 View on HN

If your app relies on server-side functionality to work, you should look into the SafetyNet Attestation API to see if you can block cracked apps from working by having the server refuse to talk to an app if it can't prove it was installed from google's app store.

parineum Sep 30, 2022 View on HN

That's really on the app. Google provides a flag to the app if they detect tampering, the app chooses to limit functionality.

therein Apr 13, 2025 View on HN

That sounds really good. What are the downsides? How does it fare in terms of PlayIntegrity and SafetyNet etc?

out_of_protocol Jul 26, 2023 View on HN

Many random apps do e.g. McDonald's app, and not just root but SafetyNet checks, which is way more strict than just root thing

Mathnerd314 Dec 12, 2025 View on HN

how does this interact with Google's push to sign all apps?

eythian Dec 14, 2018 View on HN

Applications are signed by Signal, so Google can't make fake ones.

the-rc Jul 1, 2021 View on HN

That's right, the transparency signature is not checked during installation. If you think somebody at Google might be out to get you and has all those powers and resources, there are many ways other than serving bespoke bundles, even with good old APK. Since they control the store and the system software that goes with it, they could download and save the original APK to give you some false sense of security, but apply a patch before extraction or code compilation. Or they could just crack

Dma54rhs Jul 6, 2022 View on HN

What's the point if you can't verify what they upload to play store / app store anyway? They can publish as code anything but that doesn't mean you run it.

coldcode Dec 4, 2022 View on HN

The main issue to me seems to be sideloading apps, playstore apps seem to be protected. Sideloaded apps could be anything since its the app key that is compromised.