Hardware Attestation as Monopoly Enabler
Attestation as Monopoly and Control Tool
- Many see hardware attestation (Play Integrity, App Attest, Pluton, etc.) as turning general-purpose devices into gatekept platforms controlled by a few vendors.
- Concern: banks, governments, and identity wallets are moving to require attested iOS/Android devices, effectively tying access to core services to US mobile duopoly and enabling hardware-based discrimination.
- Attestation is viewed as “web DRM”: even if you can install other OSes, they become second-class citizens or completely blocked.
Security Value vs “Security Theater”
- Critics argue “approved” ≠ “secure”: uncertified systems (e.g. hardened Android forks, desktop Linux) can be more secure than attestation-passing stock phones.
- They note practical bypasses (physical attacks, malware gaining root after boot, fake banking apps) and that many insecure, unpatched devices still pass attestation.
- Defenders argue institutions likely see strong fraud correlation with “unapproved” devices, analogous to fare-gate stats: blocking them is a cheap, high-ROI risk reduction.
Impact on Users and Open Alternatives
- People report already being excluded (e.g. by reCAPTCHA loops, WhatsApp-only groups, app-only ordering, ID-wallet requirements), leading them to drop services or ride alone.
- Network effects make “just build an alternative web/service” mostly unrealistic; clones lack users and vendor APIs.
- Dual-boot or side OS ideas are criticized as breaking secure-boot chains and still failing attestation.
Government, Law, and Democracy
- Strong sentiment that this is a political, not technical, problem: law is needed to outlaw hardware/software discrimination or mandatory DRM, rather than micromanaging silicon.
- EU gets both praise (DMA/DSA, killing ChatControl—for now) and harsh criticism (EUDI wallet depending on Google/Apple attestation, age verification, perceived capture and lobbying).
- Debate over whether democracy can effectively counter corporate power vs. systemic corruption/incompetence and voter apathy.
Cryptography, TPMs, and Identity
- Dispute over whether asymmetric crypto is to blame; most say it’s neutral and foundational (HTTPS, SSH), misuse is the issue.
- TPMs and secure enclaves are seen as valuable for user-held secrets and passkeys, but dangerous when the root keys and attestation are not under user control.
- Various proposals: independent/non-profit attestation authorities, external smartcards, anonymous/blind-signature-based attestation, or state-backed “soul-bound” identity keys—often rejected as either impractical, centralizing, or easily subverted.
What To Do
- Suggested responses: switch banks/services that don’t demand locked devices, support open OSes, push regulators (DMA complaints, letters to EU/US reps), join digital rights groups, and publicly frame the issue as property rights and anti-monopoly rather than niche “hacker” concerns.