Auditor: hardware-based intrusion detection Application icon

Auditor: hardware-based intrusion detection 80

2.8 MB / 10+ Downloads / Rating 4.6 - 48 reviews


See previous versions

Auditor: hardware-based intrusion detection, developed and published by Daniel Thompson Micay, has released its latest version, 80, on 2024-07-02. This app falls under the Tools category on the Google Play Store and has achieved over 1000 installs. It currently holds an overall rating of 4.6, based on 48 reviews.

Auditor: hardware-based intrusion detection APK available on this page is compatible with all Android devices that meet the required specifications (Android). It can also be installed on PC and Mac using an Android emulator such as Bluestacks, LDPlayer, and others.

Read More

App Screenshot

App Screenshot

App Details

Package name: app.attestation.auditor

Updated: 7 months ago

Developer Name: Daniel Thompson Micay

Category: Tools

New features: Show more

App Permissions: Show more

Installation Instructions

This article outlines two straightforward methods for installing Auditor: hardware-based intrusion detection on PC Windows and Mac.

Using BlueStacks

  1. Download the APK/XAPK file from this page.
  2. Install BlueStacks by visiting http://bluestacks.com.
  3. Open the APK/XAPK file by double-clicking it. This action will launch BlueStacks and begin the application's installation. If the APK file does not automatically open with BlueStacks, right-click on it and select 'Open with...', then navigate to BlueStacks. Alternatively, you can drag-and-drop the APK file onto the BlueStacks home screen.
  4. Wait a few seconds for the installation to complete. Once done, the installed app will appear on the BlueStacks home screen. Click its icon to start using the application.

Using LDPlayer

  1. Download and install LDPlayer from https://www.ldplayer.net.
  2. Drag the APK/XAPK file directly into LDPlayer.

If you have any questions, please don't hesitate to contact us.

App Rating

4.6
Total 48 reviews

Reviews

4 ★, on 2021-01-15
Would've like to try. Great idea. But have Moto G Stylus. Not supported.

5 ★, on 2020-01-04
What a brilliant idea... I did the reading and like the premise, alas my Xiaomi Mi Mix 2 isn't on the supported list... Keep thinking sideways my friend... Respect.

5 ★, on 2020-07-02
This is an excellent app to ensure your Android is running code as expected. I use it on all my Android devices. Excellent work

5 ★, on 2018-11-07
Great app, does exactly what described, respect to Daniel for taking the time to build something like this on the side.

4 ★, on 2020-06-29
Even though I am on stock android pixel 3, it says attestation error... How from user point of view I get more readable info? Tried responding to the developer contact mail with details, delivery failed...

5 ★, on 2020-03-13
Confirmed that my device does not have TEE. This new SafetyNet update is really worrisome for root users.

Previous Versions

Auditor: hardware-based intrusion detection 80
2024-07-02 / 2.8 MB / Android

Auditor: hardware-based intrusion detection 67
2023-02-19 / 2.8 MB / Android 8.0+

About this app

The Auditor app uses hardware security features on supported devices to validate the integrity of the operating system from another Android device. It will verify that the device is running the stock operating system with the bootloader locked and that no tampering with the operating system has occurred. It will also detect downgrades to a previous version. Supported devices:

* BlackBerry Key2 (BBF100-1 and BBF100-6 models)
* BQ Aquaris X2 Pro
* Google Pixel 2
* Google Pixel 2 XL
* Google Pixel 3
* Google Pixel 3 XL
* Google Pixel 3a
* Google Pixel 3a XL
* Google Pixel 4
* Google Pixel 4 XL
* Google Pixel 4a
* Google Pixel 4a (5G)
* Google Pixel 5
* Huawei Honor 7A Pro (AUM-L29 model)
* Honor 9 Lite (LLD-L31 model)
* Huawei Honor 10 (COL-L29 model)
* Huawei Honor View 10 (BKL-L04 and BKL-L09 models)
* Huawei Mate 10 (ALP-L29 model)
* Huawei Mate 20 lite (SNE-LX1 model)
* Huawei Mate 20 Pro (LYA-L29 model)
* Huawei P smart 2019 (POT-LX3 model)
* Huawei P20 (EML-L09 model)
* Huawei P20 Pro (CLT-L29 model)
* Huawei Y7 2019 (DUB-LX3 model)
* Huawei Y9 2019 (JKM-LX3 model)
* HTC EXODUS 1
* HTC U12+
* LG Stylo 5 (LM-Q720 model)
* LG Q Stylo 4 (LG-Q710AL model)
* Motorola moto g⁷
* Motorola One Vision
* Nokia 3.1
* Nokia 6.1
* Nokia 6.1 Plus
* Nokia 7.1
* Nokia 7 Plus
* OnePlus 6 (A6003 model)
* OnePlus 6T (A6013 model)
* OnePlus 7 Pro (GM1913 model)
* Oppo R15 Pro (CPH1831 model)
* Oppo A7 (CPH1903 model)
* Oppo A5s (CPH1909 model)
* Realme C2 (RMX1941 model)
* Samsung Galaxy A70 (SM-A705FN model)
* Samsung Galaxy Amp Prime 3 (SM-J337AZ model)
* Samsung Galaxy J2 Core (SM-J260A, SM-J260F and SM-J260T1 models)
* Samsung Galaxy J3 2018 (SM-J337A and SM-J337T models)
* Samsung Galaxy J7 (SM-J737T1 model)
* Samsung Galaxy M20 (SM-M205F model)
* Samsung Galaxy Note 9 (SM-N960F and SM-N960U models)
* Samsung Galaxy Note 10 (SM-N970F and SM-N970U models)
* Samsung Galaxy Note 10+ (SM-N975U model)
* Samsung Galaxy S9 (SM-G960F, SM-G960U, SM-G960U1, SM-G960W and SM-G9600 models)
* Samsung Galaxy S9+ (SM-G965F, SM-G965U, SM-G965U1 and SM-G965W models)
* Samsung Galaxy S10e (SM-G970F model)
* Samsung Galaxy S10+ (SM-G975F model)
* Samsung Galaxy Tab A 10.1 (SM-T510 model)
* Samsung Galaxy Tab S4 (SM-T835 model)
* Sony Xperia XA2 (H3113, H3123 and H4113 models)
* Sony Xperia XZ1 / XZ1 Compact (G8341 and G8342 models)
* Sony Xperia XZ1 Compact (G8441 model)
* Sony Xperia XZ2 (H8216 model)
* Sony Xperia XZ2 Compact (H8314 and H8324 models)
* T-Mobile REVVL 2
* Vivo 1807
* Xiaomi Mi A2
* Xiaomi Mi A2 Lite
* Xiaomi Mi 9
* Xiaomi POCOPHONE F1

It cannot be bypassed by modifying or tampering with the operating system (OS) because it receives signed device information from the device's Trusted Execution Environment (TEE) or Hardware Security Module (HSM) including the verified boot state, operating system variant and operating system version. The verification is much more meaningful after the initial pairing as the app primarily relies on Trust On First Use via pinning. It also verifies the identity of the device after the initial verification.

See the tutorial for detailed usage instructions. This is included as the Help entry in the app menu. The app also provides basic guidance through the process. See the documentation for a more detailed overview.

New features

See https://github.com/GrapheneOS/Auditor/releases/tag/27 for the release notes.

App Permissions

Allows applications to access information about networks.
Required to be able to access the camera device.
Allows applications to open network sockets.
Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting.