Eli5: piracy of hardware auth software.

287 views

I’ve recently been puzzled about how manufacturers of pirated hardware can circumvent proprietary software and appear legit to an authentication server. Think fake AirPods appearing as legit on the iPhone. Or Sony headphones being able to register as legit on their app. Or fake smartwatches connecting to legit servers. And so on.

How come a manufacturer of cheap products with very little quality control or budget can manage to basically defeat a big corporation in making their products appear as legit?

In: 8

4 Answers

Anonymous 0 Comments

You can protect devices with private keys, but any HW can be glitched to spill it is out.

Once you have the details of one device then you can clone.

Anyway use Android instead.

You are viewing 1 out of 4 answers, click here to view all answers.