UltraLocked

Tamper & Device Protection

How UltraLocked Verifies Your Device's Security

Before allowing access, UltraLocked performs a series of checks to verify the integrity of your device. This includes searching for signs of jailbreaking and using Apple's services to confirm your device is running genuine, unmodified software.

A secure vault requires a secure foundation. UltraLocked's device verification process ensures that the operating system itself can be trusted. This is a crucial step in preventing advanced attacks.

Key Security Checks

1. Jailbreak & Root Detection

UltraLocked actively scans for indicators that your device has been jailbroken. A jailbroken device removes many of Apple's built-in security protections, making your data vulnerable. We check for:

  • Suspicious Files and Apps: The presence of apps like Cydia or system modification tools.
  • Unauthorized System Access: Attempts to write files to restricted parts of the operating system.
  • Modified System Behavior: Changes in system calls or process behavior that indicate a compromised environment.

If a jailbreak is detected, access to your vault may be restricted or disabled entirely.

2. Hardware Attestation with DeviceCheck

This is a powerful check that uses Apple's servers to verify your device's integrity.

  • The app generates a unique, temporary key on your device.
  • It asks Apple's servers to "attest" to the key, essentially asking, "Is this key coming from a genuine Apple device running an unmodified version of iOS?"
  • Apple's servers cryptographically verify your device's hardware and software and sign the key.
  • UltraLocked confirms this signature. If it's valid, we know your device can be trusted at a hardware level.

3. Code Integrity & Anti-Debugging

The app also performs self-checks to ensure its own code has not been tampered with or repackaged with malicious additions. It simultaneously checks for and blocks any attempts by debuggers or forensic tools to inspect its memory while it's running.

Why This Matters

These checks are designed to defeat advanced adversaries who may have physical access to your device. By ensuring the integrity of the device itself, we make it exponentially harder for an attacker to bypass UltraLocked's protections.