While Google actively advocates for the adoption of Rich Communication Services (RCS) messaging as the future of mobile communication, recent reports highlight a seemingly contradictory approach. Many users with rooted Android devices or devices running custom ROMs have encountered issues sending and receiving RCS messages through the Google Messages app.
Google’s Conflicting Stance on RCS Messaging: Exclusion of Rooted Android Devices and its Implications
This unexpected barrier stems from Google‘s implementation of Play Integrity API attestation checks within the app. These checks, similar to the older SafetyNet checks, aim to assess the integrity of the Android device. Any modification to the system, such as an unlocked bootloader or rooted access, triggers a negative response from the API. Potentially preventing apps from functioning normally.
Understanding the Rationale Behind Play Integrity API Checks
The use of Play Integrity API checks has sparked debate within the Android community. While the intended purpose of securing sensitive data within high-security applications like banking apps is widely accepted, the extension of these checks to encompass apps like Google Messages raises concerns. Proponents of this approach argue that it helps maintain a baseline level of security across the Android ecosystem. Potentially mitigating the risk of malware or unauthorized modifications disrupting core functionalities.
However, critics argue that the current implementation is overly broad and lacks nuance. They highlight the fact that rooted devices and custom ROMs. While technically deviating from the stock Android experience, do not inherently pose a security threat. In fact, many users choose to root their devices or use custom ROMs for reasons such as gaining access to advanced features, customization options, or improved performance – not for malicious purposes.