@hackbod So tell me because you said, “And there is no way you would have contactless payments without device integrity verification”.
Against what threats does that device integrity verification protect the user/system? The secrets are in the secure hardware enclave in mobile. The EMV protocol is designed to be cryptographically secure.
You should be able to publish the traffic on the Internet, and nothing bad happens.
You should be able to modify the traffic and the payment fails.
@yacc143
Okay given the false equivalence between Android and PlayStation; blanket dismissal of modern best practices of hardware security modules for software validation, at rest encryption and authentication and biometrics protection; and ignoring my points about the expectations and requirements of app developers... it seems clear there isn't really much opportunity for a discussion, so I am going to bow out.