Skip to main content

3 posts tagged with "resigned-ios"

View All Tags
PartialDevice farm

Radar / Bet Saracen AR: VMOS not detected — but PlayCover + resigned iOS blocked ✓

RadarBetSaracen
radarsaracenvmosplaycoverresigned-ios

Source. May 11, 2026 weekly sync. Test video: BetSaracen VMOS Test.mov (internal Drive).

What we tested

Three spoof vectors against Bet Saracen AR (Radar): VMOS Android device-farm, PlayCover sideloading on ARM-based macOS, resigned iOS app.

What happened

  • VMOS (Android)NOT detected. Out-of-state bet placed from Tennessee.
  • PlayCover (ARM macOS)detected and restricted
  • Resigned iOS appdetected and blocked

Why it matters

The mixed result confirms Radar's posture is per-vector-uneven: catches the ARM-macOS hardware-abstraction vector and resigned iOS app integrity, but the Android VMOS device-farm slips through. This is also the second operator (after FanDuel WV) where the same VMOS gap shows up — a structural Android detector issue.

Radar profile → · FD WV three-method bypass → · May 11 weekly sync →

DetectedResigned / tampered app

Radar / Saracen AR: resigned iOS app detected with clear error messaging ✓

RadarBetSaracen
radarsaracenresigned-iospositive

Source. April 7, 2026 weekly sync.

What we tested. Re-signed iOS app on Bet Saracen Arkansas.

What happened. Radar successfully detected the resigned app and displayed appropriate error messaging — betting activity was prevented, and the account was not auto-blocked. Clean result.

Cross-reference. Contradicts the FD WV result from March 31, where the same attack class went undetected and bets were placed from TN. Two operators, two different outcomes for the same exploitation method — points to inconsistent / operator-specific detector behaviour in Radar's SDK. Follow-up validation scheduled pending the next iOS app release.

Radar profile → · March 31 FD WV failure → · April 7 weekly sync →

MissedResigned / tampered appCompliance★ Pinned

Radar / FanDuel WV: tampered iOS app placed bets from Tennessee

RadarFanDuel
radarresigned-iosfanduel-wv

What we tested. Re-signed iOS FanDuel app, modified to bypass security controls. Tester located in Tennessee, targeting the FanDuel WV platform.

What happened. The modified build successfully placed bets from out-of-state. Radar failed to detect the modification.

Cross-reference. Contradicts the Apr 7 result at Bet Saracen AR, where Radar DID detect a re-signed iOS app with appropriate error messaging. Re-signed iOS detection is inconsistent across operators — fix one, the other still fails.

Why it matters. App-resigning is a well-known attack class. A regulator audit that includes a tampered-app test will not accept an inconsistent result.

Radar profile →