Skip to main content

Identity Masking

Corellium's default deployment of devices have powerful additional features for introspection, jailbreaking, orchestration, research, and more. As with all virtual machines, these features can provide indications that the device is a virtual device, versus a real physical device.

Corellium provides users the ability to alter how the device appears, including concealing that a device is jailbroken, and much more.

We publicly document how to customize your device's unique identifiers. For more advanced capabilities, contact us for documentation and guidance on leveraging these powerful features.