“UID Masquerade: Knox Backend Injects 900+ Calls into User Context Over 24 Hours” > Backend process UID 10132 repeatedly invoked EnterpriseDeviceManager under user UID 1000, creating a sustained impersonation loop. This isn’t telemetry—it’s backend cont

What This Graph Shows

  • :puzzle_piece: ARM-setApplicationRestrictions (orange hexagons): backend policy pushes under UID 0
  • :package: EAM Registration (blue squares): MobileApplicationManagementService logging enterprise agents (MDM, Intune, SDS EMM)
  • :bullseye: Telemetry Routing (tPN.feedback, red circles): enforcement disguised as feedback
  • :dna: System Trigger (cPN: android/system, light blue circles): backend activation point
  • :link: Chained Enforcement Cycles: each sequence shows EAM registration → ARM push → telemetry route → system trigger

Looking for Advice , this doesn’t seem right knox is using my UID to move behind it seems why? I was hoping come on here and we could figure it out all this is just the opening, this normal?

1 Like