Scientific research on mobile device compliance
Comprehensive security testing application for Android devices to verify Level of Assurance (LoA) High compliance. Test your device's security features and ensure it meets high-level security standards.
Real-time device security analysis across 11 categories including hardware security, biometrics, and data protection.
Verify keystore, StrongBox, biometric protection, and tamper resistance features.
Get comprehensive test results with technical explanations and LoA High requirement references.
No personal data collection. All data is anonymized and stored locally on your device.
Run security tests without internet connection. Export results in multiple formats.
Part of Bachelor's Thesis on mobile device compliance with EUDI Wallet requirements.
Complete security test overview with device info, test results, and category breakdown
Transparent data collection and research purpose explanation
Initial app state before running any security tests
Detailed security analysis with pass/fail status for each test
Comprehensive explanations and technical information for each test
Full transparency and user control over data collection
Get the latest version of LoA High Tester and start testing your Android device's security compliance.
This app is not yet available on Google Play Store. You'll need to enable "Install from unknown sources" to install it.
Watch this step-by-step video tutorial to learn how to install apps from unknown sources on your Android device.
Video by: GuideRealm Videos • Original Video
This application is part of a Bachelor's Thesis focused on analyzing mobile device compliance with LoA High requirements for European Digital Identity (EUDI Wallet). We collect minimal technical data necessary for security research.
We believe in transparency and open source principles. This application is part of academic research, and we've made our source code partially available to demonstrate our commitment to transparency while protecting ongoing academic work.
Complete data structures showing exactly what information we collect and how it's organized
Device ID hashing, encrypted storage, and privacy protection mechanisms
Comprehensive API documentation and architecture overview
Note: This is a partial source code release for transparency purposes. The complete implementation will be available after thesis defense to protect academic work.