It's trivial to circumvent automatic detection
Natanael
They probably do, but a very hardened version
I see what you did there
Most apps just use a custom intent scheme and thus you can in fact intercept
https://play.google.com/store/apps/details?id=com.aboutmycode.betteropenwith
It depends on what you're mimicking. Just registrering the URL scheme? Any app can do that. Mimicking a signed APK with full package name? Can't do that without root and privacy plugins for Magisk.
You can circumvent it using Intent intercept apps, so unless Whatsapp specifically looks for the APK and call it directly (and just use normal intent URL schemes) then you can simply redirect that request.
If it's IP blocked it still won't work, but most aren't
Samsung Xcover has all but a popup camera. Marketed for industrial use.
You need to add encryption on top with OTR plugins or equivalent
Or use Matrix where it's on by default
At least 3
Lots of services are both paid and still show ads. Like cable TV
Random fractal cloth patches for an irrational n