🔐Spoof locked bootloader | "Bypass" TEE check - Xposed Framework Modules

Modify the root of trust in local attestations.​
This module modify the byte array obtained from certificate extensions (link) to spoof a fake root of trust, so we get a fake attestation with a locked bootloader.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
More info about certificate extensions:
Verifying hardware-backed key pairs with Key Attestation | Android Developers
A tool for verifying security properties of hardware-backed key pairs.
developer.android.com
NOTES:
- This module doesn't work with devices which TEE is broken, like OnePlus.
- You won't pass MEETS_STRONG_INTEGRITY using this.
Source code and download:
GitHub - chiteroman/BootloaderSpoofer: Spoof a locked bootloader in local attestations
Spoof a locked bootloader in local attestations. Contribute to chiteroman/BootloaderSpoofer development by creating an account on GitHub.
github.com
Apps detecting a locked bootloader:
- Key Attestation Demo (WORKING)
- CIB Egypt Mobile Banking (WORKING)
- Bet365 Authenticator (NOT WORKING)

swer45 said:
Spoofs a fake root of trust in local attestations.​NOTE: this Xposed module won't help you to pass MEETS_STRONG_INTEGRITY in Play Integrity API.
It only works in local attestations, for example, Key Attestation Demo or some bank apps like CIB.
If you are a developer and want to check if the device has an unlocked bootloader, never trust user data. You must send to a secure server the X509Certificate and check the attestation extension in that server, or use Play Integrity API. NEVER TRUST USER DATA BECAUSE THINGS LIKE THIS MODULE MAY HAPPEN
Also Play Integrity API isn't perfect, I can pass MEETS_STRONG_INTEGRITY with my unlocked bootloader device.
Sooo, don't check nothing. Lets users do whatever they want with their devices.
Like safetynet-fix by kdrag0n, this should be implemented in custom ROMs, so Xposed won't be required and can't be detected by apps like Momo.
View attachment 5911247View attachment 5911245
You can get a locked bootloader with this
I'm working in Zygisk module.
Repo and download: https://github.com/swer45/AttestationSpoofer
Click to expand...
Click to collapse
What apps to choose in LSPosed module settings? Google Play, Google Services, System Framework???

Moreover, it's fully compatible with USNF Mod of Displax or SN Sensitive Props of HuskyDG please ?
Really sorry, because it's rather on this thread that I had to ask this question
Edit : Again sorry for the inconvenience, because here is the answer

innit said:
What apps to choose in LSPosed module settings? Google Play, Google Services, System Framework???
Click to expand...
Click to collapse
None of these, just add apps that detect an unlocked bootloader like CIB.
MobAndro said:
Moreover, it's fully compatible with USNF Mod of Displax or SN Sensitive Props of HuskyDG please ?
Click to expand...
Click to collapse
Yes.

swer45 said:
Yes.
Click to expand...
Click to collapse
Thank you

Hi mate, thanks for the module. I'm just curious what did you mean here:
swer45 said:
Also Play Integrity API isn't perfect, I can pass MEETS_STRONG_INTEGRITY with my unlocked bootloader device.
Click to expand...
Click to collapse
Did you mean that you have found some kind of real fix for unlocked bootloaders, but you don't want it to go public or that your device is a very specific one and passes strong integrity because of some built-in bug?

Gleniu said:
Hi mate, thanks for the module. I'm just curious what did you mean here:
Did you mean that you have found some kind of real fix for unlocked bootloaders, but you don't want it to go public or that your device is a very specific one and passes strong integrity because of some built-in bug?
Click to expand...
Click to collapse
Nothing of the sort. There is a more mundane explanation. Simply, Google has bugs in their servers that allow certain certificates you submit for certain device models with early TEE's you can replicate and forge them, I still don't quite know how it's done but the folks at xiaomi.eu have it implemented in some of their ROMs.

I have edited the thread name and post to make it clear what my module does and what limits it has. I have also added a list with the apps I know that detect if you have the bootloader locked, if you know more apps that do the same, pass them here and I will add them.

Can You Include InstaPay - QNB

For InstaPay Here after using Apktool - found that it depends on this Smali file for connection suspension :
.class public final Lo/onConnectionSuspended;
.super Ljava/lang/Object;
.source ""
# static fields
.field public static final APP_TAMPERED:I = 0x80
.field public static final CERTIFICATE_TAMPERED:I = 0x40
.field public static final CLOCK_RATE_INTEGRITY:I = 0x400
.field public static final DEBUGGABLE:I = 0x4
.field public static final DEBUGGER_ATTACHED:I = 0x10
.field public static final DEBUG_BLOCKER_ATTACKED:I = 0x2000
.field public static final DEBUG_BLOCKER_FAILED:I = 0x1000
.field public static final EMULATOR:I = 0x8
.field public static final FILES_TAMPERED:I = 0x100
.field public static final HOOKED:I = 0x1
.field public static final MEMORY_INTEGRITY:I = 0x800
.field public static final ROOTED:I = 0x2
.field public static final SELINUX_INTEGRITY:I = 0x4000
.field public static final SIGNED_WITH_DEBUG_KEYS:I = 0x200
.field public static final VIRTUAL_ENVIRONMENT:I = 0x20
# direct methods
.method public constructor <init>()V
.locals 0
.line 15
invoke-direct {p0}, Ljava/lang/Object;-><init>()V
return-void
.end method

Dear swear45, could you also take a look on this Repo that could be able to remove the checks from both apps
GitHub - Crazyphil/digitales-amt-liberator: Removes root and bootloader checks from the Digitales Amt app
Removes root and bootloader checks from the Digitales Amt app - GitHub - Crazyphil/digitales-amt-liberator: Removes root and bootloader checks from the Digitales Amt app
github.com

.

.

Also this method isn't the best and it's very complicated, I don't know why the devs use it. It's much better to obtain the certificate (signed) of the phone using a native library, send it to a server, and check the certificate extensions. That will be impossible to hack or bypass (unless you hack the server or hack the TEE).

Would this allow gpay to work?

travisjshepherd said:
Would this allow gpay to work?
Click to expand...
Click to collapse
Gpay doesn't check the bootloader status, install this Zygisk modules:
- https://github.com/Displax/safetynet-fix/releases/latest
- https://github.com/LSPosed/LSPosed.github.io/releases/latest
Reboot the device and check the PI result: https://play.google.com/store/apps/details?id=gr.nikolasspyr.integritycheck
You should pass all checks except Strong

swer45 said:
Gpay doesn't check the bootloader status, install this Zygisk modules:
- https://github.com/Displax/safetynet-fix/releases/latest
- https://github.com/LSPosed/LSPosed.github.io/releases/latest
Reboot the device and check the PI result: https://play.google.com/store/apps/details?id=gr.nikolasspyr.integritycheck
You should pass all checks except Strong
Click to expand...
Click to collapse
Does gpay look for root or various other tampered settings / props? I know it's a bit off topic but I'm interested to understand what the app looks for it to trip / find root.

spida_singh said:
Does gpay look for root or various other tampered settings / props? I know it's a bit off topic but I'm interested to understand what the app looks for it to trip / find root.
Click to expand...
Click to collapse
All Google apps use Droidguard (like an anticheat for Android) to check root or Xposed. Just tick GMS in Magisk deny list (without enforce it) and you will hide root (for this you need Shamiko module). But also you need a valid device with locked bootloader, since Google still don't check well that, you can fake your device's fingerprint to an older one (Universal Safety Net Bypass module) and bypass it. The result in Play Integrity you will pass BASIC and DEVICE integrity (STRONG requires a locked bootloader o spoof certificates which is difficult). No one known app require STRONG integrity by the moment, but there are a few apps that check bootloader status, that's why I created this module.

swer45 said:
All Google apps use Droidguard (like an anticheat for Android) to check root or Xposed. Just tick GMS in Magisk deny list (without enforce it) and you will hide root (for this you need Shamiko module). But also you need a valid device with locked bootloader, since Google still don't check well that, you can fake your device's fingerprint to an older one (Universal Safety Net Bypass module) and bypass it. The result in Play Integrity you will pass BASIC and DEVICE integrity (STRONG requires a locked bootloader o spoof certificates which is difficult). No one known app require STRONG integrity by the moment, but there are a few apps that check bootloader status, that's why I created this module.
Click to expand...
Click to collapse
Understood thanks. If gpay doesn't check for the bootloader status. And Magisk hides root from droidguard.... What's the need for USNF by displax in this use case for GPAY? Does this do something in addition to Magisk deny list and shamiko?
The reason I'm asking is that there is a method to build GrapheneOS from source rooted with a locked bootloader. But USNF by displax doesn't work on that OS and was wondering if your module baked into source would help GrapheneOS pass PI.
GMS is not a privelaged app on GrapheneOS, but didn't know if gpay cared about that.
Thanks for this. I'll probably have to do more digging

swer45 said:
All Google apps use Droidguard (like an anticheat for Android) to check root or Xposed. Just tick GMS in Magisk deny list (without enforce it) and you will hide root (for this you need Shamiko module). But also you need a valid device with locked bootloader, since Google still don't check well that, you can fake your device's fingerprint to an older one (Universal Safety Net Bypass module) and bypass it. The result in Play Integrity you will pass BASIC and DEVICE integrity (STRONG requires a locked bootloader o spoof certificates which is difficult). No one known app require STRONG integrity by the moment, but there are a few apps that check bootloader status, that's why I created this module.
Click to expand...
Click to collapse
Someone mentioned hidemyapp is better to use for hiding root from apps don't know how accurate that info is though.
It is confusing what to be using and gets regular updates, as so many modules do the same type of thing, shamiko/hidemyapp etc

Related

Get method which calls another method (API)

Hi,
For example, we have API: Toast.show(params). I need to hook this API and get class/method name which uses this API (who calls it). Btw, how to check if method is hooked? I dont want re-hook things many times with the same hook.
pyler said:
Hi,
For example, we have API: Toast.show(params). I need to hook this API and get class/method name which uses this API (who calls it). Btw, how to check if method is hooked? I dont want re-hook things many times with the same hook.
Click to expand...
Click to collapse
I used a code like this to hook a method in a View:
Code:
public void handleLoadPackage(LoadPackageParam lpparam) throws Throwable {
XposedHelpers.findAndHookMethod(View.class,
"onTouchEvent",
MotionEvent.class,
new XC_MethodHook() {
@Override
protected void afterHookedMethod(MethodHookParam param)
throws Throwable {
//things...
}
}
});
}
So, in your case, you may use this with Toasts, for example, and then:
- if you want to obtain information for you, use XposedBridge.log
- if you want to use the informations in your module, you can use intents and broadcast receivers
It's an idea, let me know if it was what you were looking for :fingers-crossed:
Thank you for help
But.. I need to know who (method in app's code) calls it after hooking, not before.
pyler said:
Thank you for help
But.. I need to know who (method in app's code) calls it after hooking, not before.
Click to expand...
Click to collapse
Mm..I don't understand. You want to know what method in what app cals a method in an other app. But do you want this because you want to use this information IN your module (dinamically) or to develop your app?
Sent from my Vodafone 875
In the module.
pyler said:
In the module.
Click to expand...
Click to collapse
So, you want to obtain the name of the method which called the method you are hooking... Am I right?
Is the method an instance method?
Sent from my Vodafone 875
Exactly. Yes.
pyler said:
Exactly. Yes.
Click to expand...
Click to collapse
I think this information is normally held in the call stack but I dont know how to get that information from within the hook.
Haven't used it but
StackTraceElement has getClassName(), getFileName(), getLineNumber() and getMethodName().

[APP][Xposed][1.1.0]StorePrefs

Overview
StorePrefs is module for Google Playstore, which controls the update of applications.
Features:
- Warning when updating app which could break some modules (module author have to implement it)
- Blocking auto update of apps which could break some modules (module author have to implement it)
- Blocking rapid update
- Ignoring some updates (When you have update available in My Applications in Playstore just long click on this update to ignore it)
- Saving and then restoring list of applications from Playstore (it's restored in saved version.To downgrade application with this you need XInstaller module)
If you want me to add any other features related to Google Playstore please let me know
Modules, that currently implement version checking:
Snapprefs (not yet, but will)
XInsta
XHangouts
If you want your module mentioned here let me know
Changelog:
Code:
Version 1.1.0:
- Added INSTALL intent
- Added saving and restoring list of applications
- Bugfixes
Version 1.0.3:
- Fixed preferences (well, it wasn't working to be honest, but now works)
- Added option to clear list of ignored versions
Version 1.0.2:
- Added ignoring versions (long click on application in My Applications)
Version 1.0.1:
- Added Settings activity
- Added blocking rapid update
Version 1.0.0:
- Initial release
Screenshots:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Requirements
•Xposed Framework
•Google Playstore
For developers:
Right now whole checking if application and it's version is compatible is done by xposed modules.
You need to create class with no arguments constructor with these methods:
Code:
/**
* This method is called upon creating instance of this class. It is called from separate thread, so here is place for things like files loading and connecting with server.
*/
void init();
/**
* This method is called when user clicks update button. This will not block updating, It will only warn user.
*
* @param packageName package of the application
* @param versionCode version code
* @param versionName version name
* @return should user update this application
*/
boolean shouldUserUpdate(String packageName, int versionCode, String versionName);
/**
* This method is called when play store tries to auto update the application. Returning false causes to block the auto update.
*
* @param packageName package of the application
* @param versionCode version code
* @return can play store auto update this application
*/
boolean canAutoUpdate(String packageName, int versionCode);
If you are lazy like me just make it implements interface from this jar.
After that all you need to do is add this to your AndroidManifest file:
Code:
<meta-data
android:name="storeprefs_mainclass"
android:value="package.ClassWithMethodsFromInterfaceAbove" />
My module will only search for these classes if your module is enabled in Xposed installer.
Since version 1.1.0 you can install application from playstore through intents. This way you can install application with exact version you want. For downgrading user has to have XInstaller module enabled. Example implementation is here:
https://github.com/stirante/StorePrefs/blob/master/app/src/main/java/com/stirante/storeprefs/activities/SettingsActivity.java#L86-L107
Installation
Note: Obviously, you need root access on your phone.
Download the Xposed Installer APK.
Install the app along with the framework.
Download and install the app from the repository.
Activate the module in the Xposed Installer.
Soft reboot your device.
Download
http://repo.xposed.info/module/com.stirante.storeprefs
Source
Source code can be found on GitHub
https://github.com/stirante/StorePrefs
XDA:DevDB Information
StorePrefs, Xposed for the Xposed Framework
Contributors
stirante, MaaarZ, Mr.Yawnie
Source Code: https://github.com/stirante/StorePrefs
Xposed Package Name: com.stirante.storeprefs
Version Information
Status: Testing
Created 2016-02-02
Last Updated 2016-02-09
Good idea! I hope many devs will use this. I don't use snapprefs but I keep an eye on your work.
By the way first.
Nice! Good job mate
Sent from my GT-I9505 using Tapatalk
Great idea man!
Tell the guy from "youtube background playback" to use this!!!
This might be deviating a bit from the module's original purpose, but... There are some apps that I don't want to update unless there's a major update released in the Play Store. So would it be possible to implement, like in fdroid, an "ignore this one version" option, so the app will only appear on the list of updates the next time a new version is released, making it easier to follow the changes?
garciaw said:
This might be deviating a bit from the module's original purpose, but... There are some apps that I don't want to update unless there's a major update released in the Play Store. So would it be possible to implement, like in fdroid, an "ignore this one version" option, so the app will only appear on the list of updates the next time a new version is released, making it easier to follow the changes?
Click to expand...
Click to collapse
Well, the purpose of my module is Playstore tweaks, so yeah. I'll try to add it
When you have update available in My Applications in Playstore just long click on this update to ignore it
Click to expand...
Click to collapse
Is there also a way to get these ignored updates back?
Great module! Is there a way to modify it to download multiple apps? Instead of the download, install, then download the next app. This would be helpful in clean rom installs.
Sent from my SM-G900T3 using XDA Free mobile app
CRXed said:
Is there also a way to get these ignored updates back?
Click to expand...
Click to collapse
There will be sure a way for that, but right now couldn't get it to work. Btw you can still update these apps, but they're not showing on the top. Just scroll a bit, click on app and update. Also when there will be newer version than the one you marked as ignored it will show up at the top.
Cameronkhn12293 said:
Great module! Is there a way to modify it to download multiple apps? Instead of the download, install, then download the next app. This would be helpful in clean rom installs.
Sent from my SM-G900T3 using XDA Free mobile app
Click to expand...
Click to collapse
Well, i can look into that but i won't promise this.
stirante said:
There will be sure a way for that, but right now couldn't get it to work. Btw you can still update these apps, but they're not showing on the top. Just scroll a bit, click on app and update. Also when there will be newer version than the one you marked as ignored it will show up at the top.
Click to expand...
Click to collapse
Awesome, exactly what I was looking for =D
Ensuring compatibility of modules is a much more noble objective than maintaining my OCD in check, so I thank you for taking the time to listen to my request!
An absolutely fantastic module!! I've been looking for a solution like this for years. I have two apps that I'd rather not update, until I'm sure that their respectful xposed modules have been upgraded aswell, so having to manualy go through the process of updating one app at a time, has been such a pain. Thank you so much and keep up the good work!
Awesome! This works (or in the future will work) with package installer too?
kryzeK said:
Awesome! This works (or in the future will work) with package installer too?
Click to expand...
Click to collapse
Right now it don't, but maybe I'll implement this in future.
stirante said:
There will be sure a way for that, but right now couldn't get it to work. Btw you can still update these apps, but they're not showing on the top. Just scroll a bit, click on app and update. Also when there will be newer version than the one you marked as ignored it will show up at the top.
Click to expand...
Click to collapse
It works brilliantly!! :good:
Right now you have a default Android icon.
May I suggest a new icon, something like this? Haha
Great module! This will be added to XInsta in the next update.
If at all possible, can you do the following feature?
When Google Play is set to update applications manually, one has the ability to manually update all the applications with an "Update All" button at the top right of the "My Apps" section. However, I'd like to exclude some applications from ever updating. When this is the case, I have to manually update each application avoiding to update the one or two applications I'm avoiding to be updated.
Can you exclude an application from updating in this scenario?
oreo27 said:
If at all possible, can you do the following feature?
When Google Play is set to update applications manually, one has the ability to manually update all the applications with an "Update All" button at the top right of the "My Apps" section. However, I'd like to exclude some applications from ever updating. When this is the case, I have to manually update each application avoiding to update the one or two applications I'm avoiding to be updated.
Can you exclude an application from updating in this scenario?
Click to expand...
Click to collapse
It's already there, stock play store feature. Disable auto updates for those specific apps by going to play store > app and pressing the 3-dot menu on top right. Now when you press "update all" button, all other apps updating, but those you disabled won't (it will ask whether to update, choose no).
Sent from my GT-I9505 using Tapatalk
This looks great! I was in the process of adding it to XHangouts for inclusion the next release when I noticed some show-stoppers. My enabled_modules.xml from the Xposed Installer was set to 660 instead of 664 or 666 so StorePrefs could not access it. Once I manually made it world readable StorePrefs could continue. Until it hit another IOException trying to read com.stirante.storeprefs_preferences.xml which was also set to 660. It had the same problem with Storeprefs/database.dat which did exist but was also set to 660. Things are just not getting set to world readable. I have a feeling it's an issue with CM...
For reference, I'm on a nightly (Feb 8) build of CM 13 running Xposed v80 with Installer 3 alpha 4.
Edit 1: I've checked the prefs.makeWorldReadable() call in StorePrefsModule and it's definitely failing on my device.
Edit 2: After manually setting the permissions on both enabled_modules.xml and com.stirante.storeprefs_preferences.xml and removing the SimpleDatabase code (permission denied errors) I was able to get it working. I actually had to set enabled_modules.xml twice since it seems to reset. There was a visual issue when it was finally working (see attached).
Kevin M said:
This looks great! I was in the process of adding it to XHangouts for inclusion the next release when I noticed some show-stoppers. My enabled_modules.xml from the Xposed Installer was set to 660 instead of 664 or 666 so StorePrefs could not access it. Once I manually made it world readable StorePrefs could continue. Until it hit another IOException trying to read com.stirante.storeprefs_preferences.xml which was also set to 660. It had the same problem with Storeprefs/database.dat which did exist but was also set to 660. Things are just not getting set to world readable. I have a feeling it's an issue with CM...
For reference, I'm on a nightly (Feb 8) build of CM 13 running Xposed v80 with Installer 3 alpha 4.
Edit 1: I've checked the prefs.makeWorldReadable() call in StorePrefsModule and it's definitely failing on my device.
Edit 2: After manually setting the permissions on both enabled_modules.xml and com.stirante.storeprefs_preferences.xml and removing the SimpleDatabase code (permission denied errors) I was able to get it working. I actually had to set enabled_modules.xml twice since it seems to reset. There was a visual issue when it was finally working (see attached).
Click to expand...
Click to collapse
Thanks for feedback and for using it!
It is literaly one of the best posts I've ever received on my code since it's so detailed
About permissions I'll try to set them manually (with android.os.FileUtils.setPermissions). I hope that won't fail. As for the visual issue I've never had such an issue. Could you possibly know if it's just white text or no text at all? I used playstore's styles since it was created in it's context so it should match with other dialogs.

Question Instapay banking app detects root help please

Hello everyone,
So my banking app instapay is a harsh one when it comes to root, I've tried everything to hide it but failed. I have magisk 24.3, zygisk and lsposed installed. Stock may update pixel 6
I have tried to enforce deny list and normal, also installed a bunch of hiding tools like Enhance mode for HideMyApplist, Shamiko , Universal SafetyNet Fix, xprivcylua and all failed.
I would appreciate your help the app would crash on first start. Im also okay with any virtual space solution that would work as well i tried island with work profile and parallel space both failed too
InstaPay Egypt - Apps on Google Play
InstaPay enables you to send and receive money instantly 24x7.
play.google.com
Not sure if anyone here is going to have a solution, especially where you have tried all the standard solutions. You may simply have to deal with not using the app on your device.
The only thing I can suggest is getting rid of your Xposed clone. The app I believe is almost certainly detecting it.
Similar situation for me recently with Citibank, I have only Universal SafetyNet Fix and MagiskHide Props Config installed as modules, nothing else.
Magisk 24.3 was hidden, Citibank worked until May 14. This day it suddenly detected Magisk and told me me right out your mobile is rooted with Magisk or any other app.
I added a second user, installed Citibank for the second user and it worked. (seems it doesn't care that the bootloader is unlocked).
Then, I tried the following as Main user::
1. deleted Data and Cache from Citibank
2. Unhide Magisk, Hide it again but this time a new name (not the standard suggestion "Settings")
3. Opened Citibank again, logged in and it worked.
4. Deleted the second user again (optional)
Why? Can't give a specific reason, but a possibility is, that 2 x Settings in the AppDrawer was flagged as suspicious.
So you could try to have a second profile on your mobile or try the steps above.
Cheers
Tom
If you are using adaway to block ads via root, run the DNS log to see what urls the app is trying to connect to.
I had this issue with a UK Halifax banking app, all was working fine until middle of May, and then i found a new URL the app was connecting to, when i blocked it, it worked OK,
Moe information on this here:-
[How To] Bypass Lloyds and Santander Root Detection
Hi All, I've seen mention of Santander but not of Lloyds bypassing the root detection. After much trial and error it's quite simple and my method will bypass both Santander and Lloyds. If bypassing Santander just do the same for the Santander...
forum.xda-developers.com
Is there a way to hide lposed?
@xxqxpxx
Instapay detects zygisk
Only way around is Magisk Alpha with magisk hide activated (It's on Telegram)
Riru, Riru Universal Safetynet fix and Riru xposed (if needed).
Configure the deny list as per screenshot.
Reboot and you're good to go
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
shoey63 said:
@xxqxpxx
Instapay detects zygisk
Only way around is Magisk Alpha with magisk hide activated (It's on Telegram)
Riru, Riru Universal Safetynet fix and Riru xposed (if needed).
Configure the deny list as per screenshot.
Reboot and you're good to goView attachment 5623057
Click to expand...
Click to collapse
can you give me the link for the telegram alpha download please
I'd suggest to download any Magisk only from the official source: https://github.com/topjohnwu/Magisk
Currently the following downloads are available:
Magisk v24.3, Version Code 24300
Magisk Beta: v24.3, Version Code 24300 (same as final)
Magisk Canary: v24.313, Version Code 8dfb30fe
Magisk Debug: v24.313, Version Code 8dfb30fe
Cheers
Tom
xxqxpxx said:
can you give me the link for the telegram alpha download please
Click to expand...
Click to collapse
No Telegram links allowed on XDA so here you go.
Also don't worry about Alpha Magisk Devs. They are MAJOR contributors to the official TJW Magisk code. All transparent on Github
you can disable magisk and enable it when ever you want .
you my need to disable Adaway as well
use this app https://play.google.com/store/apps/details?id=com.iamaner.oneclickfreeze
Ibramj12 said:
you can disable magisk and enable it when ever you want .
you my need to disable Adaway as well
use this app https://play.google.com/store/apps/details?id=com.iamaner.oneclickfreeze
Click to expand...
Click to collapse
Didn't work
This is what they use : any ideas?
public static boolean isRooted(Context context) {
String str = Build.TAGS;
if ((!isEmulator && str != null && str.contains("test-keys")) || new File("/system/app/Superuser.apk").exists()) {
return true;
}
return !isEmulator && new File("/system/xbin/su").exists();
}
xxqxpxx said:
This is what they use : any ideas?
public static boolean isRooted(Context context) {
String str = Build.TAGS;
if ((!isEmulator && str != null && str.contains("test-keys")) || new File("/system/app/Superuser.apk").exists()) {
return true;
}
return !isEmulator && new File("/system/xbin/su").exists();
}
Click to expand...
Click to collapse
This is common check most apps will have it.
i tried the app. i belive its Egpt instapay. i was able to run it without error but cant see the login page.
I used the below module and it solved the instapay problem along with the latest myfawry update issue with root
Releases · LSPosed/LSPosed.github.io
Contribute to LSPosed/LSPosed.github.io development by creating an account on GitHub.
github.com
Only Install it and disable deny list
tom1807 said:
Similar situation for me recently with Citibank, I have only Universal SafetyNet Fix and MagiskHide Props Config installed as modules, nothing else.
Magisk 24.3 was hidden, Citibank worked until May 14. This day it suddenly detected Magisk and told me me right out your mobile is rooted with Magisk or any other app.
I added a second user, installed Citibank for the second user and it worked. (seems it doesn't care that the bootloader is unlocked).
Then, I tried the following as Main user::
1. deleted Data and Cache from Citibank
2. Unhide Magisk, Hide it again but this time a new name (not the standard suggestion "Settings")
3. Opened Citibank again, logged in and it worked.
4. Deleted the second user again (optional)
Why? Can't give a specific reason, but a possibility is, that 2 x Settings in the AppDrawer was flagged as suspicious.
So you could try to have a second profile on your mobile or try the steps above.
Cheers
Tom
Click to expand...
Click to collapse
One thing I noticed whenever I updated the Citibank app is that it always turns off something in DenyList that was previously turned on, causing it to catch root. All I do now is whenever I updated the Citibank app, I check DenyList to make sure none of the Citibank files have been turned off. If so, I just turn it back on and all is good.
I have problem with instalation and I had test every thing and still have same problem
Any one have solution to this case
Its working for me here, and thats my setup: magisk delta (google it) using riru & magiskhide (the old root hiding way) with modules: USNF, riru momohider, riru lsposed, riru enhanced mode for magisk hide, MHPC, initrchider & hiding the app in magisk via magiskhide
AhmadOkda said:
I used the below module and it solved the instapay problem along with the latest myfawry update issue with root
Releases · LSPosed/LSPosed.github.io
Contribute to LSPosed/LSPosed.github.io development by creating an account on GitHub.
github.com
Only Install it and disable deny list
Click to expand...
Click to collapse
Thanks bro this really helped me
AhmadOkda said:
I used the below module and it solved the instapay problem along with the latest myfawry update issue with root
Releases · LSPosed/LSPosed.github.io
Contribute to LSPosed/LSPosed.github.io development by creating an account on GitHub.
github.com
Only Install it and disable deny list
Click to expand...
Click to collapse
تسلم ياكبير
The latest Update (1.5.4) Requires More work to hide root it includes most of work done here in this thread but will be explained without reading all comments
1) Update Magisk Alpha to v26 and Enable Zygisk
2)Install Universal SafteyNetFix Mod (You Should use this )
[MODULE] [MOD] Universal SafetyNet Fix
Universal SafetyNet Fix [MOD] Magisk module Hello. This is my modification [FORK] of the original Universal SafetyNet Fix module from @kdrag0n. Created for the (temporary?) restoration of working capacity in the conditions of constant change...
forum.xda-developers.com
3) Install Shamiko latest update
Releases · LSPosed/LSPosed.github.io
Contribute to LSPosed/LSPosed.github.io development by creating an account on GitHub.
github.com
4) Dont Enfore Zygisk and Add InstaPay to Denylist
5) Clear Data to G Play Services ,Reboot and Enjoy

CGM app blacklists the majority of phones and android versions.

Greetings.
I and most of my diabetic friends I know have Medtronic braded CGMs for controlling our diabetes. The device is attached to the body and is used to monitor glucose levels in your body.
The problem is that it blacklists the majority of Android phones. There's only a handful of devices it is allowed to work on, and this is the list.
I own a Nokia G20 and as a result, I am unable to use my phone with my CGM. Even if I manually install the APK on it, the app still refuses to run on my phone.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I tried reverse engineering the APK file with a tool to try to remove this restriction, but since I lack the understanding of Android app development, reverse engineering and Java, I was unable to do anything significant, although I did find a folder containing the code for whitelisting various devices.
The only option I have for using my CGM is to replace my current phone (which is pretty expensive, plus the effort of copying all of my files and applications over is not really worth it) or to get an older secondary phone for the sole reason of using it for my CGM (which I did). I end up frequently losing my secondary phone, and having ungodly levels of blood glucose because of it. It would mean a lot for us, diabetics if someone were to reverse engineer this piece of software and bypass the restrictions for the app to run on every android smartphone.
Thanks in advance.
I don't understand why they think they need to approve every device. Why can't they be happy with simply using something like the Play Integrity API? They even recommend turning off security updates.
This is the epitome of bad software development. I would suggest looking for an alternative if possible, even better if it's open source.
V0latyle said:
I don't understand why they think they need to approve every device. Why can't they be happy with simply using something like the Play Integrity API? They even recommend turning off security updates.
This is the epitome of bad software development. I would suggest looking for an alternative if possible, even better if it's open source.
Click to expand...
Click to collapse
Probably because of medical regulations (after the therac-25 incident) but I agree with you, the software is a piece of trash. You have to frequently clear data because it slows down and is barely usable after time. Sadly, there are no alternatives (yet) but I would be welcome to install anything other than this piece of trash. Getting a different CGM is not an option for me, only the Medtronic sensors are covered by my insurance. Would be nice if somebody wrote an open source alternative for Guardian Connect, would even write one if I had the know-how to write Android apps, but it would be great if somebody at least managed to bypass this error screen. It probably wouldn't even be that hard to do it, judging how easy it is to hack other aspects of the app, for example you can reset the one week lifetime of the sensor by just unplugging and plugging it back in to the transmitter.
acdavit said:
Probably because of medical regulations (after the therac-25 incident)
Click to expand...
Click to collapse
Is this in Canada? The Therac-25 was more than 40 years ago and was a programming issue. I'm not sure of its relevance regarding smart devices, particularly when the medical device in question is a glucose monitor, not an insulin pump.
acdavit said:
but I agree with you, the software is a piece of trash. You have to frequently clear data because it slows down and is barely usable after time. Sadly, there are no alternatives (yet) but I would be welcome to install anything other than this piece of trash. Getting a different CGM is not an option for me, only the Medtronic sensors are covered by my insurance.
Click to expand...
Click to collapse
Good point, laws and politics often do more harm than good in this regard
acdavit said:
Would be nice if somebody wrote an open source alternative for Guardian Connect, would even write one if I had the know-how to write Android apps, but it would be great if somebody at least managed to bypass this error screen. It probably wouldn't even be that hard to do it, judging how easy it is to hack other aspects of the app, for example you can reset the one week lifetime of the sensor by just unplugging and plugging it back in to the transmitter.
Click to expand...
Click to collapse
Well...coming from a bioelectronic perspective, there's a reason why they have a finite lifetime. The accuracy and the error margin of the device suffer with age, which is why they're generally supposed to be replaced every 180 days. I'm assuming you're talking about the implantable sensor here.
As for the app...If you're rooted with Magisk, you may be able to use MagiskHide Props Config to change the fingerprint of your device to match that of one on the "approved" list.
V0latyle said:
Is this in Canada? The Therac-25 was more than 40 years ago and was a programming issue. I'm not sure of its relevance regarding smart devices, particularly when the medical device in question is a glucose monitor, not an insulin pump.
Good point, laws and politics often do more harm than good in this regard
Well...coming from a bioelectronic perspective, there's a reason why they have a finite lifetime. The accuracy and the error margin of the device suffer with age, which is why they're generally supposed to be replaced every 180 days. I'm assuming you're talking about the implantable sensor here.
As for the app...If you're rooted with Magisk, you may be able to use MagiskHide Props Config to change the fingerprint of your device to match that of one on the "approved" list.
Click to expand...
Click to collapse
I know about that but my phone is sadly not rootable. Is there a way to do that with adb perhaps?
acdavit said:
I know about that but my phone is sadly not rootable. Is there a way to do that with adb perhaps?
Click to expand...
Click to collapse
I'm not familiar with Nokia, but generally no.
First impression: The whitelist gets downloaded from here: https://carelink.minimed.com/api/connect/v1/client/config/gm/android/whitegraylist
Code:
{
"3.4.0": {
...
},
"3.4.1": {
...
},
"3.4.2": {
...
},
"3.4.3": {
"MAX_PHONE_SCREEN_CONFIG": 7,
"WHITELIST": {
"SM-N970X": {
"description": "Galaxy Note10",
"supportedOS": ["10.0.0", "11.0.0", "12.0.0"]
},
"SM-N970N": {
"description": "Galaxy Note10",
"supportedOS": ["10.0.0", "11.0.0", "12.0.0"]
},
"SM-N970W": {
"description": "Galaxy Note10",
"supportedOS": ["10.0.0", "11.0.0", "12.0.0"]
},
...
},
"GRAYLIST": {
"SONY": [9, 10, 11],
"XIAOMI": [9, 10, 11],
"LGE": [9, 10],
"SAMSUNG": [7, 8, 9, 10, 11, 12, 13],
"HUAWEI": [9, 10],
"GOOGLE": [10, 11, 12, 13]
},
"BLACKLIST": {}
}
}
Silly way #1 to fix this: Change the URL to your own website with edited JSON.
@acdavit if you were interested in rooting, I found a couple threads that might be helpful to you:
[Tutorial] How to flash a new boot.img via Fastboot
Hey Guys, since I heard many questions lately concerning flashing a boot.img onto the One S I decided to give you a small tutorial! (which should also work on any other device with bootloadermode) If you have fastboot already installed on your...
forum.xda-developers.com
Nokia G20 boot.img flashing!
Please be aware that this could damage your phone & I'm not responsible for this. So only do this if you really feel comfortable with it & you know about the risks! This file is only for Nokia G20 TA-1365 and should not be used for any other...
forum.xda-developers.com
Renate said:
First impression: The whitelist gets downloaded from here: https://carelink.minimed.com/api/connect/v1/client/config/gm/android/whitegraylist
Code:
{
"3.4.0": {
...
},
"3.4.1": {
...
},
"3.4.2": {
...
},
"3.4.3": {
"MAX_PHONE_SCREEN_CONFIG": 7,
"WHITELIST": {
"SM-N970X": {
"description": "Galaxy Note10",
"supportedOS": ["10.0.0", "11.0.0", "12.0.0"]
},
"SM-N970N": {
"description": "Galaxy Note10",
"supportedOS": ["10.0.0", "11.0.0", "12.0.0"]
},
"SM-N970W": {
"description": "Galaxy Note10",
"supportedOS": ["10.0.0", "11.0.0", "12.0.0"]
},
...
},
"GRAYLIST": {
"SONY": [9, 10, 11],
"XIAOMI": [9, 10, 11],
"LGE": [9, 10],
"SAMSUNG": [7, 8, 9, 10, 11, 12, 13],
"HUAWEI": [9, 10],
"GOOGLE": [10, 11, 12, 13]
},
"BLACKLIST": {}
}
}
Silly way #1 to fix this: Change the URL to your own website with edited JSON.
Click to expand...
Click to collapse
https://acdavit.github.io/gc/whitegraylist.json
GitHub - acdavit/gc
Contribute to acdavit/gc development by creating an account on GitHub.
github.com
I made a Github repository for an alternative whitelist JSON. Maybe we could maintain it and add devices with user pull requests?
So, here's how I patched it. It's simple (but obscure).
Start with Guardian Connect_3.4.3_Apkpure.apk (32,517,784 bytes)
Disassemble with apktool d
Modify as below
Assemble with apktool b
Align with zipalign
Sign with apksigner
File smali\com\medtronic\guardian\whitelist\h.smali, line #310:
Code:
# virtual methods
.method public a()Lcom/medtronic/guardian/whitelist/WhitelistResult;
.locals 3
iget-object v0, p0, Lcom/medtronic/guardian/whitelist/h;->d:Lc/b/c/h/c/b;
invoke-interface {v0}, Lc/b/c/h/c/b;->g0()Z
move-result v0
# if-eqz v0, :cond_0
const-string v0, "Whitelist"
const-string v1, "Device configuration overrides Whitelist check: All devices accepted..."
Just comment out (with #) if-eqz
There is also an issue with AndroidManifest that I didn't look into. Just change "false" to "true" in it:
Code:
<application ... android:extractNativeLibs="true" ... />
I actually have a system for patching APKs without a round trip through apktool but I need to do some fine-tuning to make it work with ProGuard obfuscated files.
It's not ready for prime time, but here's how I like to do it:
Code:
C:\>unzip "guardian.apk" classes.dex
C:\>dexdump classes.dex /ccom.medtronic.guardian.whitelist.h > guard.sym
C:\>kpatch classes.dex guard.sym guard.kpc
Profile #1: WhiteList
003b5390 a()
003b53ac 0038 -> 0000
Applied 1 patch
Look, Ma, no apktool!
Next: Get rid of the need to unzip. Erm, not when they compressed the classes.dex
Edit: Oh, well, my framework.jar uses uncompressed classes.dex and I can patch that without unzipping using dexdump/kpatch.
I feel like if we release a script of some sorts for patching the APK there should also be versions for Linux and (if possible) macOS

[APP][XPOSED][5.0-13] Geergit - A Module to Protect Your Privacy

Geergit - Protect Your Privacy​
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
ROOT IS REQUIRED
If You don't know What XPOSED FRAMEWORK is, do not try this application (it won't work). To Know more about Xposed Read Here.
Xposed General
Use this forum to chat about xposed framework and modules to modify your device without flashing a custom ROM
forum.xda-developers.com
IMPORTANT​- Although this app has been tested on several devices, there is always a chance something can go wrong. It is always recommended to have a backup of your ROM and other important data before trying this app.
This is an Xposed Module For Changing (MASKING) the various IDs in the Phone.
Change means when an application access these parameters this app will replace the original value with user provided value. Original values are always intact in the device.
Features​Spoofing (Hide your original details and give fake ones!)​
- Sim Operator (premium)
1. Country
2. Sim Operator
3. MCC
4. MNC
- IMEI
1. IMEI 1
2. IMEI 2
3. Increment both IMEI by Increment value on Random
- Gmail address (spoof your logged-in Gmail for Victim Apps) (premium)
- Android ID
- Hardware Serial
- Advertising ID (Not working in newer Android versions)
- Google Services Framework (GSF) ID (premium)
- Bluetooth Mac Address
- WiFi Mac Address
- WiFi SSID
- Mobile Number
- SIM Subscriber number
- SIM Card Serial
- MediaDRM (premium) [Coming Soon]
Target/Victim apps' features​- Per App Spoofing
- Hide Root
- Hide Xposed
- Creation of Profiles
- Add Notes to Profiles
- One Click Randomize
- Grouping of Target Apps (Coming Soon)
Import / Export​- Backup Target App's Data (premium)
- Import / Export Profiles (Spoofed/Fake values)
- Import / Export the above data to Local Storage and/or Google Drive (premium)[Coming Soon]
Feature request​There are multiple methods to request feature
1. You can open a feature request issue to Geergit Discussion Repo.
2. Submit this Google Form: https://forms.gle/X8sX6PcSi9bRbK1YA
3. Telegram Group: https://t.me/geergit_xposed
NOTE:​1. For changes to take effect close all running applications also swipe / clear apps from the recent list. No need to reboot.
Steps to enable the app in Xposed Framework (LSPosed Recommended).
- Install app
- Go to the Xposed module
- Enable module in xposed framework
- Restart phone
- Open the app
- And you can start using it by changing settings.
Spoiler: Download
From Xposed Modules
From Github Releases
Credits:
@DE - For inspiring me for this module.
@Lsposed Team - For their efforts.
@VD171 - for his app VDInfo which will help to check spoof values.
Note: Don't use this app for any illegal purpose or cheat any program this module is just for better privacy.
Discussions about donation packages are not allowed here, please contact me via email instead.
Thank you for trying this module, if you like don't forget to press thanks
End User Licence Agreement (EULA)​"THE SOFTWARE IS PROVIDED ON AN AS-IS AND AS-AVAILABLE BASIS. YOU AGREE THAT YOUR USE OF THE SOFTWARE AND OUR SERVICES WILL BE AT YOUR SOLE RISK. TO THE FULLEST EXTENT PERMITTED BY LAW, WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, IN CONNECTION WITH THE SOFTWARE AND YOUR USE THEREOF, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. IN NO EVENT WILL AUTHOR BE LIABLE FOR ANY DAMAGES CAUSED BY USING THIS PRODUCT"
Will the phone even work to make callls if you go changing lll that stuff like IMEI, serials, macs etc..?
pyshivam said:
Geergit - Protect Your Privacy​View attachment 5882685
ROOT IS REQUIRED
If You don't know What XPOSED FRAMEWORK is, do not try this application (it won't work). To Know more about Xposed Read Here.
Xposed General
Use this forum to chat about xposed framework and modules to modify your device without flashing a custom ROM
forum.xda-developers.com
IMPORTANT​- Although this app has been tested on several devices, there is always a chance something can go wrong. It is always recommended to have a backup of your ROM and other important data before trying this app.
This is an Xposed Module For Changing (MASKING) the various IDs in the Phone.
Change means when an application access these parameters this app will replace the original value with user provided value. Original values are always intact in the device.
Features​Spoofing (Hide your original details and give fake ones!)​
- Sim Operator (premium)
1. Country
2. Sim Operator
3. MCC
4. MNC
- IMEI
1. IMEI 1
2. IMEI 2
3. Increment both IMEI by Increment value on Random
- Gmail address (spoof your logged-in Gmail for Victim Apps) (premium)
- Android ID
- Hardware Serial
- Advertising ID (Not working in newer Android versions)
- Google Services Framework (GSF) ID (premium)
- Bluetooth Mac Address
- WiFi Mac Address
- WiFi SSID
- Mobile Number
- SIM Subscriber number
- SIM Card Serial
- MediaDRM (premium) [Coming Soon]
Target/Victim apps' features​- Per App Spoofing
- Hide Root
- Hide Xposed
- Creation of Profiles
- Add Notes to Profiles
- One Click Randomize
- Grouping of Target Apps (Coming Soon)
Import / Export​- Backup Target App's Data (premium)
- Import / Export Profiles (Spoofed/Fake values)
- Import / Export the above data to Local Storage and/or Google Drive (premium)[Coming Soon]
Feature request​There are multiple methods to request feature
1. You can open a feature request issue to Geergit Discussion Repo.
2. Submit this Google Form: https://forms.gle/X8sX6PcSi9bRbK1YA
3. Telegram Group: https://t.me/geergit_xposed
NOTE:​1. For changes to take effect close all running applications also swipe / clear apps from the recent list. No need to reboot.
Steps to enable the app in Xposed Framework (LSPosed Recommended).
- Install app
- Go to the Xposed module
- Enable module in xposed framework
- Restart phone
- Open the app
- And you can start using it by changing settings.
Spoiler: Download
From Xposed Modules
From Github Releases
Credits:
@DE - For inspiring me for this module.
@Lsposed Team - For their efforts.
@VD171 - for his app VDInfo which will help to check spoof values.
Note: Don't use this app for any illegal purpose or cheat any program this module is just for better privacy.
Discussions about donation packages are not allowed here, please contact me via email instead.
Thank you for trying this module, if you like don't forget to press thanks
End User Licence Agreement (EULA)​"THE SOFTWARE IS PROVIDED ON AN AS-IS AND AS-AVAILABLE BASIS. YOU AGREE THAT YOUR USE OF THE SOFTWARE AND OUR SERVICES WILL BE AT YOUR SOLE RISK. TO THE FULLEST EXTENT PERMITTED BY LAW, WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, IN CONNECTION WITH THE SOFTWARE AND YOUR USE THEREOF, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. IN NO EVENT WILL AUTHOR BE LIABLE FOR ANY DAMAGES CAUSED BY USING THIS PRODUCT"
Click to expand...
Click to collapse
Will spoofing Wifi SSID/MAC cause wifi internet to break on restart?
Android 10 on Redmi Note 9 Pro
Wow !
Very good app !
Thank you very much, dear developer
Looks very useful. As for the premium, however, I regret there is no one-time payment option. With so many bills to pay these days, I can't afford to subscribe another app
VD171 said:
Wow !
Very good app !
Thank you very much, dear developer
Click to expand...
Click to collapse
Thank You so much!!!
thementalist786 said:
Will spoofing Wifi SSID/MAC cause wifi internet to break on restart?
Android 10 on Redmi Note 9 Pro
Click to expand...
Click to collapse
we are spoofing values for specific apps so the internet should not break on restart, until you hook system apps.
TaZeR369 said:
Will the phone even work to make callls if you go changing lll that stuff like IMEI, serials, macs etc..?
Click to expand...
Click to collapse
if you are not hooking all the system apps, so calls should work, If you hook all of the system apps then there might be a chance that something could go wrong.
I'm using Android Faker til now, does that hook system apps / work differently or is it just an "either works" kind of situation?
G5-User7080 said:
I'm using Android Faker til now, does that hook system apps / work differently or is it just an "either works" kind of situation?
Click to expand...
Click to collapse
you can try for yourself, however mostly it should be an "either works" kind of situation because at a time only one fake value can be received by the victim app, so if two or more apps are trying to give fake values to the same victim then only one module wins.
pyshivam said:
you can try for yourself, however mostly it should be an "either works" kind of situation because at a time only one fake value can be received by the victim app, so if two or more apps are trying to give fake values to the same victim then only one module wins.
Click to expand...
Click to collapse
Original data will be replaced for the 1st module.
The 1st module will be replaced for the 2nd module.
android 12 working ?
The hide root option, could this work with banking apps, wallet etc? It's getting so hard to maintain root and still have banking apps etc working. Everytime magisk/usnf fixes it couple of weeks later it breaks again. Sorry if it's a daft question
I just installed Geergit on my phone and it was working..now its giving me a "root access denied" error when it was granted access via Magisk with LSPosed installed.
Why did i suddenly lose root access? I cant figure this out. tried toggling apps off. restarting phone..nothing works. it was working just minutes ago.
Slow development, many bugs...I don't recommend it.
Would be so kind as to give xda members the paid add-on free of charge? Or just pm me a license if possible. Would be greatly appreciated. (I don't use google play store)
TaZeR369 said:
Would be so kind as to give xda members the paid add-on free of charge?
Click to expand...
Click to collapse
A very strange request.
westruk said:
A very strange request.
Click to expand...
Click to collapse
It's worked before, a lot of devs sympathize with the the poor.
any plans to support changing manufacturer, model, device(ROM)? Or anyone know where to look in to doing such myself. On a Google Pixel 1, 8.1

Categories

Resources