Open louhefeng opened 1 year ago
This is impossible because it is theoretically impossible to detect. I am sure you have not studied the source code, please go back and read it again, such as patch_kernel_root.cpp, testRoot.cpp, only after you read it, you will understand that this work is like God from the moment of birth.
Here are a few troubleshooting suggestions I can offer you:
Ensure that the kernel modifications are based on the official original version, rather than being compiled independently or using third-party source code.
If you have ever used Magisk, you should completely reflash your phone, as Magisk might leave residual log files and other information.
Do not install tools that require ROOT permission or applications that involve system environment detection, such as refrigerators, black holes, momos, and key authentication. The existence of these applications may be used as evidence to infer that your device has obtained ROOT permissions. Taking the refrigerator as an example, this application requires ROOT permission to run. If a refrigerator is installed on your device, it may be used to prove that your device is in a ROOT environment. In actual testing, we found that the "X Rent Account" app will perform such environmental testing. Therefore, we strongly recommend not installing these tools. If necessary, please uninstall immediately after use to reduce the risk of abnormal environment judgment.
Android apps are highly likely to be feature-detected. While we only provide app call tutorials here, in actual use, you should hide the app yourself, or try to uninstall the app, switching to using the command-line method with testRoot.cpp.
In older versions of Android, apps can access the /data/local/tmp directory without any permissions. In this case, you need to upgrade your Android system version or uninstall SU.
If your phone sounds an alarm once unlocked, you need to address this issue yourself as it's unrelated to SKRoot.
Check whether the application is detecting the Bootloader lock rather than ROOT permissions. If so, you should install SKRoot's hidden Bootloader lock module.
Please check whether the SELinux status has been disabled by malware.
I hope this information can help you.
For more information, please refer to the website: https://github.com/abcz316/SKRoot-linuxKernelRoot#%E9%97%AE%E9%A2%98%E6%8E%92%E6%9F%A5
只要对它有任何instrusive行为都能被检测到 只保留patch的情况下屏蔽好BL解锁 在应用权限范围内感觉很难有检测思路? 不过大厂往往不光拥有应用权限🤡
支付宝监测到了,公积金无法刷脸了