Open artlan opened 8 years ago
Here is some output of how Maas360 is detecting rootcloak. This /system/xbin/FAKEJUNKFILE is coming from the initFile method in RootCloak.java
It appears that after the file constructor, they inspect it to ensure it is still pointing at the file they expect it to be.
| I | IntentService[Control Service] | chp | Expected: /su/bin Actual: /system/xbin/FAKEJUNKFILE | I | IntentService[Device Attribute Service] | chp | Expected: /su/bin Actual: /system/xbin/FAKEJUNKFILE
Wow, interesting. I guess we'll have to think of a different method for hiding the file. Thanks.
is there any progress on this ?
https://play.google.com/store/apps/details?id=com.fiberlink.maas360.android.control
This used to work just fine until the latest update Not sure how to add a label to this if I'm not a contributor...