Open GabriLex opened 1 year ago
I was checking some custom roms telegram groups and apparently a fix has been found, don't know anything else unfortunately
S/N ctsProfileMatch still passes if we use matched fingerprint prop... Finding a suitable bypass for PI API hardware-backed verdict enforcement that still allows ctsProfileMatch is the new challenge...
I was checking some custom roms telegram groups and apparently a fix has been found, don't know anything else unfortunately
Please provide a link if you can... Would love to follow that up...
Here's the link to one of the commits that works apparently: https://github.com/yaap/frameworks_base/commit/65bafcc71c4615fcc16498fe6404e4fd6c40b359
Here's another one: https://gerrit.hentaios.com/c/hentaiOS/platform_frameworks_base/+/624
S/N ctsProfileMatch still passes if we use matched fingerprint prop... Finding a suitable bypass for PI API hardware-backed verdict enforcement that still allows ctsProfileMatch is the new challenge...
I was checking some custom roms telegram groups and apparently a fix has been found, don't know anything else unfortunately
Please provide a link if you can... Would love to follow that up...
Apparently, according to what people say regarding the 2 solutions I posted above, Google is just checking for additional fields and by adding these the problem should be solved, not too sure though
S/N ctsProfileMatch still passes if we use matched fingerprint prop... Finding a suitable bypass for PI API hardware-backed verdict enforcement that still allows ctsProfileMatch is the new challenge...
I was checking some custom roms telegram groups and apparently a fix has been found, don't know anything else unfortunately
Please provide a link if you can... Would love to follow that up...
Apparently, according to what people say regarding the 2 solutions I posted above, Google is just checking for additional fields and by adding these the problem should be solved, not too sure though
Correct. MHPC never spoofed the other fields like ro.build.model or ro.build.id. There are at least 10-15 Google could be checking.
Here's the link to one of the commits that works apparently: yaap/frameworks_base@65bafcc
Here's another one: https://gerrit.hentaios.com/c/hentaiOS/platform_frameworks_base/+/624
Many thanks for links...
First one may now be needed; MHPC automatically adjusts security patch date to match fingerprint date for prints post March 16 2018... This may now be needed for earlier prints also, or be required per device...
Second one seems to have nailed it!:
gmscompat: Make CTS/Play Integrity pass again
The logic behind CTS and Play Integrity has been updated today it now checks the product and model names against the fingerprint and if they do not match the CTS profile will fail.
Also while we are at it use a newer FP from Pixel XL and add logging for key attestation blocking for debugging.
No doubt this is what @Displax has done w/ his latest USNF fork...
Here's the link to one of the commits that works apparently: yaap/frameworks_base@65bafcc
Here's another one: https://gerrit.hentaios.com/c/hentaiOS/platform_frameworks_base/+/624
Many thanks for links...
First one may now be needed; MHPC automatically adjusts security patch date to matche fingerprint date for prints post March 16 2018... This may now be needed for earlier prints also, or be required per device...
Second one seems to have nailed it!:
gmscompat: Make CTS/Play Integrity pass again
The logic behind CTS and Play Integrity has been updated today it now checks the product and model names against the fingerprint and if they do not match the CTS profile will fail.
Also while we are at it use a newer FP from Pixel XL and add logging for key attestation blocking for debugging.
No doubt this is what @Displax has done w/ his latest USNF fork...
Tried using that fork but it doesn't work for me, he says that's it's because my rom has something to do with "system.prop", not really sure what that means
@pndwal @Displax Do you need to uninstall or deactivate kdrag0n's USNF to use Displax's USNF mod? Or can they both be active in parallel? Never been in this scenario so happy to test later or tomorrow but right scenario requirements are welcome :)
Here's the link to one of the commits that works apparently: yaap/frameworks_base@65bafcc
Here's another one: https://gerrit.hentaios.com/c/hentaiOS/platform_frameworks_base/+/624
How do you apply these? Sorry, clueless about this stuff
Here's the link to one of the commits that works apparently: yaap/frameworks_base@65bafcc
Here's another one: https://gerrit.hentaios.com/c/hentaiOS/platform_frameworks_base/+/624
How do you apply these? Sorry, clueless about this stuff
Either wait for a safetynet module to update and add this change or wait for the custom ROM maintainer to update your build
Here's the link to one of the commits that works apparently: yaap/frameworks_base@65bafcc Here's another one: https://gerrit.hentaios.com/c/hentaiOS/platform_frameworks_base/+/624
How do you apply these? Sorry, clueless about this stuff
Either wait for a safetynet module to update and add this change or wait for the custom ROM maintainer to update your build
Cool, I'll wait for module since I can actually do that. Wallet suddenly blocking tap as of yesterday so hoping for a fix soon
@Displax First, thanks. Your last version is not working for me (2.3.1.3.0)
Only pass with spoofing props (Spoof Pixel 7, another module)
@Displax First, thanks. Your last version is not working for me (2.3.1.3.0)
Only pass with spoofing props (Spoof Pixel 7, another module)
Could you share the link of this module? Also on which device are you using it?
@Displax First, thanks. Your last version is not working for me (2.3.1.3.0)
Only pass with spoofing props (Spoof Pixel 7, another module)
Because of custom ROM
I have tried it but works if you flash pixel 7 props and after safety net fixIl 9 feb 2023 19:13, Ilya Kushnir @.***> ha scritto:
@Displax First, thanks. Your last version is not working for me (2.3.1.3.0) Only pass with spoofing props (Spoof Pixel 7, another module)
Because of custom ROM
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
I have tried it but works if you flash pixel 7 props and after safety net fixIl 9 feb 2023 19:13, Ilya Kushnir @.***> ha scritto:
@Displax First, thanks. Your last version is not working for me (2.3.1.3.0) Only pass with spoofing props (Spoof Pixel 7, another module)
Because of custom ROM
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
Which module did you use to flash the pixel props? Could you give a link?
Here:https://mega.nz/file/kqoSnLSa#RXYUNp2E3GKzxI4anVD-yhB8TI8YndvasMXSVawz1UcIdk if there is an updated moduleFor me works,idk othersIssue:Downgrade to October patchesIl 9 feb 2023 20:13, broli95 @.***> ha scritto:
I have tried it but works if you flash pixel 7 props and after safety net fixIl 9 feb 2023 19:13, Ilya Kushnir @.***> ha scritto:
@Displax
First, thanks.
Your last version is not working for me (2.3.1.3.0)
Only pass with spoofing props (Spoof Pixel 7, another module)
Because of custom ROM
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
Which module did you use to flash the pixel props? Could you give a link?
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
Here:https://mega.nz/file/kqoSnLSa#RXYUNp2E3GKzxI4anVD-yhB8TI8YndvasMXSVawz1UcIdk if there is an updated moduleFor me works,idk othersIssue:Downgrade to October patchesIl 9 feb 2023 20:13, broli95 @.> ha scritto: I have tried it but works if you flash pixel 7 props and after safety net fixIl 9 feb 2023 19:13, Ilya Kushnir @.> ha scritto: @Displax First, thanks. Your last version is not working for me (2.3.1.3.0) Only pass with spoofing props (Spoof Pixel 7, another module) Because of custom ROM —Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.> Which module did you use to flash the pixel props? Could you give a link? —Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.>
Here you can find a more recent version with the January security patch, unfortunately it still doesn't work for me what a pain
This worked wonderfully for me. https://forum.xda-developers.com/t/magisk-module-universal-safetynet-fix-2-4-0.4217823/page-156#post-88120721
Tried already but nothing, I'm incredibly unlucky
This worked wonderfully for me. https://forum.xda-developers.com/t/magisk-module-universal-safetynet-fix-2-4-0.4217823/page-156#post-88120721
Tried already but nothing, I'm incredibly unlucky
I was also suddenly unable to pay with my Pixel this morning. I also just disabled v2.4.0 and installed USNF 2.3.1 MOD 3.0. Reboot done, nothing more.
Try to hide this process of Google servicesIl 9 feb 2023 20:36, broli95 @.***> ha scritto:
This worked wonderfully for me. https://forum.xda-developers.com/t/magisk-module-universal-safetynet-fix-2-4-0.4217823/page-156#post-88120721
Tried already but nothing, I'm incredibly unlucky
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
Try this Il 9 feb 2023 20:35, broli95 @.***> ha scritto:
Here:https://mega.nz/file/kqoSnLSa#RXYUNp2E3GKzxI4anVD-yhB8TI8YndvasMXSVawz1UcIdk if there is an updated moduleFor me works,idk othersIssue:Downgrade to October patchesIl 9 feb 2023 20:13, broli95 @.> ha scritto: I have tried it but works if you flash pixel 7 props and after safety net fixIl 9 feb 2023 19:13, Ilya Kushnir @.> ha scritto: @Displax First, thanks. Your last version is not working for me (2.3.1.3.0) Only pass with spoofing props (Spoof Pixel 7, another module) Because of custom ROM —Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.> Which module did you use to flash the pixel props? Could you give a link? —Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.>
Here you can find a more recent version with the January security patch, unfortunately it still doesn't work for me what a pain
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
This worked wonderfully for me. https://forum.xda-developers.com/t/magisk-module-universal-safetynet-fix-2-4-0.4217823/page-156#post-88120721
Tried already but nothing, I'm incredibly unlucky
I was also suddenly unable to pay with my Pixel this morning. I also just disabled v2.4.0 and installed USNF 2.3.1 MOD 3.0. Reboot done, nothing more.
Same, unable as of this morning
Any fix?
This worked wonderfully for me. https://forum.xda-developers.com/t/magisk-module-universal-safetynet-fix-2-4-0.4217823/page-156#post-88120721
Tried already but nothing, I'm incredibly unlucky
I was also suddenly unable to pay with my Pixel this morning. I also just disabled v2.4.0 and installed USNF 2.3.1 MOD 3.0. Reboot done, nothing more.
Same, unable as of this morning
Any fix?
The XDA link above? It worked for me without any problems.
Read others messagesIl 9 feb 2023 21:50, kayslay177 @.***> ha scritto:
This worked wonderfully for me. https://forum.xda-developers.com/t/magisk-module-universal-safetynet-fix-2-4-0.4217823/page-156#post-88120721
Tried already but nothing, I'm incredibly unlucky
I was also suddenly unable to pay with my Pixel this morning. I also just disabled v2.4.0 and installed USNF 2.3.1 MOD 3.0. Reboot done, nothing more.
Same, unable as of this morning Any fix?
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
Nothing is working for me, I have to wait for my rom to get a new build
@Displax @pndwal works for me!
How's did you do this
MHPC installed and activated but only MagiskHide props is active (no device fingerprint)
?
What is mhcp?Il 9 feb 2023 23:15, kayslay177 @.***> ha scritto:
How's did you do this MHPC installed and activated but only MagiskHide props is active (no device fingerprint) ?
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
Magisk hide props config
Doesn't work for meIl 9 feb 2023 23:20, kayslay177 @.***> ha scritto: Magisk hide props config
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
How's did you do this
MHPC installed and activated but only MagiskHide props is active (no device fingerprint)
?
Open a Terminal and type 'props' to get the MHPC menu and you should only have option 4 shown as active in green (this is the default status of the module by the way)
Doesn't work for meIl 9 feb 2023 23:20, kayslay177 @.***> ha scritto: Magisk hide props config
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
You have a custom ROM. Try using the Magisk module MHPC (Magisk Hide Props Config) to spoof device fingerprint and choose a Pixel device. It may still not work though...
How's did you do this MHPC installed and activated but only MagiskHide props is active (no device fingerprint) ?
Open a Terminal and type 'props' to get the MHPC menu and you should only have option 4 shown as active in green (this is the default status of the module by the way)
I can select any of the options when I do that, option 4 being "Edit MagiskHide props" right? I can select any of them tho
How's did you do this MHPC installed and activated but only MagiskHide props is active (no device fingerprint) ?
Open a Terminal and type 'props' to get the MHPC menu and you should only have option 4 shown as active in green (this is the default status of the module by the way)
I can select any of the options when I do that, option 4 being "Edit MagiskHide props" right? I can select any of them tho
That's right. I only had option 4 active and let Displax's module do the device fingerprint. You can still use MHPC for device fingerprint but it is no longer updated as module
.. but it is no longer updated as module
Well, apparently it is, just not by @Didgeridoohan: vithuservices is trying to continue it. Here is the new XDA thread of MHPC and the downloads are available here. The source is hosted here (but at the time of posting it is actually down for some reason).
@Displax
Can make some modification to your module to aplicate some system.prop only to Google Service and Play Store ?
I need do that, to only spoof the device and model to that apps I know, maybe is possible with xposed module
But, if your module do that, will be really helpfull to the users with GSI to set manually that props
I fixed my problem, only spoofing some props, so if you can add that feature be nice (some props.ini on your zip or like that to manually change)
The reason is what it is necessary for not break the camera or some apps ported with magisk module
Thanks, sry my bad english
.. but it is no longer updated as module
Well, apparently it is, just not by @Didgeridoohan: vithuservices is trying to continue it. Here is the new XDA thread of MHPC and the downloads are available here. The source is hosted here (but at the time of posting it is actually down for some reason).
Were you able to bypass the cts check with this updated version of MHCP?
.. but it is no longer updated as module
Well, apparently it is, just not by @Didgeridoohan: vithuservices is trying to continue it. Here is the new XDA thread of MHPC and the downloads are available here. The source is hosted here (but at the time of posting it is actually down for some reason).
Good to know ;)
.. but it is no longer updated as module
Well, apparently it is, just not by @Didgeridoohan: vithuservices is trying to continue it. Here is the new XDA thread of MHPC and the downloads are available here. The source is hosted here (but at the time of posting it is actually down for some reason).
Did you use beta?
I have missmatch with experimental module ( I need A13 fingerprint)Il 10 feb 2023 11:26, broli95 @.***> ha scritto:
.. but it is no longer updated as module
Well, apparently it is, just not by @Didgeridoohan: vithuservices is trying to continue it. Here is the new XDA thread of MHPC and the downloads are available here. The source is hosted here (but at the time of posting it is actually down for some reason).
Were you able to bypass the cts check with this updated version of MHCP?
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
Here's the link to one of the commits that works apparently: yaap/frameworks_base@65bafcc
Here's another one: https://gerrit.hentaios.com/c/hentaiOS/platform_frameworks_base/+/624
How to do that
.. but it is no longer updated as module
Well, apparently it is, just not by @Didgeridoohan: vithuservices is trying to continue it. Here is the new XDA thread of MHPC and the downloads are available here. The source is hosted here (but at the time of posting it is actually down for some reason).
Is your Wallet working with tap??
https://github.com/Displax/safetynet-fix this is working for me. it does bypass cts with no problem at all
This isnt working for me oneplus. It did. Then stopped. Basic integrity passes with force basic on props. But CTS now fails no matter what. Is the modules going to be updated? What else can I do? Thanks
This isnt working for me oneplus. It did. Then stopped. Basic integrity passes with force basic on props. But CTS now fails no matter what. Is the modules going to be updated? What else can I do? Thanks
I just gave up with the rom I had and switched to crDroid, never had any problem whatsoever since
it has now been resolved Il 21 lug 2023 00:12, broli95 @.***> ha scritto:
This isnt working for me oneplus. It did. Then stopped. Basic integrity passes with force basic on props. But CTS now fails no matter what. Is the modules going to be updated? What else can I do? Thanks
I just gave up with the rom I had and switched to crDroid, never had any problem whatsoever since
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
Use the safety fix mod 2.4.0 for fix itIl 21 lug 2023 00:01, Newbie1980 @.***> ha scritto: This isnt working for me oneplus. It did. Then stopped. Basic integrity passes with force basic on props. But CTS now fails no matter what. Is the modules going to be updated? What else can I do? Thanks
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you authored the thread.Message ID: @.***>
I soft bricked my one plus trying to spoof it as a pixel with android 12 tonight. Actually scared me. Took hours to get back working.
If there is an easy fix. Please update me. I was getting intermittent "passes" up until a few weeks ago. Now its a fail no matter what on CTS.
Basic integrity passes if you force it on hideprops.
Describe the bug Google It has tightened the verification so the module works in half
Expected behavior A clear and concise description of what you expected to happen.
Screenshots
Device info Device model:surya Android version:13 ROM name/version:Evox 7.5 unofficial
Logs https://mega.nz/file/p2hzHDiI#QWnBd80ETRHlrB1di0peiPmpfArXCgcLnRJk4RqyQr8
Additional context Find a new method for bypass cts
Checklist