[APP] microG GmsCore - lightweight free software clone of Google Play Services

Search This thread

AnonVendetta

Senior Member
Apr 29, 2016
1,484
531
Only for normal apk, for split apk it use pm install-create -i, but the best is that it find all apk parts without the need of you to provide them.
For split apps, I usually zip them up with a *.APKS file extension. I'm guessing your script would need that to be extracted first? Or can it parse the contents of an APKS without prior extraction?
 

ale5000

Senior Member
Dec 24, 2013
1,209
1,107
For split apps, I usually zip them up with a *.APKS file extension. I'm guessing your script would need that to be extracted first? Or can it parse the contents of an APKS without prior extraction?
My script doesn't install apps directly, it just "reinstall" them, without losing their data.
For example to reinstall NewPipe (it must be already installed), you just use:
Code:
adb shell minutil.sh -i org.schabi.newpipe
 

AnonVendetta

Senior Member
Apr 29, 2016
1,484
531
My script doesn't install apps directly, it just "reinstall" them, without losing their data.
For example to reinstall NewPipe (it must be already installed), you just use:
Code:
adb shell minutil.sh -i org.schabi.newpipe
Ok. So it's not useful for newly installed apps. I could just use Titanium Backup or Lucky Patcher (the latter is forbidden here for obvious reasons). But what they both have in common is that they use com.android.vending as the install source for all app installs (Titanium has a configurable option to toggle this). And they both work with splits/non-splits.
 

ale5000

Senior Member
Dec 24, 2013
1,209
1,107
Ok. So it's not useful for newly installed apps. I could just use Titanium Backup or Lucky Patcher (the latter is forbidden here for obvious reasons). But what they both have in common is that they use com.android.vending as the install source for all app installs (Titanium has a configurable option to toggle this). And they both work with splits/non-split s.
My use case is installing an app from Aurora Store, then reinstalling it with the script, so no annoying apk downloads from the browser (it should also fix the missing permissions if you installed an app before microG without the need of uninstall it first.
 

AnonVendetta

Senior Member
Apr 29, 2016
1,484
531
My use case is installing an app from Aurora Store, then reinstalling it with the script, so no annoying apk downloads from the browser.
I don't mind APK downloads. I actually prefer them, I can keep an offline archive that way.

I used to use Aurora, but nowadays I use Raccoon APK Downloader. Far superior, but requires a PC. It technically is only a downloader/Play Store GUI frontend though. It can do installs via ADB, but that's not its' primary function.
 

AnonVendetta

Senior Member
Apr 29, 2016
1,484
531
@ale5000:

Raccoon can also be ran indirectly via Android:

1. Install Andronix
2. Install a minimal Linux distro like Arch
3. Configure GUI access and get into the desktop via VNC
3. Install java JRE or Java JDK
4. Run the Raccoon jar file

With a small tweak to a script, it can even save downloaded files to a custom directory, that is accessible in Android without Andronix. Like on a MicroSD. Raccoon is great for keeping archives of apps. It also supports multiple profiles (Google accounts), and free/paid apps. If you use its' DummyDroid companion program, you can also generate multiple device profiles, generate valid Android IDs, etc.

Downsides:

1. Andronix only supports running distros on 64 bit CPUs.

2. It will be quite unwieldy to navigate/control the Linux/Raccoon GUI, on a device that has a small screen (like a phone). I use this method on a Galaxy Tab S7+, so it's manageable for me.
 
Last edited:

lama02

Member
Nov 22, 2022
10
1
microG: information & safety about SafetyNet/DroidGuard

Hi all,

I'm using microG because I don't want closed binaries running on my Android Device with privileged rights. In this context, I would like to get more information about SafetyNet and DroidGuard, but unfortunately I don't find anything relevant.

If I understood correctly, SafetyNet is a Google API that provides information for the other applications about the state of the device, concerning the security (like bootloader state and so on). In this system, DroidGuard is a closed binary tool that can perform signatures or check in the SafetyNet context.

As indicated in microG, the SafetyNet implementation is open source, but it depends of the DroidGuard binary to perform some operations.

So my question is: is it safe to enable SafetyNet into microG, due to the DroidGuard part? By safe I mean, no risk to see a closed binary doing some thing I don't want? Because, if the service is run as root, it could theoricaly do anything on the device, no?

I'm OK to use closed apps in a microG ROM due to the authorization isolation provided by Android, and I'm also OK to use some Google features. But I'm not OK to have closed binaries running without isolation on the device.

Thanks,
lama02.
 
Last edited by a moderator:

kurtn

Senior Member
Jan 28, 2017
4,858
2,181
Small town in Bavaria
POCO M2 Pro
microG: information & safety about SafetyNet/DroidGuard

Hi all,

I'm using microG because I don't want closed binaries running on my Android Device with privileged rights. In this context, I would like to get more information about SafetyNet and DroidGuard, but unfortunately I don't find anything relevant.

If I understood correctly, SafetyNet is a Google API that provides information for the other applications about the state of the device, concerning the security (like bootloader state and so on). In this system, DroidGuard is a closed binary tool that can perform signatures or check in the SafetyNet context.

As indicated in microG, the SafetyNet implementation is open source, but it depends of the DroidGuard binary to perform some operations.

So my question is: is it safe to enable SafetyNet into microG, due to the DroidGuard part? By safe I mean, no risk to see a closed binary doing some thing I don't want? Because, if the service is run as root, it could theoricaly do anything on the device, no?

I'm OK to use closed apps in a microG ROM due to the authorization isolation provided by Android, and I'm also OK to use some Google features. But I'm not OK to have closed binaries running without isolation on the device.

Thanks,
lama02.
Droid guard is sandboxed by microG. And running as system app is not equal to having root privileges.
 

lama02

Member
Nov 22, 2022
10
1
Droid guard is sandboxed by microG. And running as system app is not equal to having root privileges.
OK thank you for your reply. So it's perfectly safe to run DroidGuard through microG, nice to know.
But in this case what's the purpose to use a remote DroidGuard (we can configure that in the advanced menu)?
 

ale5000

Senior Member
Dec 24, 2013
1,209
1,107
OK thank you for your reply. So it's perfectly safe to run DroidGuard through microG, nice to know.
But in this case what's the purpose to use a remote DroidGuard (we can configure that in the advanced menu)?
This would probably be even more safe, but this would need a remote server that currently doesn't exist.
It isn't just that the server isn't up, the code for the server would also need to be implemented.
 

lama02

Member
Nov 22, 2022
10
1
I don't know. Is remote droid guard a left over from the times we had a separate droid guard helper app?
This would probably be even more safe, but this would need a remote server that currently doesn't exist.
It isn't just that the server isn't up, the code for the server would also need to be implemented.
Thank you - ideed I searched for this remote DroidGuard but found nothing.

What do you mean by "even more safe"? If the DroidGuard process is sandboxed, what are the risks?
 

ale5000

Senior Member
Dec 24, 2013
1,209
1,107
Thank you - ideed I searched for this remote DroidGuard but found nothing.

What do you mean by "even more safe"? If the DroidGuard process is sandboxed, what are the risks?
I wasn't talking about security but about privacy, it had to download a binary from a Google server so they at least know your IP.
It isn't like there is any problem but if you want to be completely anonymous a separate server would be better.
 
  • Like
Reactions: lama02

lama02

Member
Nov 22, 2022
10
1
I wasn't talking about security but about privacy, it had to download a binary from a Google server so they at least know your IP.
It isn't like there is any problem but if you want to be completely anonymous a separate server would be better.
Perfectly clear, so it's acceptable for me. I just don't want a non sandboxed closed binary running on my phone.
Thank you :)
 

wombatch

Member
Jan 18, 2012
44
2
I am trying to install microg on a rom that is pretty much still in beta but I was hoping far enough along that it would work. I built the rom and got it installed then tried to install microg using the "by hand method" ie. copy to /system/priv-app.
The first time i did this it boot looped i haven't installed by hand for years but it seems android x(no idea which x) introduced a requirement for a permissions file in /etc/permissions. I included one of those and got out of my boot loop but still I get the message from some products (let's take signal as an example) that Play services needs to be installed or updated.

I have the latest microg (latest -1 in priv-app) so i am wondering if somewhere there is something else (like the permissions xml file) which needs to be done in order to ensure it works properly? (I've tried blank-store and fake-store).
Another thought, maybe the permissions file should have a fixed name?
Thanks for any help.
 
Last edited:

kurtn

Senior Member
Jan 28, 2017
4,858
2,181
Small town in Bavaria
POCO M2 Pro
I am trying to install microg on a rom that is pretty much still in beta but I was hoping far enough along that it would work. I built the rom and got it installed then tried to install microg using the "by hand method" ie. copy to /system/priv-app.
The first time i did this it boot looped i haven't installed by hand for years but it seems android x(no idea which x) introduced a requirement for a permissions file in /etc/permissions. I included one of those and got out of my boot loop but still I get the message from some products (let's take signal as an example) that Play services needs to be installed or updated.

I have the latest microg (latest -1 in priv-app) so i am wondering if somewhere there is something else (like the permissions xml file) which needs to be done in order to ensure it works properly? (I've tried blank-store and fake-store).
Another thought, maybe the permissions file should have a fixed name?
Thanks for any help.
MicroG doesn't need to be a system app to be detected by signal. But it must spoof the signature of Google play services. Did you pick a spoofing patch for your build?
 

wombatch

Member
Jan 18, 2012
44
2

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    Hi,
    I have created a script to automatically generate a device profile (usable by microG) from a device connected via adb: https://github.com/micro5k/microg-unofficial-installer/blob/main/utils/profile-generator.sh
    Only adb and a device are needed (on Windows you also need busybox to execute the script).

    I would like a feedback from all interested people.

    PS: It can create a profile from most devices and even emulators but it only make sense to create a profile from devices that pass SafetyNet.
    test with this condition. "
    After this you mainly need to spoof info (with device profiles) in one of the way:
    - Create a profile from a device that pass SafetyNet and doesn't physically have hardware attestation: you can use it directly;

    Result: success. ( A13 GSI on Stock A13 , no root , no magisk)
    Thanks

    delete s/n , install Busybox64 overwrite Platform-tools
    test.png
    1
    The busybox linked by me is the most advanced and it doesn't need to be installed, just for example:
    Code:
    busybox sh ./script_name.sh

    PS: On my repo this is really simplified (on Windows), you just need to:
    1) Download the entire source repo from here: https://github.com/micro5k/microg-unofficial-installer/archive/refs/heads/main.zip
    2) Extract it
    3) Double click on cmdline.bat
    4) Then just type:
    Code:
    profgen > my_profile.xml

    The only thing more difficult is setup adb, just placing the file in the same directory may not work, the best thing is install it system-wide or alternatively place it in one folder and just setup PATH manually every time after step 3 and before step 4 with this:
    Code:
    PATH="C:/path_of_the_folder_of_adb;${PATH:?}"
    Yeah, I know how to put adb and other binaries in a custom location and then add that path to the system environment variables. I use lots of 3rd party binaries that aren't built into Windows, it's easier to call them that way because you don't need to specify their absolute path.

    The real issue is that adb works for me in Windows (i can call it from it), but it can't detect any device. I've tried with all 3 devices, nothing. Was working fine a few days ago. It seems likely to me that an OS update screwed with something, it auto installed a big feature update.

    Manjaro's adb recognizes them just fine, so it's likely a driver issue in Windows.
    1
    No, the IMEI isn't supposed to be in the profile xml file, in fact when you use "sh ./profile-generator.sh > profile-name.xml" only the white text will go in the file.

    The output of the script is:
    - White text => what should go in the profile
    - Green text => informational messages
    - Brown text => warnings
    - Red text => errors

    @AnonVendetta
    @tom.android
    PS: My script was previously putting the exact serial number in the xml but now it will put an anonymized one.
    The serial in the profile is just a template so there isn't any difference, microG only use the serial number to generate another rendomly but with similar characteristics.
    The only reason I have added anonymization is that now people can share the xml without giving the real serial number.

    View attachment 5875833
    Bit busy ATM, as soon as I can boot into Manjaro, I'll take that screenshot.

    The point I was making earlier, is that since the IMEI isn't needed for the profile (as you've said yourself), then there is no apparent point in having the script query it. Which in turn should mean that this screenshot is unnecessary, but I'll provide it for you regardless.

    I will pm it to you instead of posting it in this thread, I'm sure you're trustworthy and won't do anything nefarious with it. Although, I would be more concerned if your script needed it, and also required internet access as a precondition of execution.
  • 566
    hXY4lcC.png

    Introduction
    microG GmsCore is a FLOSS (Free/Libre Open Source Software) framework to allow applications designed for Google Play Services to run on systems, where Play Services is not available. If you use your phone without GAPPS this might become a useful tool for you.
    microG GmsCore is one of the two core components of the microG project.
    More up-to-date descriptions and instructions might be available on the wiki

    Instructions
    Preparation:
    1. You need a 4/5/6 ROM that is GAPPS-free. Either don't install them or remove them, if your ROM ships them. Please note that microG GmsCore might run on a cleaned stock ROM, but it might also brick it or cause random bugs. Be aware that only latest Android versions (4.4+) are regularly tested and thus prioritized over older versions when issues occur.
    2. You need a ROM that supports signature faking. Some custom ROMs are patched to support signature faking out of the box, including all OmniROM-based ones. Stock CyanogenMod denied the inclusion, as the possibility of third-party play services implementations is considered a security issue (read here about why it's not). Please ask your ROM developer if unsure. The latest version of signature spoofing for Android < 6.0 has to be enabled at the bottom of the developer settings first. If your ROM does not support signature faking, but you use Xposed, you can grab a Xposed module here.
      If you are a ROM developer or just do custom builds for whatever reason, you can download and include the patch from here and here for Android 5.1 or here for Android 6.0.
    3. Remove UnifiedNlp. In case you installed it before. You can keep your backend modules installed, microG Services will be able to use them later and provide the same feature set (to be precise, microG Services includes UnifiedNlp).

    Installation:
    The installation does not require any modification of the /system partition. All installations should be done using the default app installer included with Android or using `adb install`. This means you need to enable third-party sources or developer mode first.
    1. Install GmsCore.apk as provided in the download section below.
    2. If you want to use Google Cloud Messaging ("Push-Notifications"), Install GsfProxy.apk as provided in the download section below. The GsfProxy version does not need to match the GmsCore.apk version.
      • If you have BlankStore installed, continue with the next step.
      • If you want to be able to access the Play Store, install BlankStore from its thread. It is not a requirement that you set it up correctly and this is not covered by this instructions. If you need help ask in the original thread.
      • If you don't care about Play Store access, Install FakeStore.apk as provided in the download section below.
    3. Open the microG Settings, which are available in the launcher now. If you want to use any Google services (Log-In, Cloud Messaging), tick both checkboxes for background services. This is the only supported setup, but you are free to disable them if you like playing with fire. You can also open the UnifiedNlp settings to enable the location backends of your choice. If you don't have any yet, check out F-Droid. For further questions and concerns regarding UnifiedNlp, use its corresponding thread.
    4. Reboot your device. If you skip this step, everything unwanted is possible.

    Using it:
    • You can test Google Cloud Messaging using this test application. Push notifications do not require account registration.
    • You can add an account through the system settings. Some applications might ask you to do so, if you don't.
    • Use your applications as you like. But note that apps that use Cloud Messaging must be installed after GmsCore, else they will not work. Some hint of applications that can run due to microG GmsCore: TextSecure/Signal, Play Music, YouTube
    • When using AdAway make sure to put mtalk.google.com on your whitelist, else problems are likely to occur when using Google Cloud Messaging. Thanks @benstyle1 for the hint.

    Downloads
    See this wiki page for Downloads. You can find details on the F-Droid repository on https://microg.org/fdroid/.

    Signing key
    The NOGAPPS and microG Project use a shared signing key. Apps and the F-Droid repository are signed using this key. You can verify app signatures using the Checkey app (not when signature spoofing is enabled) and the F-Droid key in F-Droid repository details.
    The SHA-256 hash of the key is:
    9B D0 67 27 E6 27 96 C0 13 0E B6 DA B3 9B 73 15 74 51 58 2C BD 13 8E 86 C4 68 AC C3 95 D1 41 65

    Current implementation progress
    Please check this wiki page for up to date implementation progress.

    Please report bugs
    This project is still rather unstable. Please report bugs as they occur. Whenever you report a bug, please tell us what application caused the bug, including its exact version. If you're the developer, name the play services library you are using. Please do not bother the original app author when it might be related to microG services. If the problem is related to geolocation with UnifiedNlp, report it in the UnifiedNlp thread, even if you're using it through GmsCore.

    Thanks
    Big thanks to everyone who continuously supported me doing this, by donating, pull-requests or just feedback.

    XDA:DevDB Information
    microG GmsCore, App for all devices (see above for details)

    Contributors
    MaR-V-iN
    Source Code: https://github.com/microg/android_packages_apps_GmsCore


    Version Information
    Status: Beta
    Current Beta Version: v0.2.13.203915
    Beta Release Date: 2020-10-19

    Created 2015-10-04
    Last Updated 2020-10-20
    56
    I am still alive, but just super busy.

    Starting end of February, I set aside 20 hours a week to work solely on microG.

    But please don't expect any update earlier than that, I have to ensure that there are no loose ends before I remove myself from some of the obligations I have right now, so probably will be even busier than before.

    Thanks for your ongoing support everyone.
    28
    Nice! Even original Play Store started to work with this! Not fully, but now you can login, search for apps and see already installed ones. Just download doesn't work yet. Keep up good work! Original GMSCore is android cancer.
    26
    Thanks for your feedback @emandt. I appreciate it, although it's impossible for me to not agree with @Ultramanoid that it feels like trolling. I will try to answer to all your concerns.

    It's true that Google API change. This project has some history and still uses some code from 2013. In the meantime, I saw some API changes, but most APIs stay stable. This is because not all play services users update directly and Google does not want important system features to break. I know that Google is aware of this project (or atleast some Google employees are) longer than you are and atleast one change in the web service implementation was targeting a third party software, with microG being the only one I know that fits into that. So yes, I agree that Google is unlikely to be happy with this project. But as Ingress players know, even the mighty Google is not able to block users out that really want to do something with their services. We will always find a way.

    This project is all about privacy. As mentioned above it existed long before I posted it here on XDA and it was reviewed by several people. I also know that at least one "Android company" is working with it. The source code is still fairly simple to follow, and if you want you can check every future commit (and those from the past) one-by-one. It should also be noted that I built privacy related tools for Android the last years, some of them being published here on XDA as well or being integrated in e.g. OmniROM.
    As I don't want users credentials to end up in wrong hands, microG GmsCore doesn't even safe or access your google account password, the login is done through Google's OAuth based website.

    You complained that not "any warning/advice about privacy, credential or critical actions" was stated on the first post. As you mentioned that you're a XDA user for ten years, this can only be trolling: I never saw a ROM or Patched WhatsApp or darkened Play Store or anything else on XDA state something like this in the first post. And most of them were not open source. I expect users to be able to think theirself that, if you enter confidential data, random things might happen with that. I actually pointed that out by mentioning that "This is currently alpha-grade Software. Don't use it if you're not aware of possible consequences." in red letters :)

    I agree that payments are crucial and it is important that they work fluidly. Until now I did not implement anything related to payments for that reason. Inside Play Store, payments are not directed through Play Services, so this is nothing to fear about (this is all about microG GmsCore now, not about a future implementation of the Play Store). On the other hand, as already pointed out by others, payments should be managed server side. It should NEVER be possible to pay more than needed.

    Reducing the enormous size and bloat in Play Services is one of the goals of the project. And I'm quiet sure that this will be possible, because some things inside Play Services just don't need to be there or can be made a lot simpler. The majority of the size until now actually do not really belong to the project (but is the map rendering library used in the backend and the android-support libraries). I did not use proguard until now, I have a single release for all major instruction set (play services use multiple) and 500KB of assets that can also be reduced in size. Although i did not try it yet, I am quiet sure the size final packages size will stay below 10MB. I am not going into details why play services is so huge here, if you're interested in that, ask me when we meet in person.

    And finally I wanted to point out that most Google applications do not user Play Services intensively. Play Store is using it primarily for Auth and checkin, as well as some smaller things like advertisement id. Only Google Plus related apps (Google+, Hangouts) use Play Services a lot. This is not really a surprise considering that Play Services was originally invented for Google+ and OAuth 2 APIs.

    Finally, I'd like to thank you for the insights in your feelings about this project. I guess these answers will not sufficiently satisfy you, but there is not a lot more I can do. Trust me or don't - it's up to you.

    Puh, what a post...
    26
    what is the best way to download this these days? little confused by all the different updates and forks.

    is f droid repo a good place to install from still?

    Here's what I know:

    NanoDroid is an app pack that contains, among other things, MicroG. It also replaces system apps and is compatible with Magisk overlays. It is configured with a text file that can be generated using a zip installer with Aroma. It is currently using @Setialpha's fork of microG. There are also basic subset packs for just MicroG or just system app replacements. It comes with a patched version of Play Store that allows for IAP, but can also install FakeStore.
    @ale5000's zip I think was the first of the unofficial zips and AFAIK just installs official MicroG and related dependencies, as well as removing conflicting apps (important for location services), which NanoDroid does as well. I'm not following the thread for this zip for some reason, and probably should find it so I can follow it. AFAIK, there is no simple configuration for this zip.

    My zips are built by downloading the latest MicroG apps by parsing the F-Droid repo's index file for URLs and thus only follows official releases. There are separate zips for installing with FakeStore, official Play Store, and the NanoDroid patched Play Store. There are also separate NoGapps packs that mirror OpenGapps but with apps from F-Droid (and no MicroG, as that's in a separate installer). Configuration is done at build time, but I provide my build tool and build recipes for easy modification.

    The NoGoolag installer I think is most similar to NanoDroid in that it installs its own fork of MicroG as well as F-Droid system app replacements. I'm least familiar with it, but it's in pretty active development, for what that's worth. I don't know much more about it than that, though.

    All of the above zips AFAIK will ensure best compatibility with your device by uninstalling system apps that will interfere, e.g. with location services; extracting libraries from apps that get installed to /system (Android generally can't find the libraries otherwise); and similar things. This tends to provide a better/easier experience than installing straight from F-Droid, though that is still a valid option. Also, if you use an installer that uses the official MicroG, you can get updates from that F-Droid repo.

    TL;DR: Which installer you use will depend on what you're looking for from it. I will almost always recommend mine, but I am opinionated on the subject. It may be worth you looking deeper into what each does and does not provide and if you need that thing, then make a decision. I would highly recommend using one of the zip installers though, even if it's not mine.