[Discussion] Magisk Alpha (Public Released) fork - @vvb2060

Search This thread

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
alpha changelog
Magisk (a609e0aa-alpha)
- [App] Delete backup file after restoring boot image
- [App] Built-in current version update log
- [General] no longer automatically unlock device blocks
- [App] Compatible with Android 12L
- [App] Added crash statistics
- [App] Allow loading zygisk modules
- [General] Signature Verification
- [App] Fixed some cases where su requests do not respond
- [App] When there is no module, it will prompt whether it is because of skipping loading the module (safe mode, etc.)

How to install?
Install and uninstall Magisk through the Magisk application. Generally, it should be done directly in the application. In special cases such as the first installation, you should use the fastboot/odin tool to flash it after patching the image. By customizing Recovery is not a supported way.

Upstream changelog
Magisk (63a89d9f) (24306)
- [App] Fix incorrect superuser snackbar text
- [MagiskInit] Improvements to sepolicy hijack - [MagiskInit] Use `LD_PRELOAD` on 2SI init to assist hijack
- [MagiskInit] Support Oculus Go
- [MagiskSU] Fix a possible crash in `magiskd`

Diffs to v24.3
- [MagiskInit] Update 2SI implementation, significantly increase device compatibility (e.g. Sony Xperia devices)
- [MagiskInit] Introduce new `sepolicy` injection mechanism
- [MagiskInit] Support Oculus Go
- [App] [MagiskSU] Properly support apps using shared UID
- [MagiskSU] Fix a possible crash in `magiskd` - [Zygisk] Fix function hooking on devices running Android 12 with old kernels
- [BusyBox] Add workaround for devices running old kernels
 
Last edited:

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
alpha changelog
Magisk (13450819-alpha)
- [App] Delete backup file after restoring boot image
- [App] Built-in current version update log
- [General] no longer automatically unlock device blocks
- [App] Compatible with Android 12L
- [App] Added crash statistics
- [App] Allow loading zygisk modules
- [General] Signature Verification
- [App] Fixed some cases where su requests do not respond
- [App] When there is no module, it will prompt whether it is because of skipping loading the module (safe mode, etc.)
- [App] Fix root shell initialization too late

How to install?
Install and uninstall Magisk through the Magisk application. Generally, it should be done directly in the application. In special cases such as the first installation, you should use the fastboot/odin tool to flash it after patching the image.
By customizing Recovery is not a supported way.

Upstream changelog
Magisk (63a89d9f) (24306)
- [App] Fix incorrect superuser snackbar text
- [MagiskInit] Improvements to sepolicy hijack
- [MagiskInit] Use `LD_PRELOAD` on 2SI init to assist hijack
- [MagiskInit] Support Oculus Go
- [MagiskSU] Fix a possible crash in `magiskd`

Diffs to v24.3
- [MagiskInit] Update 2SI implementation, significantly increase device compatibility (e.g. Sony Xperia devices)
- [MagiskInit] Introduce new `sepolicy` injection mechanism
- [MagiskInit] Support Oculus Go
- [App] [MagiskSU] Properly support apps using shared UID
- [MagiskSU] Fix a possible crash in `magiskd`
- [Zygisk] Fix function hooking on devices running Android 12 with old kernels
- [BusyBox] Add workaround for devices running old kernels
 
Last edited:

eienkisu

New member
Jul 7, 2013
3
2
These bank apps still are detecting magisk alpha despite in denylist, and hide magisk, zygisk, shamiko, universal safetynet fix. The apps only works with magisk uninstalled and phone unrooted.


this app detects magisk on zygisk, but not on riru.
 
These bank apps still are detecting magisk alpha despite in denylist, and hide magisk, zygisk, shamiko, universal safetynet fix. The apps only works with magisk uninstalled and phone unrooted.


this app detects magisk on zygisk, but not on riru.
When magisk is installed, does your phone pass both SefetyNet tests? Is it shown as certified in Pay Store > settings > About?
 
Last edited:

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
alpha changelog
Magisk (a32c4561-alpha)
- [App] Delete backup file after restoring boot image
- [App] Built-in current version update log
- [General] no longer automatically unlock device blocks
- [App] Compatible with Android 12L
- [App] Added crash statistics
- [App] Allow loading zygisk modules - [General] Signature Verification
- [App] Fixed some cases where su requests do not respond
- [App] When there is no module, it will prompt whether it is because of skipping loading the module (safe mode, etc.)
- [App] Fix Arabic environment cannot hide app - [Scripts] Fix boot image v1 signature

How to install?
Install and uninstall Magisk through the Magisk application. Generally, it should be done directly in the application. In special cases such as the first installation, you should use the fastboot/odin tool to flash it after patching the image. By customizing Recovery is not a supported way.

Upstream changelog
Magisk (cc79a96f) (24307)
- [App] Update libsu with 100% new I/O layer
- [MagiskInit] Mock enforce file with regular file to prevent possible race condition
- Switch normal NDK with ONDK, preparing the toolchain to introduce Rust

Diffs to v24.3
- [MagiskInit] Update 2SI implementation, significantly increase device compatibility (e.g. Sony Xperia devices)
- [MagiskInit] Introduce new `sepolicy` injection mechanism
- [MagiskInit] Support Oculus Go
- [App] [MagiskSU] Properly support apps using shared UID
- [MagiskSU] Fix a possible crash in `magiskd` - [Zygisk] Fix function hooking on devices running Android 12 with old kernels
- [BusyBox] Add workaround for devices running old kernels
 
Last edited:

Stillhard

Senior Member
Sep 25, 2016
281
178
These bank apps still are detecting magisk alpha despite in denylist, and hide magisk, zygisk, shamiko, universal safetynet fix. The apps only works with magisk uninstalled and phone unrooted.


this app detects magisk on zygisk, but not on riru.
No problem here, Magisk v23 + Riru + Riru-MomoHider + Riru-USNF + Riru-LSPosed + Own module

photo_2022-05-06_21-20-56.jpgphoto_2022-05-06_21-20-05.jpgphoto_2022-05-06_21-20-13.jpgphoto_2022-05-06_21-20-16.jpgphoto_2022-05-06_21-24-16.jpg
 

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
alpha changelog
Magisk (71e9c044-alpha)
- [App] Delete backup file after restoring boot image
- [App] Built-in current version update log
- [General] no longer automatically unlock device blocks
- [App] Compatible with Android 12L
- [App] Add telemetry ┤Mod Edit├┤Telegram link removed as it does not meet posting requirements
- [App] Allow loading zygisk modules
- [General] Signature Verification
- [App] Fixed some cases where su requests do not respond
- [App] When there is no module, it will prompt whether it is because of skipping loading the module (safe mode, etc.)
- [App] Fix can't open app without root

How to install?
Install and uninstall Magisk through the Magisk application. Generally, it should be done directly in the application. In special cases such as the first installation, you should use the fastboot/odin tool to flash it after patching the image. By customizing Recovery is not a supported way.

Upstream changelog
Magisk (42e5f515) (24308)
- Several minor bug fixes

Diffs to v24.3
- [MagiskInit] Update 2SI implementation, significantly increase device compatibility (e.g. Sony Xperia devices)
- [MagiskInit] Introduce new `sepolicy` injection mechanism
- [MagiskInit] Support Oculus Go
- [App] [MagiskSU] Properly support apps using shared UID
- [MagiskSU] Fix a possible crash in `magiskd`
- [Zygisk] Fix function hooking on devices running Android 12 with old kernels
- [BusyBox] Add workaround for devices running old kernels
 
Last edited by a moderator:
  • Like
Reactions: dr4go

dr4go

Senior Member
Dec 17, 2010
473
397
Vienna
Nothing against those intentions, but there is a Magisk General thread, a Zygisk thread and the Alpha thread. Just sharing my opinion, of course.
 

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
Nothing against those intentions, but there is a Magisk General thread, a Zygisk thread and the Alpha thread. Just sharing my opinion, of course.
@dr4go
After, @pndwal post # 79 stated the Upstream Changes in Magisk alpha matches the changes in Magisk Canary. I understand your concern about the posting of Magisk Canary Updates in this thread. It will be rectified.
 
Last edited:

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
alpha changelog

Magisk (071ae79f-alpha)
- [App] Delete backup file after restoring boot image
- [App] Built-in current version update log
- [General] no longer automatically unlock device blocks
- [App] Compatible with Android 12L
- [App] Add telemetry ┤Mod Edit├┤Telegram link removed as it does not meet posting requirements
- [App] Allow loading zygisk modules
- [General] Signature Verification
- [App] When there is no module, it will prompt whether it is because of skipping loading the module (safe mode, etc.)

How to install?
Magisk is installed and uninstalled through the Magisk application. Generally, it should be done directly in the application. In special cases such as the first installation, the image should be patched and then flashed using the fastboot/odin tool. By customizing Recovery is not a supported way.

Upstream changelog
Magisk (c11ccbae) (24310)
- Pixel 6 Android 13 Beta 2 support is here!
- [App] Support requesting root from non app process
- [App] Fix deadlocking a background thread on non-root devices
- [MagiskInit] Support GKIs with no ramdisk (Pixel 6 Android 13)
- [MagiskBoot] Fix vbmeta extraction implementation

Diffs to v24.3
- [MagiskInit] Update 2SI implementation, significantly increase device compatibility (e.g. Sony Xperia devices)
- [MagiskInit] Introduce new `sepolicy` injection mechanism
- [MagiskInit] Support Oculus Go
- [MagiskInit] Support GKIs with no ramdisk (Pixel 6 Android 13)
- [MagiskBoot] Fix vbmeta extraction implementation
- [App] [MagiskSU] Properly support apps using shared UID
- [MagiskSU] Fix a possible crash in `magiskd`
- [Zygisk] Fix function hooking on devices running Android 12 with old kernels
- [BusyBox] Add workaround for devices running old kernels
 
Last edited by a moderator:
  • Like
Reactions: rodken and dr4go

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
Update

"May 15, 2022
Magisk alpha
Magisk officially changed the canary channel to release mode, and introduced a new debug channel to replace the old canary channel.
Issue reports require the use of the debug channel version, the canary channel is available for general use.

alpha is unaffected, there is no change. In addition, 24311 and 24312 only add update channels, so alpha is not released"
 
  • Like
Reactions: dr4go and rodken

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
alpha changelog
Magisk (edb76503-alpha)
- [App] Delete backup file after restoring boot image
- [App] Built-in current version update log
- [General] no longer automatically unlock device blocks
- [App] Compatible with Android 12L
- [App] Add telemetry ┤Mod Edit├┤Telegram link removed as it does not meet posting requirements
- [App] Allow loading zygisk modules
- [App] When there is no module, it will prompt whether it is because of skipping loading the module (safe mode, etc.)

How to install? Install and uninstall Magisk through the Magisk application. Generally, it should be done directly in the application. In special cases such as the first installation, you should use the fastboot/odin tool to flash it after patching the image. By customizing Recovery is not a supported way.

Upstream changelog
Magisk (8dfb30fe) (24313)
- [App] Fix Debug channel preference not sticking
- [App] Update the stub dynamic resource loading implementation to use official APIs on API 30+
- [MagiskSU] Prune unused UIDs as soon as possible to prevent UID reuse attacks
- [MagiskSU] Verify and enforce the installed Magisk app's certificate to match the distributor's signature
- [DenyList] Fix DenyList on shared UID apps

Diffs to v24.3
- [MagiskInit] Update 2SI implementation, significantly increase device compatibility (e.g. Sony Xperia devices)
- [MagiskInit] Introduce new `sepolicy` injection mechanism
- [MagiskInit] Support Oculus Go
- [MagiskInit] Support Android 13 GKIs (Pixel 6)
- [MagiskBoot] Fix vbmeta extraction implementation
- [App] [MagiskSU] Properly support apps using shared UID
- [MagiskSU] Fix a possible crash in `magiskd`
- [MagiskSU] Prune unused UIDs as soon as possible to prevent UID reuse attacks
- [MagiskSU] Verify and enforce the installed Magisk app's certificate to match the distributor's signature
- [Zygisk] Fix function hooking on devices running Android 12 with old kernels
- [DenyList] Fix DenyList on shared UID apps
- [BusyBox] Add workaround for devices running old kernels
 
Last edited by a moderator:
  • Like
Reactions: paarkhi and dr4go

Homeboy76

Recognized Contributor
Aug 24, 2012
4,200
2,728
Google Pixel 8 Pro
alpha changelog

Magisk (d7776f65-alpha)
- [App] Delete backup file after restoring boot image
- [App] Built-in current version update log
- [General] no longer automatically unlock device blocks
- [App] Compatible with Android 12L
- [App] Add telemetry ┤Mod Edit├┤Telegram link removed as it does not meet posting requirements
- [App] Allow loading zygisk modules

How to install? Magisk is installed and uninstalled through the Magisk application. Generally, it should be done directly in the application. In special cases such as the first installation, the image should be patched and then flashed using the fastboot/odin tool. By customizing Recovery is not a supported way.

Upstream changelog
Magisk (bf04fa13) (24314)
- [App] Fix language switch
- [MagiskSU] Handle `system_server` restarts to prevent UID reuse abuse

Diffs to v24.3
- [MagiskInit] Update 2SI implementation, significantly increase device compatibility (e.g. Sony Xperia devices)
- [MagiskInit] Introduce new `sepolicy` injection mechanism
- [MagiskInit] Support Oculus Go
- [MagiskInit] Support Android 13 GKIs (Pixel 6)
- [MagiskBoot] Fix vbmeta extraction implementation
- [App] [MagiskSU] Properly support apps using shared UID
- [MagiskSU] Fix a possible crash in `magiskd`
- [MagiskSU] Prune unused UIDs as soon as possible to prevent UID reuse attacks
- [MagiskSU] Verify and enforce the installed Magisk app's certificate to match the distributor's signature
- [MagiskSU] Handle `system_server` restarts to prevent UID reuse abuse
- [Zygisk] Fix function hooking on devices running Android 12 with old kernels
- [DenyList] Fix DenyList on shared UID apps
- [BusyBox] Add workaround for devices running old kernels
 
Last edited by a moderator:
  • Like
Reactions: rodken and dr4go

infernix

Senior Member
Oct 7, 2007
116
64
So I updated to the latest alpha (d7776f65) and updated shamiko to 0.5.0 as well. magisk is hidden. YASNAC shows I pass basic and CTS. MOMO only reports that debugging mode is enabled. I have at least 5 banking and other root detecting apps that all work fine (e.g. denylist is not enforced but they are all checked on it so that means shamiko works).

But Microsoft Intune (aka Company Portal) says I'm rooted. It did not do that on the previous version of shamiko (i think 0.3.0 but could be older) and magisk alpha (24.1 or .2).

I have all microsoft apps hidden including every single expanded option. No idea how they're pulling it off. Downgrading to a previous version of Intune doesn't help either.
 

Top Liked Posts

  • There are no posts matching your filters.
  • 4
    Verbatim from the developer(s) of Magisk Alpha:

    magisk may lead to leakage of device unique identifiers

    Affected versions: All versions before 27.0, and under special circumstances all versions after 27003 Affected devices: Android11 and higher devices

    Details

    Starting from Android 11, the system restricts user applications from using netlink's RTM_GETLINK to read the network card mac address. This is achieved by customizing SELinux to add flag bits. This modification is rejected by Linux upstream and is an Android-specific modification.
    Prior to 27.0, magisk used the upstream libselinux library, so this Android-specific flag was lost when patching sepolicy, resulting in the restriction not being enabled properly and any application being able to read the mac address.
    After 27.0, magisk enables restrictions unconditionally for all devices. However, some devices that have been upgraded to new kernels support processing this flag, but the sepolicy in the user space is not ready, causing all processes to be restricted. The intuitive manifestation is that they cannot connect to WiFi.
    Starting from 27003, magisk parses the flag of the old sepolicy and copies it to the new sepolicy, and the original problem is solved.

    Magisk's sepolicy real-time patching function reads the current sepolicy from the kernel and reloads the sepolicy after patching the rules. Due to bugs in the kernel, Android-specific flags will not be reported to user space, and the current sepolicy read by magisk will never have this specific flag. So after sepolicy was patched in real time, the restriction was disabled and all applications could read the mac address.
    This kernel bug can be fixed using https://android-review.googlesource.com/c/kernel/common/+/3009995 , but for unknown reasons Google requested that the patch be submitted to Linux upstream, and then it was said that this Android-specific bug should be deleted. Function. In short, the patch is currently refused to be merged by Google, and there is nothing we can do about it. Compared with being unable to connect to WiFi, it is acceptable to leak the mac address after patching the sepolicy in real time.

    Utilization

    We observed that popular apps are using RTM_GETLINK to obtain the device mac address. At least one app detects magisk by determining that Android 11+ devices can still read mac addresses.

    suggestion

    Devices prior to Android 11 are not affected. Other devices should be upgraded to magisk 27.0. If WiFi is not available, upgrade to 27003. When using 27003+, do not use sepolicy live patching, check all modules and root applications and ask their developers to switch to sepolicy.rule.

    Related Links

    magisk causes mac address to leak https://github.com/topjohnwu/Magisk/issues/7636
    magisk breaks WiFi https://github.com/topjohnwu/Magisk/issues/7764
    magisk copies Android specific flags to new sepolicy https://github.com/topjohnwu/selinux/commit/48fcf8bba0635dc597bef75994294fd055d9f0ba
    Implementation of Android-specific flags in the kernel (only the policydb_read() function is processed, and the policydb_write() function is forgotten)https://android.googlesource.com/ke...dacce6fbc6fchttps://android.googlesource.com/ kernel/common/+/bdf56fbea560eea1e9c2793d69ba13cca2596d7d
    Kernel repair patch, processing policydb_write() function https://android-review.googlesource.com/c/kernel/common/+/3009995

    Acknowledgments

    aviraxp
    https://t.me/qianqianzhuang/33
    2
    the lsposed and shamiko releases have stopped because of arguments with another developer/team.
    And hell hath no fury like a woman scorned.
    (They are all young ladies)
    2
    Version ecc74d45-alpha (27002)
    Mar 21, 2024 at 02:19
    11.05 MB

    alpha update log
    Breaking behavior change: magiskd internal mount points are uninstalled when no longer in use.

    New feature: Enhanced security mode. If it fails to boot normally twice in a row, Magisk will automatically enter safe mode the third time. In safe mode, all functions are turned off and all modules are disabled. Only the Magisk application can use su. For computer debugging, please use adb shell 'PATH=$PATH:/debug_ramdisk su'.

    Magisk (ecc74d45-alpha)
    [App] Delete backup files after restoring boot image
    [App] does not actively request permissions
    [General] Keep ROOTOVL temporary files
    [App] Check and download updates via appcenter
    [App] Add telemetry https://t.me/s/magiskalpha/473
    [General] Make blocklist work when zygisk is not enabled
    [General] Remove addon.d support
    [MagiskSU] Support removal capabilities
    [General] Support users to limit Root capabilities [Applications using older versions of libsu will be mistakenly identified as non-root]
    [General] Automatically copy files after initial installation
    [App] Add backup DoH
    [General] Enhanced security mode
    [App] The restart menu can be set to enter Magisk safe mode next time you boot.
    [Denylist] Enhance uid tracking and automatically delete uninstalled applications from the block list. Improve app startup performance, zygisk no longer scans the application list.
    [General] Improve app startup performance, zygisk no longer checks the signature of the repackaged magisk app when each app is started.
    [MagiskPolicy] Significantly reduced the number of rules

    Upstream update log
    Magisk (81658d45) (27002)
    [General] Use a minimal libc to build static executables (magiskinit and magiskboot) for smaller sizes
    [MagiskInit] Rewrite 2SI logic for injecting magiskinit as init
    [MagiskBoot] Support spliting kernel images without decompression
    [App] Support patching Samsung firmware with images larger than 8GiB
    [App] Use user-initiated job instead of foreground services on Android 14
    1
    And hell hath no fury like a woman scorned.
    (They are all young ladies)
    [Off-topic] I suppose that someone felt betrayed and as a result there will be consequences.
    1
    Upgraded to Alpha 27002 fine (just make sure you unhide & restore the Magisk app back to the original APK if you have applied Magisk hide, before upgrading Alpha).
  • 22

    This is the spot for the General Support Discussion of Magisk Alpha "Public Released" fork created by @vvb2060.


    Disclaimer
    : This Magisk Alpha fork is not supported by @topjohnwu and is not an official channel for him. Use at your own risk.

    Important : This Magisk Alpha thread was created to share information about Magisk Alpha Public Releases with XDA members that do not use telegram.

    If Magisk Alpha doesn't work for you try one of the other versions of Magisk (See Useful links below).

    How to install Magisk Alpha?
    Magisk Alpha is installed and uninstalled through the Magisk application (App). Generally, it should be done directly in the application. In special cases such as the first installation, the image should be patched and then flashed using the fastboot/odin tool. By customizing Recovery is not a supported way.

    Detailed Instructions for the first installation of Magisk Alpha on Google™ Pixel™ phones.

    Note: These Instructions may not apply to all Google™ Pixel™ Phones.
    1. If you have another version of Magisk (Beta/Stable [Forks - Cygisk/Delta] Stable) installed:
      • Open the Magisk Manager app and disable/remove all Magisk modules. If you hid the Magisk manager app the default name for the hidden Magisk app is settings.
        If you gave it a different name and you've forgotten the name. Use TB checker to find the name of the hidden Magisk Manager. You can also use TB Checker to check if you have more than one Magisk Manager app installed.
      • Uninstall Magisk
    2. Extract boot/init_boot.img from Factory Image
      • Download the latest Factory image to your phone.
      • Extract the Factory Image file (aaaaaaa-a9a9a.999999.999-factory-99a9a99a.zip) to a folder.
      • Open the folder you extracted the Factory image to and, extract the Image file (image-aaaaaaa-aa9a.999999.999.zip) into the folder. The, stock, boot/init_boot.img file will be in this folder.
    3. Patch the boot/init_boot.img.
      • Download the latest version of Magisk Alpha
      • Install the Magisk Alpha App
      • Open Magisk Alpha App
      • Tap Install (next to Magisk)
      • Tap, Select and Patch a File
      • Navigate to the folder that you extracted the Stock boot/init_boot.img to and select it.
      • Tap the ✓ (Check Mark)
      • Tap Let's Go
      • When you see done, the boot/init_boot.img has been patched (magisk_patched_xxxxxx.img), and stored in the download folder.
      • Reboot
      • Move the patched boot/init_boot.img file to your computer's Platform-tools folder or the folder that has fastboot.exe in it:
        1. Copy it to a USB drive and transfer it to your computer.
        2. Move it to your computer using adb push
      • Boot fastboot mode
      • Connect the phone to the Computer with USB cord.
      • Open a Command Prompt in the folder you copied the patched boot.img to.
      • Type fastboot flash boot --slot all "name of patched boot".img or fastboot flash init_boot --slot all "name of patched boot".img without the quotation marks at the Prompt and press enter.
      • When it finishes installing the patched boot.img or init_boot.img, type fastboot reboot at the Prompt and press enter.
      • Important Notes:If your phone boot loops try one of the following options:
        1. Flash the 'stock' boot/init_boot.img to both slots: fastboot flash boot/init_boot --slot all boot/init_boot.img. Then reboot , that will remove root.
        2. Boot Safe Mode[/URL] - While booting, press and hold your phone's volume down button. Keep holding it until the animation ends and your phone starts in safe mode. Then reboot and magisk modules should be disabled. (Thanks Lughnasadh)

    Changing/Downgrading Magisk?

    Useful Links
    1. Androidacy - Module Manager
    2. Androidacy - Module Manager - Releases
    3. Androidacy - Download Center
    4. Magisk alpha
    5. Magisk Beta - 26.4 - 5 Nov
    6. Magisk Canary - Latest release
    7. Magisk Cygisk - Click Page 5 for installation Instructions.
    8. Kitsune Mask Another unofficial mask of Magisk (previously referred to as Magisk Delta)
    9. Magisk Stable - 26.4 - 5 Nov
    10. Magisk - Documentation
    11. LSPosed - Framework
    12. LSPosed - Releases
    13. LSPosed - Shamiko Releases
    14. SafetyNet - osm0sis Play Integrity Fork - Latest version installation

      Install osm0sis PlayIntegrityFork module
      • Open Magisk
      • Tap Modules icon
      • Tap Install from storage
      • Navigate to the osm0sis PlayIntegrityFork file you downloaded.
      • Tap the osm0sis PlayIntegrityFork file.
      • When you see the confirmation screen, tap Ok.
      • After it installs tap the Disc icon to save the log
      • Tap Reboot
      Settings for Magisk
      • Open Magisk App
      • Tap the Setup icon.
      • Scroll down to App and set the Update Channel to Alpha.
      • Scroll down to Check Updates and enable it.
      • Scroll down to Magisk and enable Zygisk.
      • Enable Denylist
      • Tap Configure DenyList => Tap 3 Dot Menu => Check ✓ Show system apps => Check ✓ Google Play Store, Google Pay, Google Wallet etc.
      • (Optional) Scroll down to Superuser and enable Enable Biometric Authentication.
      Get Device Certified
      • Flash the osm0sis PlayIntegrityFork module in Magisk
      • Turn Airplane mode on
      • Open Settings
      • Tap Apps & notifications
      • Tap see all...
      • Tap three dot menu
      • Tap Show system
      • Scroll to Google Wallet/Play Store/Play Services/Netflix/etc.
      • Clear Google Wallet cache (if you have it)
      • Clear Google Play Store cache and data
      • Clear Google Play Services (com.google.android.gms) cache and data (Optionally skip clearing data and wait some time, ~24h, for it to resolve on its own)
      • Clear Netflix cache and data
      • Clear ect. items cache and data
      • Turn Airplane mode Off
      • Reboot
      Check Device Certification
      • Note: If after completeting Get Device Certified your device is not certifed or your device is certified but certain apps (Google Pay, NetFliks, etc.) are not working. Do this to verify you are passing Play Integrity.
        1. Open Google Play Store app
        2. Tap your profile icon (top right corner)
        3. Tap Settings.
        4. Open the About menu
        5. Tap the row labeled Play Store version seven times to unlock developer mode.
        6. Tap the back arrow (upper left corner)
        7. Tap your profile icon (top right corner)
        8. Tap Settings.
        9. Open the General menu
        10. Tap Developer options
        11. Tap Check integrity
        12. If you see Basic Integrity and Device Integrity, you're passing Play integrity.
    8
    The Alpha dev archived the Github repo, thus breaking another very needed repo we use to build our kernels for out devices:

    https://github.com/CruelKernel/samsung-exynos9820

    Anyone know the guy or how to contact him?
    Not a guy... It was private test fork of vvb2060 (Xue ShanNangong, or Nangong Xueshan), one of the five current main official Magisk Devs... (Only John Wu is Male. 😜)

    I think the mentality has changed somewhat from days when she was happy for it to be an alternative daily use Magisk build and scrupulously made source available either on GitHub or later as associated source code .zip, although it was always meant to be a test-bed for innovations in official Magisk*, and has delivered ground breaking commits... It used to be her personal fork, but seems recent Alpha builds are build from https://github.com/LSPosed/Magisk/commits/ , not public, rather than from her GitHub... You can see the LSP / @yujincheng08 (LoveSy, lovesykun, shanasaimoe, Shana Saimoe) Metagisk test branches where many commits currently originate however and of course if you don't trust Alpha you could fork a Metagisk test branch and build from source yourself... Eg for current WIP native bridge loaded Zygisk (with PR in official Magisk also from this Metagisk branch), see:
    https://github.com/LSPosed/Metagisk/commits/zygisk

    * Nb. vv's prolific contributions to Magisk over the last 3 years or so probably make up a good half of the current Magisk code and include so many early tests and first available builds adding compatibility for countless devices Incl. most MTK based devices & fixes... She has developed some initial fixes and enhancements in other test branches like Lite (for enhanced root detection bypasses) and MTK (for MediaTek compatibility fixes), but most have been tested in Alpha experimental branch. Just to mention a sampling I posted a couple of years ago: MTK compatibility, single package delivery, support for 64bit, sepolicy fixes, several isolated process fixes, fixes for UID, MicroG, process names, file based encryption, mount rules for Samsung, auto-close issues bot, reboot menu, multi-user and shared user id compatibility fixes, hidden apps, Chinese doc translations, offline restore app, unsupported environment checking, fix for apex path (a big one), permission fixes, module Installation fixes, Kotlin code cleanup, MagiskHide stopping fix, renameable App / single package Magisk archive (developed in cooperation with John).... And countless more recent commits for various devices/compatibility, new functionality and major refactoring of magiskinit injection, sepolicy rules and so on.

    The mentality now seems to be to use a smaller test group (of course Alpha now uses MS App Centre both for telemetry to facilitate debugging and testing in a test pool mainly aimed at Devs and testers in the Chinese TG Alpha discussion group, many of whom contribute to LSPosed and associated projects, and for distribution/updates; App Centre allows mainland China users to get the automated updates since GitHub repos are apparently blocked for them) who are OK with telemetry (Devs received very negative responses about that from outsiders) and who simply trust the LSP associated Devs rather than to continue to supply source and accommodate the wants of 'needy' users any longer...

    Notably, the Alpha builds are often available privately for days or weeks in the private discussion group (some 940 members) before they are forwarded to the public Alpha TG release channel (circa 33000 subscribers) which just seems to exist now to allow others to access it also if they wish... Of course if Canary is "cutting edge" Magisk, Alpha is "bleeding edge", and Devs are simply not going to accommodate users with issues who don't know how to rescue devices from bad builds, revert changes, downgrade etc even within the discussion group... It's for testers and mavericks after all, not a substitute Magisk fork for general users' daily use, and was never meant to be...

    I can't build a kernel now with the latest Magisk Alpha.
    Do you mean a pre-rooted kernel / ROM?... Not sure why you want to do that... In my experience these often cause more issues/headaches for users than clean ROMs...

    🤠 PW
    7
    This is my dumbed down version of this post https://xdaforums.com/t/discussion-magisk-alpha-public-released-fork-vvb2060.4424845/post-88851739 two pages back, which allowed me to transition from Stable Magisk to Alpha without having to reflash any modules etc.
    1. Put the phone in airplane mode.
    2. If you have hidden current magisk, unhide it.
    3. Rename alpha.apk to alpha.zip
    4. Flash alpha.zip with current magisk. Don't reboot.
    5. Delete the magisk folder from data-adb. Also remove magisk.db file from the same location.
    6. Uninstall the current magisk application which you had unhidden in step 2.
    7. Reboot
    8. Remove airplane mode to complete magisk installation
    9. You would be prompted to reboot when you enter the new magisk alpha app. Do that. Once rebooted, open Magisk and do a direct installation to be doubly sure that magisk is properly installed with root.
    10. Make sure that in all this process do no open play store or any of the applications that you had in Deny list.
    11. You will find that all the apps in deny list would be unchecked. Re-check the same applications once again
    12 Reboot
    13 Profit
    6
    The author of Magisk Alpha is extremely untrustworthy. It is highly recommended to use the official version.