• Introducing XDA Computing: Discussion zones for Hardware, Software, and more!    Check it out!

Magisk General Support / Discussion

Search This thread

pndwal

Senior Member
1. Toggle on the enforce denyList
2. Click on Configure denyList
3. Choose "Google Play Service" and checklist on "com.android.gms" and "com.android.gms.unstable"

Should do the trick for safetynet. Hope it helps out with the Hysteria of magiskhide is no more.
Nb. For devices where Magisk resides in /sbin (many pre. Android 11), only com.google.android.gms.unstable in Google Play Services is needed in hidelist / denylist. PW
 

tronderbataljon

Senior Member
Jun 15, 2011
54
3
Oksvoll
1. Toggle on the enforce denyList
2. Click on Configure denyList
3. Choose "Google Play Service" and checklist on "com.android.gms" and "com.android.gms.unstable"

Should do the trick for safetynet. Hope it helps out with the Hysteria of magiskhide is no more.
What am I doing wrong?
Device, Xiaomi Mi 10t
Rom, Evox A11
Modules, RiRu v26. 1.2 + USNF v2. 1.1
 

Attachments

  • Screenshot_20210915-223513_Magisk.png
    Screenshot_20210915-223513_Magisk.png
    68.9 KB · Views: 89
  • Screenshot_20210915-223507_Magisk.png
    Screenshot_20210915-223507_Magisk.png
    148.9 KB · Views: 90
  • Screenshot_20210915-223458_Magisk.png
    Screenshot_20210915-223458_Magisk.png
    150.8 KB · Views: 88
Last edited:

pndwal

Senior Member
@pndwal I think we basically said the same things, just in different ways lol.
I think we're on the same page too.

It was only really this notion that I saw differently:
bobbarker2 said:
... from a practical POV, Magiskhide was/is a required component of rooting and Magisk. Without Magiskhide, a device with Magisk will no longer be able to run a plethora of apps and it will not be Google Play Store Certified.
because rather than suggesting 'devices would lose ability to run apps / not be certified' due to Magisk and root being unable to be hidden, John himself said:
... it is important to me that Magisk is able to “get out of the way”, so a minor subset of the MagiskHide infrastructure will remain. Users will be able to assign a denylist of processes where Magisk denies further modifications and reverts all changes it had done.
and he said it from the getgo.

So far things are shaping up this way. Such devices will still be perfectly (maybe more perfectly) able to run those same apps and be 'certified' w/ new denylist.

I / others have been at pains to dispell the negative idea that traditional MagiskHide functionality has been killed off. This is in part because John himself has as good as said it hasn't, will be trivial to restore, and that he's '10000% sure' some 'hiding module' will also 'pop up as soon as possible'.

It's looking more and more as if denylist is and will likely remain pretty much a change in name only while old MagiskHide overt subterfuge and spoofing functions for working SafetyNet have been offloaded (to be easily restored by 3rd party modules). 😀
OnePlus owners can thank @osm0sis for PR #90. Safetynet fix is v2.1.1 now.
Yeah! 😛 👍
John Wu

The beauty of open source!
PW
 
Last edited:
  • Like
Reactions: duttyend

zgfg

Senior Member
Oct 10, 2016
5,850
3,324
I finally updated my Xiaomi Mi 9T, running Xiaomi.eu_Stable, A11 (MIUI 12.1) to the latest Alpha b6298f86.
Thanks @pndwal for encouraging me

With this ROM and with the old Magisk v23 (incl. the previous Alpha versions) I didn't need any modules, spoofing or so - it was simply passing SafetyNet with MagiskHide enabled (and my SN was not affected by the recent Google move on Sep 2 or so)

Now, cat has changed the color (Deng) but it still catches the mice - with DenyList enforced and the usual two GMS processes enlisted, it happily passes the SN again
 

Attachments

  • Magisk Alpha.jpg
    Magisk Alpha.jpg
    328.6 KB · Views: 63
  • DenyList.jpg
    DenyList.jpg
    324.1 KB · Views: 67
  • Google Play Services.jpg
    Google Play Services.jpg
    308.2 KB · Views: 64
  • SafetyNet .jpg
    SafetyNet .jpg
    182.4 KB · Views: 62
  • Device Certified.jpg
    Device Certified.jpg
    252 KB · Views: 55
  • PlayProtect.jpg
    PlayProtect.jpg
    295.6 KB · Views: 58
Last edited:

73sydney

Senior Member
Jul 21, 2018
1,903
1,667
Sydney
Google Pixel 2 XL
Even i got in on the act and updated to latest Alpha, decided not to be lazy. Enable System Apps, a few ticks for Google Play Services, a list of Samsung gear...my bank.

Look Marvin, I can haz Magisk Deny and SafetyNet:)

safetynet.jpg


Now reinstalling modules...

Updated:

Failed to kill anything, even after a full Magisk uninstall and a data/adb/ wipe...all my wearables and Samsung Pay, and bank and Google Pay still work..happy days
 
Last edited:
  • Like
Reactions: rodken

zgfg

Senior Member
Oct 10, 2016
5,850
3,324
Even i got in on the act and updated to latest Alpha, decided not to be lazy. Enable System Apps, a few ticks for that, a list of Samsung gear...my bank.

Look Marvin, I can haz Magisk Deny and SafetyNet:)

View attachment 5411513

Now reinstalling modules...
Btw, I've slso played with. There is one MIUI app that was not possible to enable for MagiskHide in Magisk v23 official - it was not showing in GUI.
It was only possible through the Terminal, by using magiskhide command line

Ofc, magiskhide applet is no more available (and there is no command-line applet for DenyList), but by enabling OS apps in Filter I was able to see and check-in that Security center app for DenyList

And I tested with MagiskDetector, having the same results as with previous Alpha versions (no better or worse)
And yeah, it says that "Maisk Hide works properly" 🤩
 

Attachments

  • Filter.jpg
    Filter.jpg
    303.2 KB · Views: 55
  • MagiskDetector.jpg
    MagiskDetector.jpg
    421.1 KB · Views: 55
Last edited:
  • Like
Reactions: ipdev and 73sydney

jons99

Senior Member
Nov 5, 2019
209
244
Even i got in on the act and updated to latest Alpha, decided not to be lazy. Enable System Apps, a few ticks for Google Play Services, a list of Samsung gear...my bank.

Look Marvin, I can haz Magisk Deny and SafetyNet:)

View attachment 5411513

Now reinstalling modules...

Updated:

Failed to kill anything, even after a full Magisk uninstall and a data/adb/ wipe...all my wearables and Samsung Pay, and bank and Google Pay still work..happy days
there's already a newer one
in the new one you need to enable zygisk and reboot to pass safetynet
 

Attachments

  • photo_2021-09-16_22-26-20.jpg
    photo_2021-09-16_22-26-20.jpg
    26.8 KB · Views: 62
  • photo_2021-09-16_22-26-26.jpg
    photo_2021-09-16_22-26-26.jpg
    29.9 KB · Views: 61

73sydney

Senior Member
Jul 21, 2018
1,903
1,667
Sydney
Google Pixel 2 XL
there's already a newer one
in the new one you need to enable zygisk and reboot to pass safetynet

Why of course theres a new one, its been 15 minutes :)

Interestingly, on the changelog, the latest alpha has not got the alpha suffix....im going to leave all that muck to Marvin, the resident release tease to post :)

Btw, I've slso played with. There is one MIUI app that was not possible to enable for MagiskHide in Magisk v23 official - it was not showing in GUI.
It was only possible through the Terminal, by using magiskhide command line

Ofc, magiskhide applet is no more availbe (and there is no command-line applet for DenyList), but by enabling OS apps I was able to see that Security center apo for DenyList

And I tested with MagiskDetector, having the same results as with previous Alpha versions (no better or worse)
And yeah, it says that "Maisk Hide works properly" 🤩

Yup, Magisk Detector same same here
 
  • Like
Reactions: jons99

Eng.Raman

Senior Member
Apr 13, 2014
374
402
Khanaqin
Magisk 706a4922-alpha Released on the official Telegram channel.
Finally added Zygisk in the Settings.
 

Attachments

  • Screenshot_2021-09-16-22-41-44-17_785cfb1f0fb0c9a2030c9b38a1c3479a.jpg
    Screenshot_2021-09-16-22-41-44-17_785cfb1f0fb0c9a2030c9b38a1c3479a.jpg
    321.8 KB · Views: 64
Last edited:

jons99

Senior Member
Nov 5, 2019
209
244
All modules that I had installed work with no problem for me (only that Repo is removed but IyMHO the old Repo is frozen and there will be no more updatets and new module releases there)
actually it's still getting updates
 

pndwal

Senior Member

Latest @vvb2060 Magisk Alpha (Chinese Translated):​

alpha update log​

Magisk (706a4922-alpha)​

  • [General] Based on 706a4922, the content that has been merged upstream is no longer listed
  • [App] Correctly process any data from magiskd
  • [App] Support SharedUserId
  • [App] Delete the backup file after restoring the boot image
  • [App] Built-in current version update log
  • [App] Use the local version when the stub cannot be downloaded, now it can be used completely offline
  • [busybox] Fix the default shell path
  • [App] Allow log page to be opened when Magisk is not installed
  • [App] Switch to the modern time API of Java 8
  • [DenyList] Dealing with suspicious props
  • [App] Update the SafetyNet extension, update the version of snet.jar to 18
https://github.com/vvb2060/Magisk/b...7cdf29262b3/app/src/main/res/raw/changelog.md

Telegram OP Notes:
- All ptrace code has been deleted.
- Switch to zygisk to execute the exclusion list, magiskhide has been completely removed. Restart to take effect after changing the switch state of zygisk. Major changes, some problems may occur, temporarily not pushed to the update channel.

👍 PW
 
Last edited:

73sydney

Senior Member
Jul 21, 2018
1,903
1,667
Sydney
Google Pixel 2 XL
Anyone else?

Latest magisk alpha doesnt prompt me for su for Viper4Android....even running it ends in no prompt and black screen, severe lag, and needing to reboot

Have tried removing, deleting data folder and reinstalling...

update:

this alpha is doing weird stuff, like putting up the "needs additional setup" prompt, and failing - this after it was working ...
lag on opening already root approved (magisk denied) apps

im reverting to the previous build.....too bleeding edge for me

update #2:

reverted to previous alpha
removed and reinstalled viper4android
rebooted
nope, viper4android still hosed - i didnt test on this alpha after upgrading from the alpha i was holding out on
seem the last alpha is borked for viper as well..
it at least throws up an su prompt on previous alpha...
asks to install driver? wtf? and if you try it says "installation failed at patching system"

oh well, going back to my safety alpha...why did i upgrade again? whos fault is it...ill find someone to blame...

another revert about to happen....
 
Last edited:

Top Liked Posts

  • 1
    I'm on 8276a077-alpha myself. But, SN fails for me. I'm attaching screenshots of my setup. Please advise on how to get SN to pass. My device is POCO X3 (non-NFC) and I'm on the latest AICP 16.1 (A11). Thanks.
    In addition to @zgfg's advice, please see this:
    https://forum.xda-developers.com/t/magisk-general-support-discussion.3432382/post-85792975 👍 PW
    1
    please see my screenshots (esp. the 5th) and advise on what is to be done further. thanks.
    @pndwall gave you the link for one of the many earlier posts in this thread how to configure DenyList.
    You don't need AR services and so but only Google Play Services (you didn't expand to see which services you enabled) - see the screenshot

    After that, as said, if Basic Integrity still failing, use MHCP to spoof fingerprints as if you would be running the stock, certified ROM (custom ROMs are not certified and cannot pass)

    Finally, USNF module if CTS would be still failing.

    Check the corresponding threads, their OP posts (and the recent posts)
  • 14
    MOD ACTION:

    Enough is enough. Despite my deleting some off topic posts yesterday, the spam continues. Thread cleaned. Please check your PM inbox and avoid off topic posts.
    11
    diareuse has been MIA for a bit. Pinged him a couple times on the GitHub Issues, but no answer. Hopefully he's okay. 😕

    Mmm. Nothing on his Twitter since February... That's concerning.

    Yeah and in a week it'll be 1 full year since his last commit to Magisk too. 😕

    Good news is diareuse just reached out and is indeed alive and well, just working on multiple paying jobs in real life. 🙂
    11
    Hey all,
    As promised, I wrote up a step-by-step tutorial for the Pixel 5a (though it applies to about all the Pixels, much of it I used on my Pixel 2 over the past 4+ years):


    I know it's a book, but I wanted to make sure I put it in everyday language and tried to make it so even a first timer could go through it and feel confident moving forward and getting root, passing SafetyNet, and update with system updates in the future with confidence.

    Anyhow, it's my attempt to give something back to the community I've gained so much from and leaned on so many times for help. If it helps even one person I'll be happy.

    Thanks again to the entire community, and particularly the folks who have been here helping tirelessly and without reserve to get everyone up and going. You all know who you are and I gave proper name attribution in the tutorial thread. I'm exhausted, so I'm gonna go grab some dinner, that took hours to write! hahahahaah!!

    Be well everyone, SO happy my P5a is fully functioning, you folks are just amazing.

    hfam
    11
    Latest Alpha Magisk cb4361b7-alpha

    *** For Mavericks only! ***

    Riru / Zygisk coexistence seems to be back!
    🎉🎊⚡🥝🧀

    Chinese Translated:
    alpha update log
    Magisk (cb4361b7-alpha)


    ● [General] Based on cb4361 b7, the content that has been merged upstream is no longer listed
    ● [App] Correctly process any data from magiskd
    ● [App] Support SharedUserld
    ● [App] Delete the backup file after restoring the boot image
    ● [App] Built-in current version update log
    ● [App] Use the local version when the stub cannot be downloaded, now it can be used completely offline
    ● [App] Switch to the modern time API of Java 8
    ● [DenyList] handle suspicious props
    ● [App] Update SafetyNet extension, update snet.jar version to 18
    ● [General] Add an obsolete cgroup v2 path
    ● [Sepolicy] Add execmem to allow zygote and system_server Hook
    ● [MagiskSU] If necessary, fall back to /dev/pts
    ● [Zygisk] Fix Circumstances that may not take effect
    ● [Busybox] Cancel optimization based on undefined behavior
    ● [General] No longer automatically unlock the device block
    ● [Zygisk] From the current situation, there is no crash report to prove zygisk and riru
    Incompatible, temporarily cancel the restriction, observe the situation

    Upstream update log
    From 23.0 to cb4361b7


    ● [General] supports pure 64-bit devices
    ● [General] Support Android 12 emulator
    ● [Zygisk] Code Injection Framework
    ● [General] Remove MagiskHide
    ● [General] Support special simulator loading module
    ● [MagiskBoot] Support zImage format
    ● [MagiskBoot] Add zopfli encoder
    ● [Magisklnit] Support bootconfig
    ● [App] Repair installation function will now check the script under /data/adb/magisk/ is not updated
    ● [MagiskInit] Support some Meizu devices
    ● [MagiskSU] If the kernel supports it, use isolated devpts
    ● [MagiskSU] Fix the pts configuration code, now no extra sepolicy rules
    ●[MagiskBoot] Support v4 boot image header format
    ● [MagiskInit] Support opltus.fstab for some OnePlus and Opal devices
    ● [App] Update modules to be restarted, not allowed to be marked as pending deletion
    ● [App] Delete online warehouse
    ● [App] Add mounting information to the saved log file
    ● [App] Adapt to Android 12 API level
    ● [App] Display the waiting pop-up window when the app is hidden/restored
    ● [Stub] Open source obfuscation function
    ● [Script] Check and display the sepolicy rule folder of the module
    ● [App] Hide screen overlay for pop-up window, Android 12+ is required
    ● [App] Delete the floating bottom bar and change it to the general bottom operation bar
    ● [General] Support special compilation cache
    ● [General] Add rejection list function
    ● [App]Delete DOH
    ● [App]Delete SafetyNet
    ● [App] Allow the log page to be opened when Magisk is not installed
    ● [App] Display Zygisk status, add restart reminder
    ● [Zygisk] Correctly handle child zygote
    ● [Zygisk] Disable conflicting riru modules
    ● [Sepolicy] Fix Android 8 terminal cannot get root

    👍 PW
    10
    cb4361b7-alpha report:
    w/ RN8T, Stock MIUI, Android 10

    Two reboots needed initially.

    Zygisk & Riru w/ Universal SafetyNet Fix 2.1.1, LSPosed, Un-Share all working fine.

    SafetyNet passing w/ SafetyNet Google Play Services process denied.

    ViPER4Android FX Neon driver status normal.

    With Zygisk enabled Riru-MomoHider causes instability / system crashes even when only app_zygote_magic hiding is configured. 😕

    Great progress! 👍 PW
    Some have been waiting..
    Some have been using vvb2060's alpha builds..

    I have been sneaking a peak by running personal builds from John's master branch. :sneaky:
    Magisk - GitHub - Building and Development - Link

    A few days ago (23.Sep.2021), I was surprised when my OnePlus 6T passed SafetyNet. o_O
    It has been about three or four weeks since it passed SafetyNet.

    Problems I have run into..
    Every now and then, something misfires on boot and Magisk is not active (Installed N/A).
    Normally a reboot is all that is needed, occasionally I have to re-install magisk.

    I ran into an old issue on my 6T (clean install) installing Magisk.
    I had to flash a magisk patched image to both the active and inactive boot slot.
    Need to test again with another clean install.​

    Currently I have a few devices running these (sneak peak) build(s) and passing SafetyNet.

    OnePlus 5T
    Older device, does not have the hardware for hardware attestation.
    • Stock OnePlus OS 10.0.1 (SDK29)
    • Magisk (snapshot build)
    • MagiskHidePropsConf (Magisk Module)
      • Enable Zygisk
      • Enable DenyList
      • add com.google.android.gms.unstable to the DenyList.
        Magisk is in /sbin so only needed to Deny .unstable
      • Enable the MagiskHide props. option in the MagiskHidePropsConf module.
    Reboot in between steps as needed.

    OnePlus 6T
    • Stock OnePlus OS 11.0.0 (SDK30)
    • Magisk (snapshot build)
    • Universal SafetyNet Fix (Magisk Module)
      • Enable Zygisk
      • Enable DenyList
      • add com.google.android.gms.unstable to the DenyList.
      • add com.google.android.gms to the DenyList.
    Reboot in between steps as needed.

    Pixel 3a
    Custom rom that passes SafetyNet on it own.
    Installing Magisk breaks SafetyNet.

    • ABC Rom 11 (SDK30)
    • Magisk (snapshot build)
      • Enable Zygisk
      • Enable DenyList
      • add com.google.android.gms.unstable to the DenyList.
      • add com.google.android.gms to the DenyList.
    Reboot in between steps as needed.

    Earlier today, I setup an update channel so I could test a few more things.
    • Install update from online.
    • Repack (Hide/Restore) the Magisk app.
    All worked. :)
    Note:
    I will have to wait until the next commit(s) to see if I can update while the Magisk app is hidden. 🙃

    ---

    So far The next step of growth and development of Magisk is looking great. :)

    I am excited and eagerly waiting for the next canary build for proper testing. :D

    Cheers all. :cowboy:

    PS.
    Some screenshots from my 6T. ;)


    Edit (5.Oct.2021):
    Please see my follow up post.
    Post 48,294 - Link
  • 1067
    This is the place for general support and discussion regarding "Public Releases", which includes both stable and beta releases.
    All information, including troubleshoot guides and notes, are in the Announcement Thread
    156
    Hello, I haven't given much support on XDA lately. It can be resulted from
    • University started and I have limited free time. In fact, I mostly develop during midnight
    • I live in Taiwan, which has large time zone differences between my European/American contributors/testers, which usually forces me to stay up late at night to discuss/test stuffs.
    • The new version is about to come, I don't want to spend effort on supporting old releases
    The planned update is delayed again and again, to some point I think I'll shed some light about what has been happening lately, also along with some announcements.

    New Forum!
    As you might have already discovered, Magisk got its own subforum on XDA! Many thanks to all the support you gave me, and much more information/features/support is about to come!
    **For developers supporting all the devices that are not using standard Android boot format, feel free to create threads in this section (actually, PLEASE do so) for your favorite devices after v7 is out. As I currently know, Asus devices require signing the boot image before flashing, and is model dependant; Sony devices seems to use ELF kernel that is unpatchable, or some has two ramdisks (inner + outer), both requires different workarounds; LG bootloader locked devices has to manually "BUMP" the boot image after flashing Magisk..... and there may be lots of other crazy boot image formats that haven't come up to my attention yet.
    It is impossible for me to support all these non-standard boot images, and I hope the community can collaborate to make Magisk running across all the devices. Overall, community collaboration is what XDA about :D

    The Pixel Phone
    Some of you might already know this news, that the next Pixel Phone right around the corner seems like it does not have ramdisk in boot image, which pretty much wrecked Magisk in all ways. However, it pretty much doomed root itself too. Kernel modifications is inevitable IMO, so I'll try to migrate my scripts to C programs that could possibly be included into the kernel itself. Note that I'm not familiar with linux kernel, I'm not even sure if my idea and concept is correct or not. But once the device is available, I think developers will find a way to bypass all the difficulties, and I'll do my best to learn things ;)

    Current Progress
    In the past month, I've spent quite some time learning SELinux, so that I can avoid using SuperSU's sepolicy patches. Thanks to the helps and tips from @phhusson and @Chainfire, I finally have a much clearer understanding of how SELinux works. The Magisk core parts (the scripts, boot image patches, new features, more supports) are actually done some time ago. What is causing all the delays is the Magisk Manager.
    To be completely honest, although I can code in Java without much issues, Magisk Manager is actually my first Android application, I had to reach out for assistance, and fortunately awesome developers like @DVDandroid and @digitalhigh contributed a lot, which makes the current Manager awesome.
    After the repo system and module management is mostly done, I was about to do some adjustments and release, but what we really done is decided to add another feature: auto-unroot with per-app settings. I decided to wait for it to be finished, and then do my adjustments. Due to reasons that'll be mentioned later, this feature will likely not be available for the next release (should come in future updates)

    Safety Net Disaster
    Those who are using Magisk for Safety Net bypass purposes must have known that Google recently updated the detection method of my Systemless Xposed. I still have no idea what Safety Net is detecting, so currently I cannot fix it on my side (also because I'm busy working on the next update). However, suhide developed by @Chainfire is able to hide Xposed and worked fine.
    However, only my Systemless Xposed v86.2, which is based on SuperSU's su.d, is supported using that method. v86.2 and v86.5 (latest, Magisk based) have nearly identical binaries, and the only difference is the path where the binaries are stored.
    I'm still not sure what's the real issue for it not being supported, I just hope it is not done intentionally.

    Conclusion
    Due to the fact that my Safety Net bypass is not 100% perfect now, I do not want to spend any more time waiting for auto-unroot to be polished. What I'm doing now is finishing up all the things I'd like to change in Magisk Manager (it has been a while since I last contributed to Manager, my fellow developers are doing all the heavy job), which might take a little more time, after that, packed with tons of information to be announced in Magisk Section, I'll release the long awaited update.

    Hope this lengthy post gives you the idea of the whole situation, and again thanks for all your support!!
    121
    Ah, some Chainfire bashing, I hope it is not too late for me to exercise additional villainy.

    First, let me make clear I have nothing against @topjohnwu, nor against Magisk. Magisk is an interesting project and it certainly displays @topjohnwu ingenuity and persistence. I don't doubt we will see more interesting things from his hands.

    -------------------------

    What has happened here is not all that dark and complicated, from either end. I returned from holidays, and someone pointed me at Magisk. My first thought: interesting!

    Among other things, the thread lists some issues with SuperSU, which in combination with the phrase The developer also requests users to not bug Chainfire with compatibility requests for SuperSU with Magisk from the portal article, raised my left eyebrow by nigh half an inch. The popular systemless xposed mod is apparently now based on it, and apparently it now no longer works with SuperSU, and apparently I'm not supposed to fix that, nor any of the other found issues. I found that a bit weird. So yes, I have told @topjohnwu that I was a bit surprised he was posting about issues with SuperSU without notifying me about them (I can't fix or help fix issues I'm not aware of, after all).

    He's also spreading a modified version of the SuperSU package, which is not all that uncommon, nor necessarily a problem. I have not looked into what he modified, I only ran a few quick tests on one of my devices, and found some commonly used commands run as root to be broken. I have informed him of this as well.

    It appears the tool of choice for Magisk is phh's Superuser, because of some of the mentioned issues with SuperSU. That's fine by itself, but fixing issues in that superuser by incorporating SuperSU's binaries into it is a somewhat questionable practise. After all, SuperSU is a commercial closed-source package that helps pay for my dinner, and superuser is a direct competitor. I have informed him that I was surprised he did this without asking for permission. I have expressed similar surprise on him spreading a modified version of LiveBoot (which helps pay for a snack now and then).
    @topjohnwu has also stated that Magisk's scripts are largely influenced by mine (I have not checked). Scripts based on mine are used all over the place on XDA, some people have crafted amazing things based on them, I have never made an issue of this (otherwise I would have just made them binaries). But yes, I have also stated to him that I don't think it's very nice to base something on one program, and then using that to (almost exclusively) push something directly competing with that program.

    tl;dr Towards @topjohnwu, I have:
    - expressed surprise he has issues getting Magisk to work with SuperSU, and has chosen not to inform me about those
    - expressed surprise he is using SuperSU binaries in a competing superuser without permission
    - expressed surprise he is posting a modified LiveBoot without permission
    - informed him of issues with the modified SuperSU he has posted
    - let him know I thought it wasn't very nice to be applying my scripts to benefit seemingly exclusively that same competing superuser

    To be crystal clear:
    - I have not asked for an apology
    - I have not asked for Magisk to be abandoned, neither the root hiding nor systemless module parts, and certainly not systemless xposed
    - I have not made an issue of any of this anywhere, until this post
    - I have not even specifically asked for anything to be taken down (though obviously in my opinion the other superuser package mixed with SuperSU's binaries, as well as the LiveBoot package, should go)
    - I have not reported this thread to XDA moderators for copyright violations or otherwise

    While my conversation with @topjohnwu may not win any awards for being friendly (though it may win some for brevity), I think all things considered my response has been rather mild. To be perfectly honest, until the apology post, I thought this was over with already. I think the apology post was triggered because I haven't replied to his last PM for a while - I was in the zone, it happens.

    To emphasize again, I have nothing against @topjohnwu, Magisk, or systemless xposed, and it is certainly not my goal to see any of them go. If it can be made to work together with SuperSU, great.

    I get it though: you think of something, you want to see if you can make it work, you finally get it to work, you publish it, it takes off - enthusiasm gets the better of you. Maybe in the rush some mistakes are made. That doesn't mean you have to just drop it and run. None of my stuff would make it past 0.1 if I stopped at the first big mistake :)

    Aside from said being in the zone coding, I usually regret actually responding to these sort of things the day after, which has made me hesitant to reply. Surprise me.
    76
    Thread temporarily closed so everyone sees this.

    The flood of "SafetyNet isn't working for me either!" posts are not helpful, at all. Please refrain from posting further, it will be looked into. Please do not forget that not passing SafetyNet is 100% NORMAL AND INTENDED when you have an unlocked booloader or running custom firmware. These are workarounds and they will be worked around in turn.

    The Flash
    Forum Moderator

    EDIT: Thread is reopened... I will be cleaning any SafetyNet posts for a while to keep the thread clean for real issues.
    75
    Hello everyone!

    I am aware that Google has updated Safety Net that makes Magisk itself a no go for Android Pay. In fact, I witnessed the change live while I am developing the new magiskhide, which should hide all Magisk modules and Magisk installed root.

    Google is serious about Safety Net now, clearly hunting down all possibility to run Xposed with Safety Net passed. I spend quite some time examining the new security measures last midnight, and fortunately it seems that it is possible to run Magisk and root along with Safety Net if no Xposed is running. I'm glad I removed the old root toggle at the right time lol, that is no longer feasible with the latest detection.

    So stay tuned for the next update, it will come with bug fixes, along with the new magiskhide to bypass that Safety Net.

    Google, how will a few systemless mods do any harm :p:p