force stop play store, clear cache, make sure you are logged into to your gmail account and re-open play storeI got "Error retrieving information from server. DF-DFERH-01" message in Play store after restart.
force stop play store, clear cache, make sure you are logged into to your gmail account and re-open play storeI got "Error retrieving information from server. DF-DFERH-01" message in Play store after restart.
Still that Error. (That's the reason I restore Framework data)force stop play store, clear cache, make sure you are logged into to your gmail account and re-open play store
Damn something is off with your firmware then lol. I never have this issue. If I was you, I would format all data and downgrade my firmware unless you like OOS 13.1.
Thank you so much for spending that time trying to help me. I really appreciate it. I'll try and mess around. (One more thing I noticed is that for some reason, in my local updater app, it shows I have F24 as my firmware while it showed 13.1 EXO001 before. I did fool around but forgot what I did and usually, those things I did often and shouldn't make any major change). Thanks again!Damn something is off with your firmware then lol. I never have this issue. If I was you, I would format all data and downgrade my firmware unless you like OOS 13.1.
Make a full backup of everything and format all data using twrp. Make sure to flash the new firmware immediately after format. Which device are you currently using? I actually don't have too much time right now I G2G, but hopefully you figure it out.
Did you try my suggestion?:
Also, remove everything Google from denylist (only exception would be G Pay/Wallet)... Zygisk-USNF hides root from gms itself; Nb. zy-USNF can work with gms processes in denylist only if it's disabled, including w/ Shamiko but that is still double-hiding and not recommended... Enforced Denylist necessarily breaks zy-USNF as it prevents the basic function, ie. running code in gms Droidguard/attestation process to register fake keystore...Disable all modules except USNF and try... Clear Google Play Services data too... If no dice, try older @Displax v2.3.1-MOD_3.0... 2.4.0 changes (part time spoofing etc) still cause issues on some devices and modded 2.3.1 works better for many...PW
This helped me out - my issue was having Enforce DenyList turned on in Magisk. My device attestation is busted, Universal Safety-Net Fix (USNF) modded by Displax worked. Magisk settings: Zygisk, Configure DenyList (NOT ENFORCE DENYLIST!) add GPay to DenyList, add Google Wallet to DenyList. Install USNF in Magisk, reboot. Force stop Play Store, clear cache. Clear GPay cache and data. Setup GPay.Did you try my suggestion?:
Also, remove everything Google from denylist (only exception would be G Pay/Wallet)... Zygisk-USNF hides root from gms itself; Nb. zy-USNF can work with gms processes in denylist only if it's disabled, including w/ Shamiko but that is still double-hiding and not recommended... Enforced Denylist necessarily breaks zy-USNF as it prevents the basic function, ie. running code in gms Droidguard/attestation process to register fake keystore...
Also, please confirm ROM is fully stock, selinux is enforcing and you have run no other mods (eg from TWRP)...
If all above is correct and no dice, I'd try dirty flashing current ROM (will fix any corruption unless in /data); Use fastboot type full ROM as these are often more complete than recovery type...
PW
Do you still have any Google Play Services processes in denylist? PWThis helped me out - my issue was having Enforce DenyList turned on in Magisk. My device attestation is busted, Universal Safety-Net Fix (USNF) modded by Displax worked. Magisk settings: Zygisk, Configure DenyList (NOT ENFORCE DENYLIST!) add GPay to DenyList, add Google Wallet to DenyList. Install USNF in Magisk, reboot. Force stop Play Store, clear cache. Clear GPay cache and data. Setup GPay.
Only GPay and after I added it, Google Wallet. Nothing else for Google Pay.Do you still have any Google Play Services processes in denylist? PW
Official USNF Magisk module (here) is still largely broken...
Not sure why enforced denylist is an issue then... Generally works fine for G Pay/Wallet (without Shamiko)... Of course gms in denylist breaks this... PWOnly GPay and after I added it, Google Wallet. Nothing else for Google Pay.
i use this but not passOfficial USNF Magisk module (here) is still largely broken...
Use this fork:
https://forum.xda-developers.com/t/module-mod-universal-safetynet-fix.4553699/post-88149053
Check have Play Integrity deviceIntegrity using Play Integrity API Checker or similar... Nb. SafetyNet API is deprecated.PW
Does Zygisk show enabled on the Magisk app, main screen, top?i use this but not pass
and also show
basic integrity fail
and cts profile fail
without module only show cts profile fail
what happen i do
... Further, please say device / ROM...i use this but not pass
and also show
basic integrity fail
and cts profile fail
without module only show cts profile fail
what happen i do
Official USNF Magisk module (here) is still largely broken...
Use this fork:
https://forum.xda-developers.com/t/module-mod-universal-safetynet-fix.4553699/post-88149053
Check have Play Integrity deviceIntegrity using Play Integrity API Checker or similar... Nb. SafetyNet API is deprecated.PW
Please give details... I have Redmi Note 8T, stock MIUI... PWOn MIUI it's the other way around, Displax his mod breaks safetynet while the original module still works.
Maybe if you have Xiaomi.euOn MIUI it's the other way around, Displax his mod breaks safetynet while the original module still works.
Maybe if you have Xiaomi.eu
In that case you pass Play Integrity (that's relevant, not the deprecated SN, but you will also pass SN) without a need for USNF (although your Bootloader is unlocked) - but only if you don't have Magisk
With Magisk, you then also need USNF, but you can try instead SafetyNet Sensitive Props (eg, I use instead of USNF) - screenshot
That's bcs some versions of Xiaomi.eu already have USNF implemented to the ROM.
Otherwise, users would not be able to use Wallet, since they had to unlock BL to be able to flash the custom ROM Xiaomi.eu
However, that's specific to Xiaomi.eu - with the official MIUI and unlock BL, you can not pass PI/SN without Magisk and USNF
Yup, @Displax mentioned issues with (some?) XiaomiEU custom ROMs (specifically) not playing nicely w/ USNF...Maybe if you have Xiaomi.eu
In that case you pass Play Integrity (that's relevant, not the deprecated SN, but you will also pass SN) without a need for USNF (although your Bootloader is unlocked) - but only if you don't have Magisk
With Magisk, you then also need USNF, but you can try instead SafetyNet Sensitive Props (eg, I use instead of USNF) - screenshot
That's bcs some versions of Xiaomi.eu already have USNF implemented to the ROM.
Otherwise, users would not be able to use Wallet, since they had to unlock BL to be able to flash the custom ROM Xiaomi.eu
However, that's specific to Xiaomi.eu - with the official MIUI and unlock BL, you can not pass PI/SN without Magisk and USNF
Xiaomi.eu, MIUI 13/A12 (since Nov 2022)Yup, @Displax mentioned issues with (some?) XiaomiEU custom ROMs (specifically) not playing nicely w/ USNF...
I guess you also have root hidden from Google Play Services attestation/Droidguard process com.google.android.gms.unstable and likely main gms process com.google.android.gms (added in denylist)...
Out of interest, do you still need the main gms process added to pass now, assuming your tmpfs mount path has become debug_ramdisk?
Also, I assume this won't work without a sensitive props solution even though the ROM itself will adjust some... Can you say S/N and PI checker results with only root hidden from gms (ie. Sensitive Props module disabled)?
And does MHPC module active (with nothing configured) also allow S/N / PI deviceIntegrity to pass (as alternative to SafetyNet Sensitive Props module)?PW
For you either @Displax Mod 1.3 or latest 2.0 should be fine, but 2.0 was experimental, does use a different (Pixel 2) fingerprint prop and it's Shipping level prop setting breaks the fix for devices launched with A13 like Pixel 7... The props set by either of these affecting your device are set to target GMS properly however...I'm using USNF mod 2.4.0 1.3
moto edge (2020) all seems ok yet Androidacy shows update though Magisk does not. All seems to still be working well on Android 11. Should I still update?
EDIT: Rolling back Intune Company portal to 5.0.5926 allows me to prevent corporate apps from detecting ROOT.I have two devices, Pixel 7 Pro and Pixel tablet. Both are running stock A13 with root, USFN_1.3, Zygisk and Shamiko. Both devices pass Safetynet. Starting today, my corporate Outlook (and Slack, Onedrive, Teams) are detecting ROOT. I tried clearing cache and memory, but that didnt help. My P7P still lets me run corporate Outlook.
I plan to do a full wipe next week with the next Android drop. In the meantime, are there any suggestions?
No... Unless Momo is giving false positive, really TEE is not broken anyway... I mentioned to you:Is there currently any way to fix TEE Broken? Device Xiaomi Mi A3
'Broken Tee' (actually it won't be; Tee OS for decoding DRM, fingerprint scanner etc is probably fine... Really just OEM keymaster implementation for AVB signals as used by droidguard etc is broken) on A3 is interesting too...
First of all, if you are still on the old KDragon's USNF module - better please read just like two or three last pages and you will see that you had to move to the USNF fork from Displax or Play Integrity midule - they have their own threads with downloadsI don't pass the CTS profile match test. How can I fix?
Motorola edge 30 fusion with Android 13
Very weird, but this happened:- Remove all data from GSF and GMS.
- Completly uninstall Magisk and flash original boot.img (or init_boot.img) from bootloader.
- Remove dalvik cache and caches.
- "rm -rf *" in /data/adb directory (DON'T remove the directory)
- Try to remove any custom *.rc file.
- Check Play Integrity API, you should pass BASIC integrity.
- Patch original boot.img (or init_boot.img) in Magisk app and flash it in bootloader.
- Install PlayIntegrityFix or Displax safetynet-fix module.
- Should pass BASIC & DEVICE.
Please make 'Universal Play Integrity Fix' ... #204
Fixes to expand 'Universal SafetyNet Fix' to become a 'Universal Play Integrity Fix' are needed.
The SafetyNet Attestation API is deprecated and has been replaced by the Play Integrity API.
https://developer.android.com/training/safetynet/deprecation-timeline
New Play Integrity API is rolling out from June 2022, and evidently Google Play Store and Google Pay/Wallet are already using its verdict.
June 2023 is the Migration Deadline for app developers. This will also allow their older app versions to continue working with SafetyNet API for a limited time.
June 2024 is the End of life for SafetyNet API; its attestation will no longer work for any app version, and apps will receive an error.
The new Integrity API has more strict requirements for passing attestation, and this seems to be enforced in Android 11+ particularly.
Currently (evidently due to this), device security issues are detected by
I'm guessing that the 'passing' messages based on the old SafetyNet API are likely to realigned soon.
- Google Pay/Wallet, which may state "You can't pay contactless with this device...(Your phone doesn't meet software standards)" on updating or attempting to add a card despite in-app Contactless setup stating "You're ready to pay contactless with your phone (Your phone meets security requirements)", and
- Google Play Store, which may no longer show apps like Netflix w/ Android 11+ (developers can 'exclude devices from their app's distribution based on their device integrity . Device exclusion is based on the latest device integrity verdict that the Play Store app receives from the Play Integrity API') despite in-app settings showing Play Protect 'Device is certified' result.
A workaround that evidently allows Play Integrity API attestation to pass (and solve Wallet / Play Store issues also) has been discovered. It involves spoofing an earlier certified ROM, generally by using MagiskHide Props Config module to change fingerprint prop to one for Android 10 or earlier.
Undoubtedly other apps will begin to detect broken TEE etc / fail as they migrate or begin integrating the Play Integrity API.
A 'Universal Play Integrity Fix' will evidently require more understanding / research into how the fingerprint prop is used, and possibly other new behaviours.