kevinco1
Senior Member
Yes, it's always worked with Delta
What version of CBS is working for you? I can't get CBS 1.30.0 to work. ThanksUps ! My fault !!! CaixaBank working now; I forgot to add it to the exclusion list after erasing its data...
If this lasts, it's a WIN !!! THANKS...
FYI, the most likely culprit is LP, and the modded play store. Once I ditched those, I was able to pass the first two integrity checks. To be fair, I haven't tried reinstalling LP now that I'm passing, so you could still give that a go.Patches to Android (Lucky Patcher Module), Pixelify, Pixelify uninstaller services, Shamiko, substratum, Systemless Hosts, Universal SafetyNet Fix, VIPER4Android FX repackagedhoch43, YouTube-latest ReVanced Extended, Zygisk - Enhanced mode for Storage Isolation, Zygisk - LSPosed, Zygisk - Sui.
Yes.
Yes, using The SELinux Switch (there is a chance that it probably doesn't work because of my kernel but searching around, it doesn't seems to exist a custom kernel to my device so).
No.
Still the same.
Google Wallet, Play Store, Play Integrity API Checker, yes.
Made everything you said (besides LineageOS, Gapps and flashing Magisk with TWRP using the zip file), cleaning the app data using App Manager and still the same.
For me, safetynetfix is not enough, I have to use hideprops also and select a new fingerprint (that match the current Android version) to pass CTS profile.For what it's worth, I've tried several times, but I'm unable to get it to work successfully with xiaomi.eu 14.0.1.0, installing magisk 25.2 and safetynetfix 2.4.0 mod 1.2. With Zygisk enabled, with or without enforcing.
YASNAC fails basic integrity and CTS profile match, and Integrity Checker fails device_integrity and basic_integrity.
Later USNF builds fro @Displax actually play better with custom ROMs that already integrate SNF (from @kdrag0n Proton project) or fixes from @Displax, but there can still be conflicts with custom ROMs that do this (eg XiaomiEU) and may also spoof additional prop values etc...For what it's worth, I've tried several times, but I'm unable to get it to work successfully with xiaomi.eu 14.0.1.0, installing magisk 25.2 and safetynetfix 2.4.0 mod 1.2. With Zygisk enabled, with or without enforcing.
YASNAC fails basic integrity and CTS profile match, and Integrity Checker fails device_integrity and basic_integrity.
USNF hides attestation/droidguard (com.google.android.gms.unstable) gms (Play Services) process itself since Denylist breaks USNF's key functions, especially the injection of code in gms to register a fake keystore and cause the fallback to basic attestation... That's why if you add this to denylist it will kill USNF (deviceIntegrity will be failing) if Denylist is enforced until next boot when USNF will actually remove it from denylist for you!...david003
If you did all ok, lets go back to magisk and check app list in it. It is possible the google play services is not checked. If you do it , and restart phone, or only start magisk again, it can be unchecked again (and CTS will fail as result). It is not fixable.
I replaced magisk to delta version and use SuList instead .
Thanks. I tried this, reinstalling magisk without the USNF module and adding com.google.android.gms to the DenyList. It still failed, though. Hopefully things will get sorted out eventually. Until then I've been temporarily installing magisk to run backups and then uninstalling it.Later USNF builds fro @Displax actually play better with custom ROMs that already integrate SNF (from @kdrag0n Proton project) or fixes from @Displax, but there can still be conflicts with custom ROMs that do this (eg XiaomiEU) and may also spoof additional prop values etc...
If the ROM's embedded SNF/spoofing is up to date and capable of passing PI deviceIntegrity w/o Magisk, when you install Magisk you should NOT install any USNF module... You only need to hide root from droidguard/attestation (com.google.android.gms.unstable) gms (Play Services) process by adding this in denylist (and main com.google.android.gms process for most A11+ devices)...
Otherwise you may need to upgrade ROM or wait for maintainer to update the integrated attestation... PW
Did you mean just com.google.android.gms process? Should be that + com.google.android.gms.unstable for most A11+ installations...And did you check S/N and PI results without Magisk?; That would indicate if inbuilt fixes are working... PWThanks. I tried this, reinstalling magisk without the USNF module and adding com.google.android.gms to the DenyList. It still failed, though. Hopefully things will get sorted out eventually. Until then I've been temporarily installing magisk to run backups and then uninstalling it.
I had added all of Google Play Services to the denylist, that includes com.google.android.gms and com.google.android.gms.unstable, and a lot of others. I tried again, and added just those 2 to the deny list, and it appears to have worked.Did you mean just com.google.android.gms process? Should be that + com.google.android.gms.unstable for most A11+ installations...And did you check S/N and PI results without Magisk?; That would indicate if inbuilt fixes are working... PW
You shouldn't deny most Google stuff... You may have unexpected issues... Only we only need those two gms services added... If you hide Chrome components for example, you may break webview for other apps depending on Android version...I had added all of Google Play Services to the denylist, that includes com.google.android.gms and com.google.android.gms.unstable, and a lot of others. I tried again, and added just those 2 to the deny list, and it appears to have worked.
The integrity checks pass, both with unrooted xiaomi.eu, and with magisk with those 2 added to the deny list, without the USNF module.
Certainly is... An no surprise...My banking app still fails, though (it works with unrooted xiaomi.eu). But that's another issue. I suspect it's trying to check something else I haven't figured out, yet.
Welcome...
The banking app is BDO.You shouldn't deny most Google stuff... You may have unexpected issues... Only we only need those two gms services added... If you hide Chrome components for example, you may break webview for other apps depending on Android version...
Good to know XiaomiEU has current SNF...
Certainly is... An no surprise...
Can you say app?
Welcome...PW
Easy one:
Thank you for trying all that. I'm still not able to get it to work. Magisk was hidden already. I added Shamiko, but it still failed. I also added LSPosed and Hide My AppList, but it still failed even with those.Easy one:
View attachment 5874301
My device:
Xiaomi RN8T stock A11 MIUI,
Magisk Canary 25209,
Magisk App hidden in stub,
Latest Shamiko public release (for proper root hiding),
LSPosed Hide My AppList module configured to hide all apps associated with root,*
OEM unlocking disabled,*
USB debugging disabled,*
Developer options disabled.*
* = confirmed not needed for your app.
I suspect just using proper root hiding (Shamiko or other) should get you going... And maybe you haven't taken Hide the Magisk app option in Magisk app?...PW
Just checked and this app works for me w/o Shamiko hiding (ie with Denylist enforced)...Thank you for trying all that. I'm still not able to get it to work. Magisk was hidden already. I added Shamiko, but it still failed. I also added LSPosed and Hide My AppList, but it still failed even with those.
But what about custom ROMs?
You can disable this in LineageOS... I think you can in most ROMs, but apparently it doesn't show in some...
The secret lies in the setup. Don't intend to sound like an expert, but this has been my due diligence since day 0 with Pixel 6 pro and now with Pixel 7 pro. Please do not forget to thank the kind people like @roirraW "edor" ehT @Homeboy76 @V0latyle whose posts I have been following for a couple of years now. Let's assume your use case and walk backwards before we move forward.Interesting! Did you have any negative experience with removing Playstore and GMS from DenyList? None whatsoever, Currently have 32 apps in the Deny list working just fine.
I have the same issue with the device name under security tab. If Google Wallet, banking apps, government apps, and SafetyNet are all okay, I might give this a shot.
No, if server resolves gms data as ctsProfileMatch=true then that's what's sent back with the original nonce and the same is true of basicIntegrity.Am I correct in thinking that the server-side hardware attestation shows up as "CTS profile match" in e.g. YASNAC? And the client/device side attestation shows as "Basic integrity"?
Because without it keymaster 3+ (Android 8+) compliant devices are using hardware-backed security features including Key attestation for some of the measurements and reference data sent...Either way, and regardless of system configuration, I always get "Evaluation type" reported as "BASIC" when I run the SN test. Yet for whatever reason I still need Zygisk and USNF to get SafetyNet to pass properly. This confuses me as if the evaluation type is "BASIC" without USNF, why do I need USNF?
Proton is the model for any wanting to integrate @kdrag0ns SNF approach in a ROM.Yeah I noticed for instance that ProtonAOSP apparently has this type of implementation. Do you know how they manage to do it if they aren't using code injection methods?
https://github.com/kdrag0n/safetynet-fix#rom-integrationROM integration
Ideally, this workaround should be incorporated in custom ROMs instead of injecting code with a Magisk module. See the ProtonAOSP website for more information.
... we can take advantage of the fact that SafetyNet's usage of key attestation is opportunistic (i.e. falls back to basic integrity checks if it fails) and prevent it from getting the attestation certificate chain from KeyStore. This is done by checking the stack for DroidGuard, which is the codename for SafetyNet, and pretending that the device doesn't support key attestation...
Well again I'm hazy on this, but it seems source code isn't modified; calls for the attestation certificate chain from KeyStore are apparently just intercepted and fake data returned while prop values are also spoofed for gms at runtime, but yes, gms is targeted to fix both S/N and Play Integrity verdicts.At the end of the day it's GMS that needs modifying to fix SafetyNet right?
com.google.android.gms.unstable
in order to cause the fallback to basic attestation.Yes, it's easy to alter props globally like MHPC module does, but for the props dealt with for attestation purposes this can break stuff, eg device/OEM specific functions and apps like Galaxy store, backup utilities, proprietary camera features etc etcI know props also need tweaking, but that bit is relatively easy without code injection.
Well while the method has changed from setting available flags for basic attestation to registering a fake keystore, evidently source code for gms is unchanged as mentioned.
Seems we need Zygisk (or Riru) hooking for targeted prop changes as well as to hook attestation calls and fake lack of hardware key attestation support.Am just wondering why this can't be achieved without such a custom ROM just by using root (no Zygisk)? Hope I'm making some sense lol.
safetynet-fix-v2.4.0-MOD_1.2.zip
I use the latest module released by displax with shamiko and have only wallet in the deny list along with other banking and office applications like company Portal. Adding playstore and gsm and other google services always proved counterproductive to me as doing so made my pixel 7 pro show up as a pixel xl under devices in google - security tab.Do you need to block certain google services from magisk DenyList, and if so which ones?
USNF now does targeted (to gms processes only) fingerprint prop spoofing, so there's no point using (the more invasive and problematic) MHPC global fingerprint spoofing...I am a bit confused about the need to disable the hideprops.
Is it necessary?
In other words, do I need to revert the changes, then uninstall the hideprops, uninstall the safetynet original, install this one, install hideprops again and apply the required props changes?
Or can I just uninstall the original safetynet and install this one?
The original USNF (2.3.1) did not incorporate any fixes for Play Integrity, so @Displax forked it into this branch because he's had the time and energy to keep up with the changes to PI. @kdrag0n has been focused on other projects so while he eventually committed many of Displax's changes into 2.4.0, there have been several changes to PI since then.Given there's been an update to original UNSF that claims to give what this mod originally delivered over the official module, what exactly does this mod do that the original doesn't? (I haven't tried either yet)
I didn't change the update channel in the module on purpose so that everyone can upgrade to the new official version automatically without any problems.You should also consider updating update.json so updates can be seen by the Magisk app of one's choosing![]()
The secret lies in the setup. Don't intend to sound like an expert, but this has been my due diligence since day 0 with Pixel 6 pro and now with Pixel 7 pro. Please do not forget to thank the kind people like @roirraW "edor" ehT @Homeboy76 @V0latyle whose posts I have been following for a couple of years now. Let's assume your use case and walk backwards before we move forward.Interesting! Did you have any negative experience with removing Playstore and GMS from DenyList? None whatsoever, Currently have 32 apps in the Deny list working just fine.
I have the same issue with the device name under security tab. If Google Wallet, banking apps, government apps, and SafetyNet are all okay, I might give this a shot.