That only hides apps but not the su binary.Someone mentioned hidemyapp is better to use for hiding root from apps don't know how accurate that info is though.
That only hides apps but not the su binary.Someone mentioned hidemyapp is better to use for hiding root from apps don't know how accurate that info is though.
Thanks, that's good to know that, so no reason to use it if it doesn't hide su
If there is an app that checks installed apps maybe will be useful.Thanks, that's good to know that, so no reason to use it if it doesn't hide su
i tried cib but it didn't work i have lsposed-zygisk 26.1 magiskNone of these, just add apps that detect an unlocked bootloader like CIB.
Yes.
Hide root, do you have Shamiko module?i tried cib but it didn't work i have lsposed-zygisk 26.1 magisk
and when i installed 'key attestation ' app it says the boadloader is locked ! but cib app doesn't open
Yes i have shamiko module, what do you mean by hiding root ?
Hi, which app is that can you point me to it pls?This is now patched in latest key attestation app by Rikka, et. all. Version 1.4.1
Which font setup do you have? Can you please share? Looking nice.Yes i have shamiko module, what do you mean by hiding root ?
i use configure deny list and checked the app and didn't force
and i have these modules installed
View attachment 5920635
View attachment 5920633
1. Should work.Is this module still working for CIB app?
Does it have any workaround to work with OnePlus devices?
Does it have any new updates? The GitHub page seems down.
Thanks for the feedback.
Thanks for the feedback.
I have Oneplus 8T, but I am not sure if it has a brocken TEE.
Is there a way to confirm?
FixedThis is now patched in latest key attestation app by Rikka, et. all. Version 1.4.1
Excellent work. Working as normal again.
BootloaderSpoofer + KeyAttestation 1.3.4 bootloader shown as locked
Clue in OP:thanks a lot for the effort my guy but i dont understand why if the app sends the certificate chain to a server the app is unpassable?
... In other words, this module injects fake certificate extension data (ie. root of trust data which is real, but with needed bytes altered) into listed apps (/processes)... It can do this (with root privileges) for "local attestations", ie where calls and verification of certificates are done in the Android framework and not on a server.Modify the root of trust in local attestations.
This module modify the byte array obtained from certificate extensions (link) to spoof a fake root of trust, so we get a fake attestation with a locked bootloader.
shows that where hardware-backed key pairs are called and verified remotely (requested by a server directly), there is no opportunity for local interception/tampering key values...More info about certificate extensions:
https://developer.android.com/training/articles/security-key-attestation
Android Key Attestation Library
This library uses the Bouncy Castle ASN.1 parser to extract information from an Android attestation data structure to verify that a key pair has been generated in a hardware-protected environment of an Android device...
This repository contains a server sample code that shows how to validate an Android attestation certificate chain outside the Android framework. This is the recommended best practice, since if the Android device is rooted or otherwise compromised, on-device validation of the attestation may be inaccurate.
Good questions, and you probably understand the technical/practical side better than my understanding of the theory, which is only based on reading Google docs.i dont understand how the attestation work exactly and i also dont understand this
the app im working on sends the certificate chain in a post request to the server so there is a way to intercept and modify the cert chain?
and from the code i read the module hooks and modifys system methods to insert the certificate extention data without modifying the target app so if the unmodified target app that does the attestation verification locally verifies and accepts the cert chain why wouldnt the server do as well?
I haven't figured it out how to integrate Pine into the framework, but I managed to put your code into framework.jar, I don't find any impacts on other apps for now but finally I can now bypass local key attestation and pass CTS profile without any runtime code injection, just plain kernel su, overlayfs module and hiding overlayfs in kernel. So I think that's enough for me ATM, gotta take some rest.If the app checks for the presence of Pine package name yes, but you can modify it.
I tried it before but with Magisk magic and it worked! But I will need to study how to implement this in better way. I just throw an exception in engineGetCertificateChain, Momo don't detect it due it's not injection.Not exactly what I was hoping for but thanks for your answer nonetheless
Yep, you must make your super.img partitions read-write and modify it from recovery. You can modify it unpacking the .img or using systemRW script from here link this: