Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable spoof_build_vars on initial install to pass by default #24

Merged
merged 2 commits into from
Jul 25, 2024
Merged

Enable spoof_build_vars on initial install to pass by default #24

merged 2 commits into from
Jul 25, 2024

Conversation

osm0sis
Copy link

@osm0sis osm0sis commented Jul 24, 2024

  • most devices seem to require spoof_build_vars so enable it by default, but only on new installs, so that they pass MEETS_DEVICE_INTEGRITY out of the box
  • this still allows it to be disabled by simply deleting the file after initial install for those who want to avoid Zygisk usage and/or can pass with their own device values
  • some fingerprints which pass STRONG with hardware keybox do not seem to also pass DEVICE with the AOSP software keybox, but many do both, so switch to one
  • update example fingerprint to be a helpful hint for users looking for ones that work going forward

- most devices seem to require spoof_build_vars so enable it by default, but only on new installs, so that they pass MEETS_DEVICE_INTEGRITY out of the box
- this still allows it to be disabled by simply deleting the file after initial install for those who want to avoid Zygisk usage or can pass with their own device values
@osm0sis
Copy link
Author

osm0sis commented Jul 24, 2024

Hold on, going to find a different print for the default. (Beta prints expire roughly 6 weeks after the beta's release date).

Might be good to have that in the README example though so people have a clue where to readily find a working one.

- some fingerprints which pass STRONG with hardware keybox do not seem to also pass DEVICE with the AOSP software keybox, but many do both, so switch to one
- update example fingerprint to be a helpful hint for users looking for ones that work going forward
@osm0sis
Copy link
Author

osm0sis commented Jul 24, 2024

Alright, ready to go. 👍

@5ec1cff 5ec1cff merged commit db72d6d into 5ec1cff:master Jul 25, 2024
1 check passed
@osm0sis
Copy link
Author

osm0sis commented Jul 25, 2024

Amazing, thanks! Excited for the next release! 🙌🤘

@Myer921
Copy link

Myer921 commented Jul 28, 2024

The OnePlus series does not need to be enabled; the OnePlus 9 and below require TEE simulation, while the OnePlus 10 and above do not need spoof_build_vars. The Pixel series requires the use of spoof_build_vars. In testing with the Pixel 4, using its own information can pass STRONG, but it fails immediately after installing LSPosed. Using spoof_build_vars resolves this issue.


Oneplus 系列不需要启用,Oneplus 9 以及以下则需要 TEE 模拟,Oneplus 10 以上不需要 spoof_build_vars 。
Pixel 系列需要使用 spoof_build_vars ,Pixel4 的测试中使用自身信息可以通过 STRONG ,但安装 LSPosed 后立即失败,使用 spoof_build_vars 后可以解决这个问题。

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants