You've already forked PlayIntegrityFork
mirror of
https://github.com/osm0sis/PlayIntegrityFork.git
synced 2025-09-06 06:37:06 +00:00
Clean up README
This commit is contained in:
37
README.md
37
README.md
@@ -1,4 +1,5 @@
|
|||||||
# Play Integrity Fix
|
# Play Integrity Fork
|
||||||
|
*PIF forked to bring back the custom.pif.json restore feature and develop more methodically*
|
||||||
|
|
||||||
A Zygisk module which fixes "ctsProfileMatch" (SafetyNet) and "MEETS_DEVICE_INTEGRITY" (Play Integrity).
|
A Zygisk module which fixes "ctsProfileMatch" (SafetyNet) and "MEETS_DEVICE_INTEGRITY" (Play Integrity).
|
||||||
|
|
||||||
@@ -7,32 +8,26 @@ To use this module you must have one of the following:
|
|||||||
- Magisk with Zygisk enabled.
|
- Magisk with Zygisk enabled.
|
||||||
- KernelSU with [ZygiskNext](https://github.com/Dr-TSNG/ZygiskNext) module installed.
|
- KernelSU with [ZygiskNext](https://github.com/Dr-TSNG/ZygiskNext) module installed.
|
||||||
|
|
||||||
[**Download the latest here**](https://github.com/chiteroman/PlayIntegrityFix/releases/latest).
|
|
||||||
|
|
||||||
## Telegram group
|
|
||||||
|
|
||||||
https://t.me/playintegrityfix
|
|
||||||
|
|
||||||
## Donations
|
|
||||||
|
|
||||||
- [PayPal](https://paypal.me/chiteroman)
|
|
||||||
|
|
||||||
## Official posts
|
|
||||||
|
|
||||||
- [XDA](https://xdaforums.com/t/module-play-integrity-fix-safetynet-fix.4607985/)
|
|
||||||
|
|
||||||
## About module
|
## About module
|
||||||
|
|
||||||
It injects a classes.dex file to modify a few fields in the android.os.Build class. Also, it creates a hook in the native code to modify system properties. These are spoofed only to Google Play Services' DroidGuard (SafetyNet/Play Integrity) service.
|
It injects a classes.dex file to modify a few fields in the android.os.Build class. Also, it creates a hook in the native code to modify system properties. These are spoofed only to Google Play Services' DroidGuard (SafetyNet/Play Integrity) service.
|
||||||
|
|
||||||
The purpose of the module is to avoid a hardware attestation.
|
The purpose of the module is to avoid hardware attestation.
|
||||||
|
|
||||||
## About 'custom.pif.json' file
|
## About 'custom.pif.json' file
|
||||||
|
|
||||||
You can create this file in the module directory to spoof custom values to the GMS unstable process. It will be used instead of the included pif.json.
|
You can create this file in the module directory to spoof custom values to the GMS unstable process. It will be used instead of any included pif.json.
|
||||||
|
|
||||||
You can't use values from recent devices due them triggering hardware backed attestation.
|
You can't use values from recent devices due them triggering hardware backed attestation.
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>Resources</summary>
|
||||||
|
|
||||||
|
- [How-To Guide - Info to help find build.prop files, then create and use a custom.pif.json](https://xdaforums.com/t/module-play-integrity-fix-safetynet-fix.4607985/post-89189572)
|
||||||
|
- [gen_pif_custom.sh - Script to generate a custom.pif.json from device dump build.prop files](https://xdaforums.com/t/tools-zips-scripts-osm0sis-odds-and-ends-multiple-devices-platforms.2239421/post-89173470)
|
||||||
|
|
||||||
|
</details>
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
### Failing BASIC verdict
|
### Failing BASIC verdict
|
||||||
@@ -59,14 +54,6 @@ Follow these steps:
|
|||||||
- Clear Google Play Services (com.google.android.gms) cache and data (Optionally skip clearing data and wait some time, ~24h, for it to resolve on its own)
|
- Clear Google Play Services (com.google.android.gms) cache and data (Optionally skip clearing data and wait some time, ~24h, for it to resolve on its own)
|
||||||
- Reboot
|
- Reboot
|
||||||
|
|
||||||
<details>
|
|
||||||
<summary>Guide</summary>
|
|
||||||
|
|
||||||

|
|
||||||

|
|
||||||
|
|
||||||
</details>
|
|
||||||
|
|
||||||
### Read module logs
|
### Read module logs
|
||||||
|
|
||||||
You can read module logs using this command directly after boot:
|
You can read module logs using this command directly after boot:
|
||||||
|
|||||||
Binary file not shown.
|
Before Width: | Height: | Size: 50 KiB |
Binary file not shown.
|
Before Width: | Height: | Size: 92 KiB |
Reference in New Issue
Block a user