From e2bb20b07729e0d7c14b2f8b4da20f6b8bf55910 Mon Sep 17 00:00:00 2001 From: Chris Renshaw Date: Sat, 2 Mar 2024 22:57:11 -0400 Subject: [PATCH] README: be painfully clear about where a Magisk module keeps its files --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e65dcc9..715fcc6 100644 --- a/README.md +++ b/README.md @@ -22,7 +22,7 @@ The purpose of the module is to avoid hardware attestation. ## About 'custom.pif.json' file -You can fill out the included template [example.pif.json](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.pif.json) from the module directory then rename it to custom.pif.json to spoof custom values to the GMS unstable process. It will be used instead of any included pif.json (none included currently). +You can fill out the included template [example.pif.json](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.pif.json) from the module directory (/data/adb/modules/playintegrityfix) then rename it to custom.pif.json to spoof custom values to the GMS unstable process. It will be used instead of any included pif.json (none included currently). As a general rule you can't use values from recent devices due to them only being allowed with full hardware backed attestation. @@ -52,7 +52,7 @@ A migration may also be performed manually with `sh migrate.sh` and custom.pif.j ## About 'custom.app_replace.list' file -You can customize the included default [example.app_replace.list](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.app_replace.list) from the module directory then rename it to custom.app_replace.list to systemlessly replace any additional conflicting custom ROM spoof injection app paths to disable them. +You can customize the included default [example.app_replace.list](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.app_replace.list) from the module directory (/data/adb/modules/playintegrityfix) then rename it to custom.app_replace.list to systemlessly replace any additional conflicting custom ROM spoof injection app paths to disable them. ## Troubleshooting