-
-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Description
Describe the bug
On Android 15 (and probably 13 and 14 too), it is possible to achieve only BASIC integrity. Many apps today require at least DEVICE.
(to be extra clear and not spread false rumors: if an app doesn't work, it is usually more important to hide root than to achieve any integrity)
To Reproduce
Steps to reproduce the behavior: I've already written it in comment to ChatGPT ticket.
In short, enable SafetyNet in microG and try to run an app like ChatGPT, or Simple Play Integrity Checker.
Expected behavior
DEVICE integrity working out-of-the-box on LineageOS microG edition (similar to integrated signature spoofing patch)
A clear tutorial how to achieve DEVICE integrity on other ROMs.
System
Android Version: 15
Custom ROM: LineageOS microG edition 22.2
Google Pixel 4a
Magisk
Doesn't matter whether Zygisk is enabled.
Additional context
@FSaurenbach and @ale5000-git have recently reported that one should get DEVICE integrity with microG. What Android versions have you tested?
Also, there is this tutorial which shows how to achieve DEVICE integrity with microG on Android 15, but it includes installing lots of modules, including now-closed-source Tricky Store (which actually never was FOSS, only source-available for some time).
That's because, as far as I know from reading XDA, /r/androidroot and /r/Magisk, getting DEVICE requires a keybox, just like STRONG. However, using microG instead of Google Play Services is rare in these communities.
The Plan
- Understand whether keybox is required
- If so, make a clean room FOSS implementation of Tricky Store or find another FOSS module that works
- Port required modules to patches for LOS microG edition, to make them work without Magisk modules, like signature spoofing
- Maybe compile required modules in microG CI/CD infrastructure to have binaries we can trust, for users of other ROMs?
I can help with it, I'm fluent in C & C++ and know Android internals a bit (contributed to signature spoofing patches: Lanchon/haystack#34 https://gitlab.com/teodly/NanoDroid/-/compare/master...patcher-q-fix?from_project_id=5247931)