Have a question about CRYPTO in magisk - Magisk

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Before I change rom at thet mark "crypto" have result File, after I change rom it only N/A and safetynet fale must to be use props and module to bypass, last time crypto = File is passing easy and not laging
Someone can give me answer, and hot to install magisk with Crypto = File
Thank you For everyone interesting this thread, hope can fix IT.

"Crypto" just reports what kind of encryption your device uses, it's got nothing directly to do with Magisk (that little piece of info is even removed from the app in the recent Canary releases). If your device isn't encrypted (or if Magisk can't tell if it's encrypted) it'll say N/A...
If you want the device to be encrypted you'll find that setting in your ROM somewhere, not Magisk.

Didgeridoohan said:
"Crypto" just reports what kind of encryption your device uses, it's got nothing directly to do with Magisk (that little piece of info is even removed from the app in the recent Canary releases). If your device isn't encrypted (or if Magisk can't tell if it's encrypted) it'll say N/A...
If you want the device to be encrypted you'll find that setting in your ROM somewhere, not Magisk.
Click to expand...
Click to collapse
Oh I got it thank you so much, Now I can tell don't worry about that.

Related

Does the newest SuperSU zip do the "no forcencrypt" trick?

Hey everyone, hows it goin
I have a quick question: does the newest supersu zip still do the no forcencrypt trick?
Here is the thing. I believe the early (really early) version of supersu zip does this. But now I'm not so sure. I ain no developer so I cannot really unzip the package and figure out whats going on in there.
My nexus 6 is currently running unencrypted system and I'd like to keep it that way. Since I'm not sure about this, I will have to wait for other developers to release the no forcencrypt boot image and then I can flash the new security updates, supersu, busybox you know the drill.
So I figure I would ask you guys for answers here. Cuz if the newest supersu zip still does this trick I don't have to wait for those no forcencrypt boot images anymore. Thank you Wugfresh for those wonderful images and I will buy you a beer again! And of course thank you master Chainfire.
Cheers:good:
C'mon boys! Share some ideas.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
oh and my nexus 6 is running Android M 6.0.1 right now
Couldn't help thinking about this and since nobody replys yet. So I tried. And the answer is positive. SuperSU zip does disable the force encryption by default. Chainfire rocks \m/
PS. everyone here should buy SuperSU Pro to support Chainfire. I bought it

Bypassed SafetyNet... But my banking's pushTAN app still denies its usage.

Hey, I just rooted my OnePlus 5T following this guide . After successfully rooting, I found this on magisk's website, telling me how to bypass the SafetyNet thing. I tried both linked things, the "Latest Module By Didgeridoohan" and "Safetypatcher {Module} by hackintosh5". On both I get ctsProfile: true and basicIntegrity: true.
However, the pushTAN app for my online banking still won't work, upon opening it it redirects me to my browser, opening a page that tells me that my device is rooted and thus the app won't work. I cleared the app's data, even reinstalled it... but none of it will work.
Any idea on how to fix this? Thanks in advance!
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
First of all, here's a quote from the official Magisk release thread here on XDA:
Magisk does NOT have a website. Do NOT download Magisk from unofficial sites.
Official Links: Magisk Github Release
Click to expand...
Click to collapse
Second, take a look here for root hiding tips:
https://didgeridoohan.com/magisk/MagiskHide#hn_Hiding_root_from_apps
Didgeridoohan said:
First of all, here's a quote from the official Magisk release thread here on XDA:
Second, take a look here for root hiding tips:
https://didgeridoohan.com/magisk/MagiskHide#hn_Hiding_root_from_apps
Click to expand...
Click to collapse
The Magic Core Only Mode seemed to work, my TAN app now loads. Thank you very much!

Device spoofing in emulator (the holy grail)?

Has anyone successfully fooled safetynet in an emulator? Maybe it'd be enough to block application's calls to it. Way to do this would be:
1. Somehow boot OEM rom or copy init.rc and build.prop
2. get magisk working using https://github.com/shakalaca/MagiskOnEmulator
3. Trick GMS using some combination of EDXPOSED, https://github.com/microg/RemoteDroidGuard and https://github.com/Felixho19/CuckooWithFrida.
Thoughts?
SafetyNet: Google's tamper detection for Android · Yiannis Kozyrakis ~ blog
thoughts on mobile security
koz.io
mcdoe123 said:
Has anyone successfully fooled safetynet in an emulator? Maybe it'd be enough to block application's calls to it. Way to do this would be:
1. Somehow boot OEM rom or copy init.rc and build.prop
2. get magisk working using https://github.com/shakalaca/MagiskOnEmulator
3. Trick GMS using some combination of EDXPOSED, https://github.com/microg/RemoteDroidGuard and https://github.com/Felixho19/CuckooWithFrida.
Thoughts?
SafetyNet: Google's tamper detection for Android · Yiannis Kozyrakis ~ blog
thoughts on mobile security
koz.io
Click to expand...
Click to collapse
I got root to install stable magisk through this tutorial, however I'm looking for a way to get past safetynet as well.
Android 11 (api 30)
Skin - Pixel_3a_API_30_x86
Windows 10 64bits
In the terminal it even shows the change of props. But it doesn't pass the tests
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Do you have any news?

McDonald's app with root (magisk)

Hey everybody.
I'm trying to start my McDonald's app but it always gives me this message where it says that my device doesnot pass the security check. I tried magisk hide, I deleted app data and reinstalled, i deleted the twrp folder in the root of my phone. It still gives me this message and i really don't know what to do. there has to be a solution. Please help
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
It's a long term issue with McDonald's own paranoid security check. There's a chance it's also country specific, as I no longer have that problem recently. At least I can open the app and see ongoing promos. But I haven't tested redeeming coupons and such.
use my tutorial for mario kart, works with mcdonalds app and many others who detect root.
here: https://forum.xda-developers.com/t/discussion-mario-kart-tour-magisk-discussion-thread.4087357/
hotmountner2310 said:
Hey everybody.
I'm trying to start my McDonald's app but it always gives me this message where it says that my device doesnot pass the security check. I tried magisk hide, I deleted app data and reinstalled, i deleted the twrp folder in the root of my phone. It still gives me this message and i really don't know what to do. there has to be a solution. Please help
Click to expand...
Click to collapse
Hello there, would you like to check my method? Found it this morning, works for me.

Question Sound Equalizer like Viper4Android

Hey everyone,
I was wondering if there is a sound equalizer/modifier like Viper4Android? (I couldn't get it to work, and nobody answers forum questions- so I assume it's a dead project?)
Do you use the system settings or something else?
Thanks!
You're 100% right about hard to get answers but I've always had better luck with JamesDSP(Flash thru Magisk)
Try poweramp equalizer. You can find it on playstore.
gasaneris said:
I couldn't get it to work, and nobody answers forum questions
Click to expand...
Click to collapse
After spending the last day on this, I've gotten Viper4Android working on my new Pixel 5a running Android 12.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
This thread has all the info about why Viper doesn't work out-of-the box on Android12 and how to fix it manually + a couple of magisk mods that someone made to automate the process instead of manually editing the selinux rules.
programminghoch10 (the dev of Lygisk) has a github repo that does all of that and some extras, both stock pixel AOSP and LineageOS - ViPER4AndroidRepackaged
I installed ViPER4AndroidRepackaged from storage in Magisk Manager Canary, rebooted, and that's it. Didn't have to fiddle with the viper driver or any other audio mods/settings. Awesome.
Esb1809 said:
You're 100% right about hard to get answers but I've always had better luck with JamesDSP(Flash thru Magisk)
Click to expand...
Click to collapse
This accomplished my main goal of increasing volume. Thanks

Categories

Resources