sigspoof-checker | Signature Spoofing Checker | Hacking library
kandi X-RAY | sigspoof-checker Summary
kandi X-RAY | sigspoof-checker Summary
Signature Spoofing Checker
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Updates the status of the request
- Report the signature information
- Enables or disables the spoof status
- Called when the browser starts
- Request spoofing permission
- Initialize the activity
- Resume resume status
sigspoof-checker Key Features
sigspoof-checker Examples and Code Snippets
Community Discussions
Trending Discussions on sigspoof-checker
QUESTION
I want to remove Google apps and services on a new Fairphone 4 (Android 11, now rooted using Magisk. No TWRP build available yet.).
To this end, I am trying to use microG. In the Prerequisites for its usage, signature spoofing and deleting files in system/priv-app
are listed. For signature spoofing, I followed the XPosed solution for Android 11 and 12 listed here, i.e. using Magisk + riru + LSPosed + a FakeGApps fork. Not sure, whether or not this worked. All individual steps reported success, but the Signature Spoofing Checker says it didn't work.
Anyway, I'm definitely stuck at the second step, because I don't seem to be able to delete any files in system_ext/priv-app
. I tried the solutions proposed here and here.
If I try
ANSWER
Answered 2021-Dec-27 at 18:12I asked the question simultaneously on the XDA Forums, and got a reply there.
At the stage described above (unlocked bootloader, Magisk, signature spoofing with riru + LSPosed), all that's needed is to install NanoDroid with microG as a Magisk module. Download the current NanoDroid-microG zip from here:
https://downloads.nanolx.org/NanoDroid/Stable/
either on your phone directly or transfer it to your phone, then install it as a Magisk module from storage. Voilà, GApps are removed (or at least inaccessible) and microG works. Best to then update microG, e.g. via its F-Droid repo: https://microg.org/download.html.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install sigspoof-checker
You can use sigspoof-checker like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the sigspoof-checker component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page