mirror of
https://github.com/kdrag0n/safetynet-fix.git
synced 2024-07-01 02:28:54 +00:00
Revert "Revert Magisk update metadata"
This reverts commit 65bc7f072e
.
The current implementation of dynamic fingerprint spoofing seems to work
well in practice, and I haven't received any issue reports so far. It
can be improved in a future release if necessary.
This commit is contained in:
parent
65bc7f072e
commit
cbb1681064
13
CHANGELOG.md
13
CHANGELOG.md
|
@ -1,18 +1,19 @@
|
|||
# v2.3.1
|
||||
# v2.4.0
|
||||
|
||||
## Highlights
|
||||
|
||||
- Fixed fingerprint on OxygenOS/ColorOS 12 (@osm0sis)
|
||||
- Support for Magisk 24+ module updates (@benjibobs)
|
||||
- Restored support for Android 7
|
||||
- **Play Integrity bypass** without breaking device checks or causing other issues
|
||||
- Disabled use of hardware attestation on Pixel 7 and newer (@anirudhgupta109)
|
||||
|
||||
## Other changes
|
||||
|
||||
- Spoofed OnePlus OEM unlock status for futureproofing (@osm0sis)
|
||||
- Minor code improvements
|
||||
- Updated instructions for newer Android and Magisk versions
|
||||
- Better debugging for future development
|
||||
|
||||
**This version only supports Zygisk (Magisk 24 and newer).**
|
||||
|
||||
It's taken a while to find way to bypass Play Integrity that doesn't require spoofing the build fingerprint permanently, but I wanted to make sure this module doesn't cause any unnecessary breakage. Enjoy!
|
||||
|
||||
---
|
||||
|
||||
# Donate
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{
|
||||
"version": "v2.3.1",
|
||||
"versionCode": 20301,
|
||||
"zipUrl": "https://github.com/kdrag0n/safetynet-fix/releases/download/v2.3.1/safetynet-fix-v2.3.1.zip",
|
||||
"version": "v2.4.0",
|
||||
"versionCode": 20400,
|
||||
"zipUrl": "https://github.com/kdrag0n/safetynet-fix/releases/download/v2.4.0/safetynet-fix-v2.4.0.zip",
|
||||
"changelog": "https://raw.githubusercontent.com/kdrag0n/safetynet-fix/master/CHANGELOG.md"
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue
Block a user