mirror of
https://github.com/kdrag0n/safetynet-fix.git
synced 2024-07-03 03:29:03 +00:00
This reverts commit 65bc7f072e
.
The current implementation of dynamic fingerprint spoofing seems to work
well in practice, and I haven't received any issue reports so far. It
can be improved in a future release if necessary.
22 lines
959 B
Markdown
22 lines
959 B
Markdown
# v2.4.0
|
|
|
|
## Highlights
|
|
|
|
- **Play Integrity bypass** without breaking device checks or causing other issues
|
|
- Disabled use of hardware attestation on Pixel 7 and newer (@anirudhgupta109)
|
|
|
|
## Other changes
|
|
|
|
- Updated instructions for newer Android and Magisk versions
|
|
- Better debugging for future development
|
|
|
|
**This version only supports Zygisk (Magisk 24 and newer).**
|
|
|
|
It's taken a while to find way to bypass Play Integrity that doesn't require spoofing the build fingerprint permanently, but I wanted to make sure this module doesn't cause any unnecessary breakage. Enjoy!
|
|
|
|
---
|
|
|
|
# Donate
|
|
|
|
**If you found this module helpful, please consider supporting development with a [recurring donation](https://patreon.com/kdrag0n)** for rewards such as early access to updates, exclusive behind-the-scenes development news, and priority support. Alternatively, [you can also **buy me a coffee**](https://paypal.me/kdrag0ndonate). All support is appreciated ❤️
|