MicroG Setup Guide
MicroG is an open source alternative to Gapps, with which you are almost guaranteed to get:
-Better Bettery Life
-Privacy
-Better performance
over Gapps.
Google services that are supported by MicroG are detailed here:
https://github.com/microg/android_packages_apps_GmsCore/wiki/Implementation-Status
β¬οΈHow to get MicroG:
-Get MicroG individual APKs and manually put them into system (and granting all permissions to all of them manually):
--Website:
https://microg.org/download.html
--FDroid repository:
https://microg.org/fdroid/repo
-Through any of the packs that install the whole microg package, this is the easiest way https://t.me/NoGoolag/182
β οΈNOTE: You need Signature Spoofing for MicroG to work properly. Check #sigspoof
https://forum.xda-developers.com/android/general/index-list-custom-roms-offering-t3557047
πSteps to setup MicroG are:
1. Do a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.)
2. Install MicroG through your preferred medium.
3. Reboot to system.
4. Go to Settings > Accounts > Add Accounts > Google and login to your account (NOT REQUIRED)
5. Open app 'MicroG Settings' > Self-Check. If "System grants signature spoofing permission" isn't ticked, click on it and grant permission.
6. In MicroG settings, Go to "Google device registration", "Google Cloud Messaging", and "Google SafetyNet" and enable each of them.
7. Reboot.
8. In MicroG settings, go to UnifiedNLP settings, and enable everything in "Configure location backends" and "Configure address lookup backends".
9. Reboot.
Congrats! MicroG set up! You are now Google services free.
For Google Sync:
-Check https://t.me/NoGoolag/70
For accessing Play Store:
-Use Aurora which are open-source and directly access apps from play store
-Use a modded play store from any of the microg installers
https://t.me/NoGoolag/1792
To use a Google app:
-If a google app is not seeing your account, wipe its data and give it all permissions (not very privacy friendly, but you were the one who wanted to make them work). Then hope for the best.
-Open the app and it [should] see your account.
Troubleshooting:
Setup location like this https://t.me/NoGoolag/64
Report problems with the MicroG app here:
https://forum.xda-developers.com/android/apps-games/app-microg-gmscore-floss-play-services-t3217616/
𧩠The main components of MicroG are:
-GmsCore (com.google.android.gms)
--The stuffing of the package resides here. All the major code.
-GsfProxy (com.google.android.gsf)
--Enables GCM (Google cloud messaging, which is basically a notification system most apps use)
-FakeStore (com.android.vending)
--A placeholder for PlayStore
--NOT AN APP STORE
--Just to prevent poorly coded apps from crashing
-MapsAPIv1 (com.google.android.maps)
--To make older apps with maps work
-DroidGuard (org.microg.gms.droidguard)
--Optional
--Used to try to pass safetynet
--Has proprietary components, but sandboxed
-Various NLP backends
--Optional
--For getting network location (different from GPS location)
--check #backends
#microg #guide #foss
Guide from @nogoolag
MicroG is an open source alternative to Gapps, with which you are almost guaranteed to get:
-Better Bettery Life
-Privacy
-Better performance
over Gapps.
Google services that are supported by MicroG are detailed here:
https://github.com/microg/android_packages_apps_GmsCore/wiki/Implementation-Status
β¬οΈHow to get MicroG:
-Get MicroG individual APKs and manually put them into system (and granting all permissions to all of them manually):
--Website:
https://microg.org/download.html
--FDroid repository:
https://microg.org/fdroid/repo
-Through any of the packs that install the whole microg package, this is the easiest way https://t.me/NoGoolag/182
β οΈNOTE: You need Signature Spoofing for MicroG to work properly. Check #sigspoof
https://forum.xda-developers.com/android/general/index-list-custom-roms-offering-t3557047
πSteps to setup MicroG are:
1. Do a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.)
2. Install MicroG through your preferred medium.
3. Reboot to system.
4. Go to Settings > Accounts > Add Accounts > Google and login to your account (NOT REQUIRED)
5. Open app 'MicroG Settings' > Self-Check. If "System grants signature spoofing permission" isn't ticked, click on it and grant permission.
6. In MicroG settings, Go to "Google device registration", "Google Cloud Messaging", and "Google SafetyNet" and enable each of them.
7. Reboot.
8. In MicroG settings, go to UnifiedNLP settings, and enable everything in "Configure location backends" and "Configure address lookup backends".
9. Reboot.
Congrats! MicroG set up! You are now Google services free.
For Google Sync:
-Check https://t.me/NoGoolag/70
For accessing Play Store:
-Use Aurora which are open-source and directly access apps from play store
-Use a modded play store from any of the microg installers
https://t.me/NoGoolag/1792
To use a Google app:
-If a google app is not seeing your account, wipe its data and give it all permissions (not very privacy friendly, but you were the one who wanted to make them work). Then hope for the best.
-Open the app and it [should] see your account.
Troubleshooting:
Setup location like this https://t.me/NoGoolag/64
Report problems with the MicroG app here:
https://forum.xda-developers.com/android/apps-games/app-microg-gmscore-floss-play-services-t3217616/
𧩠The main components of MicroG are:
-GmsCore (com.google.android.gms)
--The stuffing of the package resides here. All the major code.
-GsfProxy (com.google.android.gsf)
--Enables GCM (Google cloud messaging, which is basically a notification system most apps use)
-FakeStore (com.android.vending)
--A placeholder for PlayStore
--NOT AN APP STORE
--Just to prevent poorly coded apps from crashing
-MapsAPIv1 (com.google.android.maps)
--To make older apps with maps work
-DroidGuard (org.microg.gms.droidguard)
--Optional
--Used to try to pass safetynet
--Has proprietary components, but sandboxed
-Various NLP backends
--Optional
--For getting network location (different from GPS location)
--check #backends
#microg #guide #foss
Guide from @nogoolag
GitHub
Implementation Status
Free implementation of Play Services. Contribute to microg/GmsCore development by creating an account on GitHub.
NanoDroid
NanoDroid is a microG installer (by Setialpha) that can install MicroG either in system or systemlessly (as a Magisk module)
πWeb:
https://nanolx.org/nanolx/nanodroid
π RTFM:
https://gitlab.com/Nanolx/NanoDroid
π Changelog:
https://gitlab.com/Nanolx/NanoDroid/blob/master/ChangeLog.md
π£ XDA:
https://forum.xda-developers.com/apps/magisk/module-nanodroid-5-0-20170405-microg-t3584928
π² F-Droid repo
http://nanolx.org/fdroid/repo
Link to add:
https://nanolx.org/fdroid/repo?fingerprint=862ED9F13A3981432BF86FE93D14596B381D75BE83A1D616E2D44A12654AD015
π The full list of differences compared to upstream microG can be read here:
https://github.com/Nanolx/android_packages_apps_GmsCore#changes
Nanodroid zips:
β¦οΈNanoDroid-*.zip
--This is the biggest zip and full of other foss apps.
--Flash either this or the MicroG zip.
β¦οΈNanoDroid-microG-*.zip
--The real package. Contains MicroG stuff and patched Play Store.
--Flash either this or the full NanoDroid zip. This is recommended.
β¦οΈNanoDroid-fdroid-*.zip
--Contains F-droid and its privileged extension. Optional.
β¦οΈNanoDroid-patcher-*.zip
--Signature spoofing enabler.
β¦οΈNanoDroid-setupwizard-*.zip
--Aroma setup wizard for MicroG nanodroid. Either use this, or default settings.
β¦οΈNanoDroid-uninstaller-*.zip
--Self-explanatory.
(Note: * = latest version)
π Steps to Install NanoDroid are:
NOTE: Do this on a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.) Optionally, flash Magisk.
Make sure your ROM supports Signature Spoofing. Check #sigspoof
1. Flash NanoDroid-setupwizard-*.zip and configure your install.
2. Flash the NanoDroid-microG-*.zip (or NanoDroid-*.zip) and optionally NanoDroid-fdroid-*.zip. Note: If you have Magisk, no need to flash this again after future dirty flashes.
3. Setup MicroG using the microg #guide.
Report problems with NanoDroid here:
https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928/
π‘ @NoGoolag
#nanodroid #microg #guide
NanoDroid is a microG installer (by Setialpha) that can install MicroG either in system or systemlessly (as a Magisk module)
πWeb:
https://nanolx.org/nanolx/nanodroid
π RTFM:
https://gitlab.com/Nanolx/NanoDroid
π Changelog:
https://gitlab.com/Nanolx/NanoDroid/blob/master/ChangeLog.md
π£ XDA:
https://forum.xda-developers.com/apps/magisk/module-nanodroid-5-0-20170405-microg-t3584928
π² F-Droid repo
http://nanolx.org/fdroid/repo
Link to add:
https://nanolx.org/fdroid/repo?fingerprint=862ED9F13A3981432BF86FE93D14596B381D75BE83A1D616E2D44A12654AD015
π The full list of differences compared to upstream microG can be read here:
https://github.com/Nanolx/android_packages_apps_GmsCore#changes
Nanodroid zips:
β¦οΈNanoDroid-*.zip
--This is the biggest zip and full of other foss apps.
--Flash either this or the MicroG zip.
β¦οΈNanoDroid-microG-*.zip
--The real package. Contains MicroG stuff and patched Play Store.
--Flash either this or the full NanoDroid zip. This is recommended.
β¦οΈNanoDroid-fdroid-*.zip
--Contains F-droid and its privileged extension. Optional.
β¦οΈNanoDroid-patcher-*.zip
--Signature spoofing enabler.
β¦οΈNanoDroid-setupwizard-*.zip
--Aroma setup wizard for MicroG nanodroid. Either use this, or default settings.
β¦οΈNanoDroid-uninstaller-*.zip
--Self-explanatory.
(Note: * = latest version)
π Steps to Install NanoDroid are:
NOTE: Do this on a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.) Optionally, flash Magisk.
Make sure your ROM supports Signature Spoofing. Check #sigspoof
1. Flash NanoDroid-setupwizard-*.zip and configure your install.
2. Flash the NanoDroid-microG-*.zip (or NanoDroid-*.zip) and optionally NanoDroid-fdroid-*.zip. Note: If you have Magisk, no need to flash this again after future dirty flashes.
3. Setup MicroG using the microg #guide.
Report problems with NanoDroid here:
https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928/
π‘ @NoGoolag
#nanodroid #microg #guide
NanoDroid
NanoDroid is a microG installer (by Setialpha) that can install MicroG either in system or systemlessly (as a Magisk module)
πWeb:
https://nanolx.org/nanolx/nanodroid
π Guide:
https://gitlab.com/Nanolx/NanoDroid
π Changelog:
https://gitlab.com/Nanolx/NanoDroid/blob/master/ChangeLog.md
Stable downloads:
https://downloads.nanolx.org/NanoDroid/Stable
Beta downloads:
https://downloads.nanolx.org/NanoDroid/Beta
π£ XDA:
https://forum.xda-developers.com/apps/magisk/module-nanodroid-5-0-20170405-microg-t3584928
π² F-Droid repo
http://nanolx.org/fdroid/repo
Link to add:
https://nanolx.org/fdroid/repo?fingerprint=862ED9F13A3981432BF86FE93D14596B381D75BE83A1D616E2D44A12654AD015
π The full list of differences compared to upstream microG can be read here:
https://github.com/Nanolx/android_packages_apps_GmsCore#changes
Nanodroid zips:
β¦οΈNanoDroid-*.zip
--This is the biggest zip and full of other foss apps, terminal utilities and the best Legend of Zelda ringtones and sounds.
--Flash either this or the MicroG zip.
β¦οΈNanoDroid-microG-*.zip
--The real package. Contains MicroG stuff and patched Play Store.
--Flash either this or the full NanoDroid zip. This is recommended.
β¦οΈNanoDroid-BromiteWebView-*.zip
--Contains the Bromite webview. Currently the easiest way to intall it.
β¦οΈNanoDroid-fdroid-*.zip
--Contains F-droid and its privileged extension. The full zip already includes FDroid.
β¦οΈNanoDroid-OsmAnd-*.zip
--Contains the OsmAnd maps application along with a contour lines plugin to be installed as system (not sure what good that will do)
β¦οΈNanoDroid-patcher-*.zip
--Signature spoofing enabler.
β¦οΈNanoDroid-setupwizard-*.zip
--Aroma setup wizard for MicroG nanodroid. Either use this, or default settings.
β¦οΈNanoDroid-systest-*.zip
--If you face issues with NanoDroid installation, flash this and it will create logs which you can send to the dev.
β¦οΈNanoDroid-uninstaller-*.zip
--Self-explanatory.
(Note: * = latest version)
π Steps to Install NanoDroid are:
NOTE: Do this on a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.) Optionally, flash Magisk.
Make sure your ROM supports Signature Spoofing. Check #sigspoof
1. After installing your rom and TWRP, reboot before doing anything. This initalizes folders necessary for patching/installation
2. Flash NanoDroid-setupwizard-*.zip and configure your install.
3. If sig spoofing isn't included in your ROM or doesn't work, Flash the NanoDroid patcher. If you're on P, make sure you deodex first!
4. Flash either the NanoDroid-*.zip or NanoDroid-microG-*.zip.
5. Optionally, flash these zips: NanoDroid-BromiteWebView-*.zip, NanoDroid-fdroid-*.zip and Nanodroid-OsmAnd-*.zip.
6. Setup MicroG using the microg #guide.
Report problems with NanoDroid here:
https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928/
π‘ @NoGoolag
#nanodroid #microg #guide
NanoDroid is a microG installer (by Setialpha) that can install MicroG either in system or systemlessly (as a Magisk module)
πWeb:
https://nanolx.org/nanolx/nanodroid
π Guide:
https://gitlab.com/Nanolx/NanoDroid
π Changelog:
https://gitlab.com/Nanolx/NanoDroid/blob/master/ChangeLog.md
Stable downloads:
https://downloads.nanolx.org/NanoDroid/Stable
Beta downloads:
https://downloads.nanolx.org/NanoDroid/Beta
π£ XDA:
https://forum.xda-developers.com/apps/magisk/module-nanodroid-5-0-20170405-microg-t3584928
π² F-Droid repo
http://nanolx.org/fdroid/repo
Link to add:
https://nanolx.org/fdroid/repo?fingerprint=862ED9F13A3981432BF86FE93D14596B381D75BE83A1D616E2D44A12654AD015
π The full list of differences compared to upstream microG can be read here:
https://github.com/Nanolx/android_packages_apps_GmsCore#changes
Nanodroid zips:
β¦οΈNanoDroid-*.zip
--This is the biggest zip and full of other foss apps, terminal utilities and the best Legend of Zelda ringtones and sounds.
--Flash either this or the MicroG zip.
β¦οΈNanoDroid-microG-*.zip
--The real package. Contains MicroG stuff and patched Play Store.
--Flash either this or the full NanoDroid zip. This is recommended.
β¦οΈNanoDroid-BromiteWebView-*.zip
--Contains the Bromite webview. Currently the easiest way to intall it.
β¦οΈNanoDroid-fdroid-*.zip
--Contains F-droid and its privileged extension. The full zip already includes FDroid.
β¦οΈNanoDroid-OsmAnd-*.zip
--Contains the OsmAnd maps application along with a contour lines plugin to be installed as system (not sure what good that will do)
β¦οΈNanoDroid-patcher-*.zip
--Signature spoofing enabler.
β¦οΈNanoDroid-setupwizard-*.zip
--Aroma setup wizard for MicroG nanodroid. Either use this, or default settings.
β¦οΈNanoDroid-systest-*.zip
--If you face issues with NanoDroid installation, flash this and it will create logs which you can send to the dev.
β¦οΈNanoDroid-uninstaller-*.zip
--Self-explanatory.
(Note: * = latest version)
π Steps to Install NanoDroid are:
NOTE: Do this on a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.) Optionally, flash Magisk.
Make sure your ROM supports Signature Spoofing. Check #sigspoof
1. After installing your rom and TWRP, reboot before doing anything. This initalizes folders necessary for patching/installation
2. Flash NanoDroid-setupwizard-*.zip and configure your install.
3. If sig spoofing isn't included in your ROM or doesn't work, Flash the NanoDroid patcher. If you're on P, make sure you deodex first!
4. Flash either the NanoDroid-*.zip or NanoDroid-microG-*.zip.
5. Optionally, flash these zips: NanoDroid-BromiteWebView-*.zip, NanoDroid-fdroid-*.zip and Nanodroid-OsmAnd-*.zip.
6. Setup MicroG using the microg #guide.
Report problems with NanoDroid here:
https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928/
π‘ @NoGoolag
#nanodroid #microg #guide
GitLab
Christopher Roy Bratusek / NanoDroid Β· GitLab
microG, F-Droid, GNU Bash, FOSS applications and more for Android
Warning about Smali Patcher issued in public interest
TLDR; don't use SmaliPatcher, use NanoDroid patcher, Qpatch or Haystack
Smali patcher was released a while ago, and it seemed to be a very useful tool (despite it being windows only) as it would automagically pull, deodex, patch and push sigspoof to your connected phone. Even more so since no other sigspoof patcher seems to support Q yet.
But a little research before I went to ask the "developer" to open source it revealed these posts in the thread:
- https://forum.xda-developers.com/showpost.php?p=78958124
-> f0mey (OP of thread) admitting that they don't know anything of the source code and probably don't even have access to it
- https://forum.xda-developers.com/showpost.php?p=80287799
- https://forum.xda-developers.com/showpost.php?p=80287989
- https://forum.xda-developers.com/showpost.php?p=80292041
-> A user complaining that the executable recieves incoming connections from arbitrary IPs, and f0mey nonchalantly saying that they have no idea what that is and it's probably nothing. Further down the thread, f0mey notes the IP seems to be from Russia, still confident that nothing is wrong.
Conclusion:
Still no proof that Smali Patcher does anything malicious, but a pretty big concern.
Also, its real origin is still unknown. Perhaps 4pda?
@NoGoolag
#smalipatcher #sigspoof #smali
TLDR; don't use SmaliPatcher, use NanoDroid patcher, Qpatch or Haystack
Smali patcher was released a while ago, and it seemed to be a very useful tool (despite it being windows only) as it would automagically pull, deodex, patch and push sigspoof to your connected phone. Even more so since no other sigspoof patcher seems to support Q yet.
But a little research before I went to ask the "developer" to open source it revealed these posts in the thread:
- https://forum.xda-developers.com/showpost.php?p=78958124
-> f0mey (OP of thread) admitting that they don't know anything of the source code and probably don't even have access to it
- https://forum.xda-developers.com/showpost.php?p=80287799
- https://forum.xda-developers.com/showpost.php?p=80287989
- https://forum.xda-developers.com/showpost.php?p=80292041
-> A user complaining that the executable recieves incoming connections from arbitrary IPs, and f0mey nonchalantly saying that they have no idea what that is and it's probably nothing. Further down the thread, f0mey notes the IP seems to be from Russia, still confident that nothing is wrong.
Conclusion:
Still no proof that Smali Patcher does anything malicious, but a pretty big concern.
Also, its real origin is still unknown. Perhaps 4pda?
@NoGoolag
#smalipatcher #sigspoof #smali
patch.sh
3.8 KB
Signature Spoofing patching for Android Q
- All the credit to Darknecromonger for discovering this method -
Basically some tools (namely DexPatcher) have been updated that now allow us to patch Android Q for sigspoofing without using shady stuff like SmaliPatcher.
Setialpha knows about it already and it will probably be in the next ND patcher release.
Meanwhile, here's a handy little shell script to be run from a PC. It'll pull, patch and push a sigspoof patched services.jar by itself.
Prerequisites:
- A deodexed ROM
- A PC with java and adb installed
Instructions:
- Connect the device to your PC with a cable and authorise ADB
- Run patcher.sh
[Tested on Debian, but should be distro agnostic]
Troubleshooting:
- ADB can't access USB for your user? Search online how to fix it. Or you can run with sudo, but that's just bad practice
π‘ @NoGoolag
#sigspoof #q #patch #patcher
- All the credit to Darknecromonger for discovering this method -
Basically some tools (namely DexPatcher) have been updated that now allow us to patch Android Q for sigspoofing without using shady stuff like SmaliPatcher.
Setialpha knows about it already and it will probably be in the next ND patcher release.
Meanwhile, here's a handy little shell script to be run from a PC. It'll pull, patch and push a sigspoof patched services.jar by itself.
Prerequisites:
- A deodexed ROM
- A PC with java and adb installed
Instructions:
- Connect the device to your PC with a cable and authorise ADB
- Run patcher.sh
[Tested on Debian, but should be distro agnostic]
Troubleshooting:
- ADB can't access USB for your user? Search online how to fix it. Or you can run with sudo, but that's just bad practice
π‘ @NoGoolag
#sigspoof #q #patch #patcher
Click on the hashtags. If the note doesn't show up, just type the hashtag in the chat. Else, the note got vanished
#afwall
#alternatives
#altfrontends
#amp
#apk
#aurora
#backup
#blockadstrackers
#bounty
#classroom
#cleaningcrap
#cloud
#cloudflare
#datacollection
#debloat
#deezer
#delete
#deodex
#disablecaptiveportal
#disablecomponents
#disablegoogle
#discord
#dns
#dnscrypt
#dontask
#e
#exodus
#facebook
#fakegapps
#faq
#fdroid
#fennec
#findyourphone
#gcam
#gmail_signin_error
#googlefi
#googletakeout
#gpslock
#graphene
#grapheneos
#gratisapps
#guide
#ipsum
#librechair
#lineagemicrog
#location
#logs
#madaidan
#magicgapps
#magisk
#mailalias
#manjaro
#microg
#mixplorer
#netoff
#news
#nitrokey
#notes
#nothingtohide
#osm
#ot
#playgames
#playpaid
#problems
#pushnotifications
#qpatch
#rh01
#riot
#safetynet
#satstat
#searchengines
#shelter
#signal
#signaturespoofing
#sigspoof
#smalipatcher
#spite
#sync
#tgclients
#todolists
#tor
#torfud
#uber
#uncensorISP
#unlppatch
#untracklinks
#vanced
#vpn
#wear
#wiki
#windows
#wireguard
#withoutgoogle
#xiaomi
#afwall
#alternatives
#altfrontends
#amp
#apk
#aurora
#backup
#blockadstrackers
#bounty
#classroom
#cleaningcrap
#cloud
#cloudflare
#datacollection
#debloat
#deezer
#delete
#deodex
#disablecaptiveportal
#disablecomponents
#disablegoogle
#discord
#dns
#dnscrypt
#dontask
#e
#exodus
#fakegapps
#faq
#fdroid
#fennec
#findyourphone
#gcam
#gmail_signin_error
#googlefi
#googletakeout
#gpslock
#graphene
#grapheneos
#gratisapps
#guide
#ipsum
#librechair
#lineagemicrog
#location
#logs
#madaidan
#magicgapps
#magisk
#mailalias
#manjaro
#microg
#mixplorer
#netoff
#news
#nitrokey
#notes
#nothingtohide
#osm
#ot
#playgames
#playpaid
#problems
#pushnotifications
#qpatch
#rh01
#riot
#safetynet
#satstat
#searchengines
#shelter
#signal
#signaturespoofing
#sigspoof
#smalipatcher
#spite
#sync
#tgclients
#todolists
#tor
#torfud
#uber
#uncensorISP
#unlppatch
#untracklinks
#vanced
#vpn
#wear
#wiki
#windows
#wireguard
#withoutgoogle
#xiaomi
Signature Spoofing for Android 11
Guide by bluede-v Will
First of all Flash your ROM and Magisk (you need to download the latest version to get Magisk working on Android 11)
Click on Build number (7x) to enable Developer Options
After that enable ADB-Debugging and Root-ADB-Debugging in your ROM in case of LineageOS go to Setting -> System -> Developer Options
So Lets go this is the more complicated part. but also really easy if you done it once.
I'm using Debian Linux but it should be possible on every OS. In Windows use the Linux Subsystem.
You need to have ADB installed on your System tho.
ADB link: https://adbdownload.com
First of all you need to download this 2 Files:
https://gitlab.com/oF2pks/haystack/-/blob/11-attempt/spoof_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO
https://github.com/microg/GmsCore/files/5652857/microG_AVDx86api30_magiskMaRViN.zip
Rename "spoof\_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO" to "spoof\_AVDapi30.zip"
Next Download this zip: https://gitlab.com/oF2pks/haystack/-/archive/11-attempt/haystack-11-attempt.zip
Also download this jar file: https://github.com/DexPatcher/dexpatcher-tool/releases/download/v1.8.0-beta1/dexpatcher-1.8.0-beta1.jar
So now unzip the haystack-11-attempt.zip and put the dexpatcher.jar file into to Folder.
This part I use Bash shell in Linux.
Bash:
adb pull /system/framework/services.jar
java -jar dexpatcher-1.8.0-beta1.jar -a 11 -M -v -d -o ./ services.jar 11-hook-services.jar.dex 11core-services.jar.dex
(After that Command you should have 4 files all named classes*.dex)
Bash:
mkdir repack
zip -j repack/services.jar classes*.dex
After that you should have a new services.jar in your repack Folder.
Now You need to open the spoof\_AVDapi30.zip go in /system/framework/ and delete the old services.jar and put your own file in. that's in your repack Folder.
Don't ruin the zip-format of the file tho because otherwise Magisk will cry while install.
After that put your spoof-AVDapi30.zip and your microG\_AVDx86api30\_magiskMaRViN.zip on your Phone and Flash via Magisk.
Reboot and you hopefully have Signature spoofig working. If you run in any Problems check out the GitHub Links here. there will be comments that maybe will help.
https://forum.xda-developers.com/t/signature-spoofing-on-unsuported-android-11-r-roms.4214143/
#sigspoof #signature #spoofing #android11 #a11 #r
Guide by bluede-v Will
First of all Flash your ROM and Magisk (you need to download the latest version to get Magisk working on Android 11)
Click on Build number (7x) to enable Developer Options
After that enable ADB-Debugging and Root-ADB-Debugging in your ROM in case of LineageOS go to Setting -> System -> Developer Options
So Lets go this is the more complicated part. but also really easy if you done it once.
I'm using Debian Linux but it should be possible on every OS. In Windows use the Linux Subsystem.
You need to have ADB installed on your System tho.
ADB link: https://adbdownload.com
First of all you need to download this 2 Files:
https://gitlab.com/oF2pks/haystack/-/blob/11-attempt/spoof_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO
https://github.com/microg/GmsCore/files/5652857/microG_AVDx86api30_magiskMaRViN.zip
Rename "spoof\_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO" to "spoof\_AVDapi30.zip"
Next Download this zip: https://gitlab.com/oF2pks/haystack/-/archive/11-attempt/haystack-11-attempt.zip
Also download this jar file: https://github.com/DexPatcher/dexpatcher-tool/releases/download/v1.8.0-beta1/dexpatcher-1.8.0-beta1.jar
So now unzip the haystack-11-attempt.zip and put the dexpatcher.jar file into to Folder.
This part I use Bash shell in Linux.
Bash:
adb pull /system/framework/services.jar
java -jar dexpatcher-1.8.0-beta1.jar -a 11 -M -v -d -o ./ services.jar 11-hook-services.jar.dex 11core-services.jar.dex
(After that Command you should have 4 files all named classes*.dex)
Bash:
mkdir repack
zip -j repack/services.jar classes*.dex
After that you should have a new services.jar in your repack Folder.
Now You need to open the spoof\_AVDapi30.zip go in /system/framework/ and delete the old services.jar and put your own file in. that's in your repack Folder.
Don't ruin the zip-format of the file tho because otherwise Magisk will cry while install.
After that put your spoof-AVDapi30.zip and your microG\_AVDx86api30\_magiskMaRViN.zip on your Phone and Flash via Magisk.
Reboot and you hopefully have Signature spoofig working. If you run in any Problems check out the GitHub Links here. there will be comments that maybe will help.
https://forum.xda-developers.com/t/signature-spoofing-on-unsuported-android-11-r-roms.4214143/
#sigspoof #signature #spoofing #android11 #a11 #r