Privacy + Secure Tech Corner Channel ๐Ÿ›ก๏ธ
89 subscribers
6.65K photos
573 videos
474 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
if you're only booted with an LKM patched img cooked with the WKSU app, your susfs is not fully implemented, and therefore missing valuable hide methods. Complete susfsV2 implementation is provided by fatalcoder and morganWeedman's tireless labor. Thank you, devs.

While you're booted with root:
- Install latest WKSU CI Build apk
- Install Kernel Flasher fork apk
- Use KF to flash your current ROM's stock partition (the one that you used to patch with WKSU) - DONT REBOOT (else fastboot your half-patched img again)
- Immediately flash your device's latest Wild AK3 CI build
- NOW Reboot.
- Re/install mountify or meta-hybrid module, reboot. [meta modules won't allow further module installs until rebooted and it's best to settle this groundwork first anyways.]
- Configure mount manager, reboot. YMMV what settings will work for your setup.
โ€” Mountify, set KSU as umounter
- Re/Install sidex15 susfs module or BRENE module, reboot.
- Configure susfs manager settings. some changes may require reboot. Recommend at least:
- Enable VOLD app isolation
- Enable Hide KSU Loop
- Install ReZygisk or ZGNext module , reboot.
- Install
- ReLSPosed or JingMatrixLSP or LSPIT/internal (caveat emptor, dubious origins)
- PIFinject or PIFfork module
- Treat Wheel (only for Rezygisk),
- reboot.
- Configure PIF
โ€” Spoof Build+Store should be enough unless you're running rom signed with test key
โ€” Set Auto security patch
โ€” Fetch (for inject, GH option is more reliable)
- Install TrickyStore + Addon
- install Key Attestation Demo fork
- open KAD and tap the Root of Trust section, it'll copy your boot hash to clipboard.
- Configure TS :
- Paste your boot hash in the menu option
- Grab valid keybox
- Set security patch to some recent release date for whatever your fingerprint has (alt, PIFinject's auto setting should align with TStore's auto setting.)
- Select
โ€” snitch apps: gms/gsf/vending/w@llet/g.pay
โ€” Detector apps
โ€” other sketchy/whiny apps like:
โ€” bank/finance
โ€” Zuck/Bezos/Gates/Jobs monopoly properties
โ€” any other big tech: NFLX,ZOOM, etc
- Install HMA-OSS apk, enable LSP hook for sys framework. (if it says 'on denylist' then disable umount for that app in WKSU superuser config)
- Install FuseFixer apk, enable LSP hook for media picker
- reboot.
- Config HMA-OSS. Probably the same list you hit with TrickyStore, smash all of those with the inbuilt app+settings presets via bulk configurator.

TL;DR : Live without root, or stop worrying so much about detector maxxing. If your apps are working just be cool.
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from KernelSU Next
So i just fixed a very bad crash issue for KPatch-Next with its minimal rehook when enabled it does a very bad kernel panic or syscalls being broken on the entire system, but it gets back in track after a reboot but yes it will happen again if minimal rehook is toggled again, idk why but this thing came to occur when i removed the need of a superkey, weird.

Well anyways after 5 hours of debugging, testing and several refactors i found out it was a massive buffer overflow memory shitting the device up.

Welp anyways its fixed and im dead.

So i suggest if you want to update for next CI please use a fresh boot/kernel non Kpnext patched to repatch.