- 29 Nov, 2018 6 commits
- 28 Nov, 2018 5 commits
-
-
Oliver Cervera authored
-
Eray Rafet authored
-
Eray Rafet authored
Grammar, spelling and punctuation fixes
-
topjohnwu authored
More information in the Medium Post: https://medium.com/@topjohnwu/from-anime-game-to-android-system-security-vulnerability-9b955a182f20
-
topjohnwu authored
Some devices have broken libc...
-
- 27 Nov, 2018 5 commits
- 26 Nov, 2018 3 commits
- 25 Nov, 2018 3 commits
- 24 Nov, 2018 5 commits
-
-
Ilya Kushnir authored
-
Albert I authored
Signed-off-by:
Albert I <krascgq@outlook.co.id>
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-
- 23 Nov, 2018 2 commits
-
-
topjohnwu authored
Services can name their process name arbitrarily, for instance the service in com.google.android.gms that is responsible for SafetyNet is named com.google.android.gms.unstable. There are many apps out in the wild use dedicated services with special names to detect root, and previously the user is expected to add all of them to the hide list. In this commit, we change from targeting process names to component names. On Android, component names are composed of <pkg>/<cls>. When targeting component names, we can always know what application spawned the new process. This means that if the user adds a package name to the hidelist, MagiskHide can now target ALL possible processes of that specific application. To abide with this change, the default SafetyNet target is now changed from com.google.android.gms.unstable (process name) to com.google.android.gms/.droidguard.DroidGuardService (component name)
-
topjohnwu authored
-
- 20 Nov, 2018 8 commits
-
-
topjohnwu authored
-
topjohnwu authored
Close #786
-
topjohnwu authored
-
topjohnwu authored
-
topjohnwu authored
-
Igor Sorocean authored
-
Nguyễn Trung Hậu authored
-
Rom authored
-
- 18 Nov, 2018 3 commits