Users of android ROMs or rooted devices are often unable to use certain apps because they make a request to google to check whether the phone is “safe” or “secure” or whatever wording they use. Is there a way to trick those apps? Pretend to be google, remove/replace the google check, or even intercept the check at runtime and return that “everything is alright”?

Game have been hacked, cracked, or what for ages. It’s surely possible with android apps, isn’t it?

  • @kolorafa
    link
    English
    5
    edit-2
    2 days ago

    Best to buy phones that you can relock your bootloader, from memory I can only think of 2 phone manufacturers that allow that: Fairphone and Pixel phones that allow you to relock bootloader.

    I bought Fairphone 5 with Degoogled /e/ OS from Murena to avoid that annoying cat and mouse game. I bought from murena website to get my phone already with degoogled firmware flashed.

    In my case bootloader is locked with google attestation so 99,9% apps works, including Banks apps with TAP to pay. Bank payments that dont use google pay but implent NFC directly works (so except for google pay other pay method should work).

    Both my bank apps works with tap to pay, But Your milage may vary.

    Im happy with my phone. Due to all that, not a single app had issues with “valid OS checks” because it actually is valid, it did came directly from seller and never got unlocked/flashed.

    It is locked but I should be able to unlock bootlader, flash different firmware version and lock it back up making the attestation valid again but didn’t do that yet so can’t be 100% sure.

    • blicanteOP
      link
      fedilink
      42 days ago

      /e/ OS and Graphene OS are having trouble with certain banking apps already because “it’s not the original firmware” or something. Some people have reported contacting their banks and explaining how to add exceptions for the specific ROMs, but banks don’t give a fuck.

      I was hoping instead of emulating a “safe” phone, that there would be some way to modify the application for it to never make the safety request.

      • @[email protected]
        link
        fedilink
        English
        21 day ago

        Unfortunately, maintaining hacked forked versions of specific apps is even more time consuming for devs than it is for us to just spoof our security environment on our phones. Popular apps like YouTube have such versions but that’s only because the userbase is there.

        I’ve seen some XDA discussion on hacking apps but you’re actually just learning to become a programmer/hacker at that point. If you have a specific app, and you’re not able to hack it yourself, unfortunately spoofing via Magisk & Tricky Store is the only sustainable way.