Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

2025 may patch #532

Open
apppeter1 opened this issue Feb 9, 2025 · 13 comments
Open

2025 may patch #532

apppeter1 opened this issue Feb 9, 2025 · 13 comments

Comments

@apppeter1
Copy link

https://www.reddit.com/r/PoGoAndroidSpoofing/comments/1ikqi3x/2025_strong_integrity_end_of_rooted_devices_end/
This say there will be a patch in 2025 may. Is there a solution?

@DanGLES3
Copy link
Contributor

DanGLES3 commented Feb 9, 2025

https://www.reddit.com/r/PoGoAndroidSpoofing/comments/1ikqi3x/2025_strong_integrity_end_of_rooted_devices_end/ This say there will be a patch in 2025 may. Is there a solution?

The solution is the same as it always been, though now Tricky Store and a valid/private keybox will be mandatory

Play Integrity Fix alone won't get around the new checks as the old device integrity (that just relied on fingerprints) will no longer work

TL;DR New checks

New Basic Integrity = Old Device Integrity

New Device Integrity = Old Strong Integrity

New Strong Integrity = Old Strong but requires the device to have an updated security patch

@apppeter1
Copy link
Author

If I need to buy a tickystore key box, can you tell me where to buy it?

@DanGLES3
Copy link
Contributor

DanGLES3 commented Feb 9, 2025

If I need to buy a tickystore key box, can you tell me where to buy it?

You shouldn't buy keyboxes. Most people that are selling these are not trustworthy and will likely scam you completely or give you a stitched up keybox that won't last

Even if the keybox that they sell you is legitimate, there is no guarantee that they won't sell the same keybox to other people, thus killing it faster

@apppeter1
Copy link
Author

20250209_234949.jpg

20250209_234953.jpg

20250209_234936.jpg

20250209_234932.jpg

20250209_222804.jpg

20250209_222808.jpg

What is my problem? I have to install more module? I have valid keybox

@DanGLES3
Copy link
Contributor

DanGLES3 commented Feb 10, 2025

20250209_234949.jpg

20250209_234953.jpg

20250209_234936.jpg

20250209_234932.jpg

20250209_222804.jpg

20250209_222808.jpg

What is my problem? I have to install more module? I have valid keybox

On the new A13 checks you also need an updated security patch, the latest version of Tricky Store can spoof that, just follow the guide

https://github.com/5ec1cff/TrickyStore#customize-security-patch-level-121

@apppeter1
Copy link
Author

apppeter1 commented Feb 10, 2025

20250210_121247.jpg

20250210_121253.jpg

Is it impossible to pass both at the same time?

@apppeter1
Copy link
Author

20250211_173716.jpg

20250211_173720.jpg

20250211_184004.jpg

20250211_184008.jpg

It's like this right now

@icewyvrn
Copy link

how did you fixed it?

@markfm62
Copy link

markfm62 commented Feb 14, 2025

Is there a writeup anywhere on how to extract/process a keybox from a beta build?

For example, starting from cheetah_beta-bp11.241210.004-factory-430bc869.zip, which .img/folder_path/file has the necessary information that needs to be pulled, with data then used in a TS .xml file?

Thanks!

@HarriBuh
Copy link

@apppeter1 How did you fix it ?

@kam821
Copy link

kam821 commented Feb 19, 2025

Is there a writeup anywhere on how to extract/process a keybox from a beta build?

For example, starting from cheetah_beta-bp11.241210.004-factory-430bc869.zip, which .img/folder_path/file has the necessary information that needs to be pulled, with data then used in a TS .xml file?

Thanks!

No, you can't take the keybox out of the beta build because it's not there.
It's stored inside trusted environment part of the device and was installed there by the manufacturer during the production process and no, you can't take it out.

@markfm62
Copy link

No, you can't take the keybox out of the beta build because it's not there. It's stored inside trusted environment part of the device and was installed there by the manufacturer during the production process and no, you can't take it out.

Thank you for clarifying. I'd run across multiple references to "AOSP sw keybox", had misunderstood that, thought that there might have been something buried in the Beta builds.

@kam821
Copy link

kam821 commented Feb 20, 2025

No, you can't take the keybox out of the beta build because it's not there. It's stored inside trusted environment part of the device and was installed there by the manufacturer during the production process and no, you can't take it out.

Thank you for clarifying. I'd run across multiple references to "AOSP sw keybox", had misunderstood that, thought that there might have been something buried in the Beta builds.

AOSP software attestation keybox is well-known and publicly available.
You can find it e.g. in the Tricky Store module zip as TS uses it by default.
However, this keybox does not provide STRONG attestation result (even legacy) and in combination with the current version of the PlayIntegrityFork - results in the lack of the BASIC A13+ attestation result if com.android.vending is added to the TS target.txt list.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants