Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is it possible to pass device integrity? #2700

Open
jurek4321 opened this issue Dec 24, 2024 · 7 comments
Open

Is it possible to pass device integrity? #2700

jurek4321 opened this issue Dec 24, 2024 · 7 comments

Comments

@jurek4321
Copy link

Hello,
I updated microg to 0.3.6 and play integrity api is working.
I'm able to pass "MEETS_BASIC_INTEGRITY" and I'm able to pass safetynet basic and CTS.
"Device integrity" is failing.
Here is my json output:

{
    "requestDetails": {
        "requestPackageName": "krypton.tbsafetychecker",
        "timestampMillis": "1735052462824",
        "nonce": "MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK"
    },
    "appIntegrity": {
        "appRecognitionVerdict": "PLAY_RECOGNIZED",
        "packageName": "krypton.tbsafetychecker",
        "certificateSha256Digest": [
            "3MOpHFrljB1TAwIhKpT8OgKDVTo0Rs0DuovQIunAPwo"
        ],
        "versionCode": "27700361"
    },
    "deviceIntegrity": {
        "deviceRecognitionVerdict": [
            "MEETS_BASIC_INTEGRITY"
        ]
    },
    "accountDetails": {
        "appLicensingVerdict": "UNEVALUATED"
    }
}

Adb logcat during integrity test:

12-24 16:01:00.903  8200  8236 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : requestIntegrityToken(IntegrityTokenRequest{nonce=MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, cloudProjectNumber=null, network=null})
12-24 16:01:00.904  8200  8466 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : Initiate binding to the service.
12-24 16:01:00.905  8200  8200 W DynamiteModule: IDynamite loader version = 2, no high precision latency measurement.
12-24 16:01:00.907  1314  1338 D OomAdjuster: Not killing cached processes
12-24 16:01:00.910  8200  8200 I Ads     : Use RequestConfiguration.Builder().setTestDeviceIds(Arrays.asList("48E3EEDE058FBC2CAA45337D7558928D")) to get test ads on this device.
12-24 16:01:00.917  6427  6427 D IntegrityService: onBind
12-24 16:01:00.919  1314  1338 D CompatibilityChangeReporter: Compat change id reported: 161145287; UID 10105; state: ENABLED
12-24 16:01:00.919  1314  2968 D CompatibilityChangeReporter: Compat change id reported: 161145287; UID 10105; state: ENABLED
12-24 16:01:00.924  8200  8704 W DynamiteModule: IDynamite loader version = 2, no high precision latency measurement.
12-24 16:01:00.929  4608  4608 D AdRequestService: onBind: Intent { act=com.google.android.gms.ads.service.START pkg=com.google.android.gms }
12-24 16:01:00.939  8200  8200 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : ServiceConnectionImpl.onServiceConnected(ComponentInfo{com.android.vending/com.google.android.finsky.integrityservice.IntegrityService})
12-24 16:01:00.940  8200  8466 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : linkToDeath
12-24 16:01:00.940  6427  7408 D IntegrityService: Method (requestIntegrityToken) called
12-24 16:01:00.940  6427  7408 D IntegrityService: requestIntegrityToken(packageName: krypton.tbsafetychecker, nonce: MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, cloudProjectNumber: 0, playCoreVersion: PlayCoreVersion{major=1, minor=4, patch=0})
12-24 16:01:00.942  6427  6427 W IntegrityExtensions: getAuthToken: No Google account found
12-24 16:01:00.942  6427  6427 W IntegrityService: requestIntegrityToken: Got null auth token for type: oauth2:https://www.googleapis.com/auth/googleplay
12-24 16:01:00.942  6427  6427 D IntegrityService: requestIntegrityToken authToken: 
12-24 16:01:00.942  6427  7914 D IntegrityService: Running DroidGuard (flow: pia_attest_e1, data: {pkg_key=krypton.tbsafetychecker, vc_key=27700361, nonce_sha256_key=ouZRfTihULxofAe_qc_Yi8PghScs42rm2dgBEFi4UCE, tm_s_key=1735052460, binding_key=<REMOVED>})
12-24 16:01:00.943  6427  7914 D GmsClient: connect()
12-24 16:01:00.943  6427  7914 D GmsMultiConKeeper: bind(com.google.android.gms.droidguard.service.START, org.microg.gms.common.GmsClient$GmsServiceConnection@771f22b, false) has=false
12-24 16:01:00.943  6427  7914 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : bind()
12-24 16:01:00.944  6427  7914 D GmsMultiConKeeper: GMS service found for com.google.android.gms.droidguard.service.START
12-24 16:01:00.945  1314  1338 D ConnectivityService: requestNetwork for uid/pid:10105/8200 activeRequest: null callbackRequest: 177 [NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]] callback flags: 0 order: 2147483647
12-24 16:01:00.946  1314  2137 D ConnectivityService: NetReassign [178 : null → 100] [c 1] [a 0] [i 0]
12-24 16:01:00.946  1314  2121 D WifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  2633  2633 D PhoneSwitcherNetworkRequstListener: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  1314  2121 V WifiNetworkFactory: Accepted network request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  1314  2121 D UntrustedWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  1314  2121 D OemPaidWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  1314  2121 D MultiInternetWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  6427  7914 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) :  bind() : bindService=true
12-24 16:01:00.947  6427  7914 D GmsMultiConKeeper: bind() : bound=true
12-24 16:01:00.947  1314  2137 D ConnectivityService: NetReassign [no changes] [c 0] [a 0] [i 0]
12-24 16:01:00.948  6427  6427 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : ServiceConnection : onServiceConnected(ComponentInfo{com.google.android.gms/org.microg.gms.droidguard.core.DroidGuardService})
12-24 16:01:00.948  6427  6427 D GmsClient: ServiceConnection : onServiceConnected(ComponentInfo{com.google.android.gms/org.microg.gms.droidguard.core.DroidGuardService})
12-24 16:01:00.949  6427  6427 D GmsClient: GmsCallbacks : onPostInitComplete(com.google.android.gms.droidguard.internal.IDroidGuardService$Stub$Proxy@27c4821)
12-24 16:01:00.949  7919  7932 D GmsGuardServiceImpl: getHandle()
12-24 16:01:00.949  7919  7932 D GmsGuardChimera: b[getCallback](com.android.vending)
12-24 16:01:00.949  8200  8207 I tbsafetychecker: Compiler allocated 5561KB to compile void ngapainbang.hq7.<init>(ngapainbang.hp7, ngapainbang.r18, ngapainbang.l9a, ngapainbang.v38, ngapainbang.sx8, ngapainbang.td8, ngapainbang.y48, ngapainbang.oh9, ngapainbang.tj9, ngapainbang.s7a, ngapainbang.r4a, ngapainbang.r3a, ngapainbang.yq7)
12-24 16:01:00.949  7919  7932 D GmsGuardHandleImpl: initWithRequest(pia_attest_e1, DroidGuardResultsRequest[thirdPartyCallerAppPackageName=krypton.tbsafetychecker, openHandles=0, clientVersion=244735000, appArchitecture=aarch64])
12-24 16:01:00.954  4608  4707 D MeasurementService: bound by: GetServiceRequest[MEASUREMENT, packageName="krypton.tbsafetychecker", gmsVersion=12451000, scopes=[], extras=Bundle[{}], defaultFeatures=[], apiFeatures=[], supportsConnectionInfo=true]
12-24 16:01:00.954  4608  4707 D AdRequestService: bound by: GetServiceRequest[ADREQUEST, packageName="krypton.tbsafetychecker", gmsVersion=12451000, scopes=[], extras=Bundle[{}], defaultFeatures=[], apiFeatures=[], supportsConnectionInfo=true]
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 1 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 2 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 3 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 4 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 5 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 6 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 9 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 12 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 13 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 14 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D AdRequestService: getAdRequest
12-24 16:01:00.963  1314  1336 D GrammaticalInflection: The flag must be enabled to allow calling the API.
12-24 16:01:00.963  1314  1336 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 99001; state: DISABLED
12-24 16:01:00.964  1314  1434 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10105; state: ENABLED
12-24 16:01:00.964  8200  8200 D Ads     : Not supported
12-24 16:01:00.964  7919  7932 D GmsGuardCallback: b[getAndroidId]() = 4272923741383393086
12-24 16:01:00.964  8200  8200 I Ads     : Ad failed to load : 8
12-24 16:01:00.980  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyStore algorithm=AndroidKeyStore
12-24 16:01:00.980  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Init proxy KeyStore SPI
12-24 16:01:00.980  2469  2469 D Zygote  : Forked child process 8713
12-24 16:01:00.981  1314  1434 I ActivityManager: Start proc 8713:com.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:1/u0i1 for  {krypton.tbsafetychecker/org.chromium.content.app.SandboxedProcessService0:1}
12-24 16:01:00.985  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyPairGenerator algorithm=EC
12-24 16:01:00.987  4608  4707 D SafeParcel: Unknown field id 34 in com.google.android.gms.measurement.internal.AppMetadata, skipping.
12-24 16:01:00.987  4608  4707 D SafeParcel: Unknown field id 36 in com.google.android.gms.measurement.internal.AppMetadata, skipping.
12-24 16:01:00.987  4608  4707 D MeasurementService: sendEvent(com.google.android.gms.measurement.internal.EventParcel@4ac5e) for AppMetadata[krypton.tbsafetychecker]
12-24 16:01:00.987   694  4563 W keystore2: system/security/keystore2/src/remote_provisioning.rs:105 - Error occurred: system/security/keystore2/src/remote_provisioning.rs:138: Trying to get IRPC name.
12-24 16:01:00.987   694  4563 W keystore2: 
12-24 16:01:00.987   694  4563 W keystore2: Caused by:
12-24 16:01:00.987   694  4563 W keystore2:     0: system/security/keystore2/src/globals.rs:440
12-24 16:01:00.987   694  4563 W keystore2:     1: Error::Km(r#HARDWARE_TYPE_UNAVAILABLE)
12-24 16:01:00.990   692   704 D DrmLibTime: got the req here! ret=0
12-24 16:01:00.990   692   704 D DrmLibTime: command id, time_cmd_id = 770
12-24 16:01:00.990   692   704 D DrmLibTime: time_getutcsec starts!
12-24 16:01:00.990   692   704 D DrmLibTime: QSEE Time Listener: time_getutcsec
12-24 16:01:00.990   692   704 D DrmLibTime: QSEE Time Listener: get_utc_seconds
12-24 16:01:00.990   692   704 D DrmLibTime: QSEE Time Listener: time_get_modem_time
12-24 16:01:00.990   692   704 D DrmLibTime: QSEE Time Listener: Checking if ATS_MODEM is set or not.
12-24 16:01:00.990   692   704 D QC-time-services: Lib:time_genoff_operation: pargs->base = 13
12-24 16:01:00.990   692   704 D QC-time-services: Lib:time_genoff_operation: pargs->operation = 2
12-24 16:01:00.990   692   704 D QC-time-services: Lib:time_genoff_operation: pargs->ts_val = 0
12-24 16:01:00.991   692   704 D QC-time-services: Lib:time_genoff_operation: Send to server  passed!!
12-24 16:01:00.991   983   993 D QC-time-services: Daemon: Connection accepted:time_genoff
12-24 16:01:00.991   983  8716 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 2,value = 0
12-24 16:01:00.991   983  8716 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 2
12-24 16:01:00.991   983  8716 D QC-time-services: offset is: 1 for base: 13
12-24 16:01:00.991   692   704 E QC-time-services: Receive Passed == base = 13, unit = 1, operation = 2, result = 0
12-24 16:01:00.991   692   704 D DrmLibTime: QSEE Time Listener: ATS_MODEM is set. Try to retrieve it.
12-24 16:01:00.992   983   993 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
12-24 16:01:00.992   983   993 D QC-time-services: Daemon: Connection accepted:time_genoff
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 1,value = 0
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 1
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon: genoff get for 13
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Value read from QTimer mseconds = 617629
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Value read from RTC mseconds on boot = 56179596000
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Value read from QTimer mseconds = 617629
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Value read from generic offset = 1678872262636
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Delta read on boot mseconds = 56179581941
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Final Time = 1735052462206
12-24 16:01:00.992   692   704 D DrmLibTime: QSEE Time Listener: Time GenOff - seconds: 1735052462
12-24 16:01:00.992   692   704 D DrmLibTime: time_getutcsec returns 0, sec = 1735052462; nsec = 0
12-24 16:01:00.992   692   704 D DrmLibTime: time_getutcsec finished! 
12-24 16:01:00.992   692   704 D DrmLibTime: iotcl_continue_command finished! and return 0 
12-24 16:01:00.992   692   704 D DrmLibTime: before calling ioctl to read the next time_cmd
12-24 16:01:00.992   983   993 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
12-24 16:01:00.993  8713  8713 I ocessService0:1: Using CollectorTypeCC GC.
12-24 16:01:00.997  2633  2633 W FeatureConnection: getRegistrationTech: ImsRegistration is null
12-24 16:01:01.004  8713  8713 E ocessService0:1: Not starting debugger since process cannot load the jdwp agent.
12-24 16:01:01.009  8713  8713 D nativeloader: Load libframework-connectivity-tiramisu-jni.so using APEX ns com_android_tethering for caller /apex/com.android.tethering/javalib/framework-connectivity-t.jar: ok
12-24 16:01:01.011   662   662 E KeyMasterHalDevice: Attest key send cmd failed
12-24 16:01:01.012   662   662 E KeyMasterHalDevice: ret: 0
12-24 16:01:01.012   662   662 E KeyMasterHalDevice: resp->status: -10003
12-24 16:01:01.009     0     0 I binder  : 8713:8713 ioctl 40046210 ffc7fdfc returned -22
12-24 16:01:01.018  4509  4537 D ForegroundUtils: Foreground UID status:
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 1027 is in foreground: true
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10104 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10105 is in foreground: true
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10159 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10173 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10227 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10235 is in foreground: true
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10241 is in foreground: true
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10242 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10249 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10258 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 1010241 is in foreground: true
12-24 16:01:01.020   694  4563 E keystore2: system/security/keystore2/src/error.rs:200 - system/security/keystore2/src/security_level.rs:623
12-24 16:01:01.020   694  4563 E keystore2: 
12-24 16:01:01.020   694  4563 E keystore2: Caused by:
12-24 16:01:01.020   694  4563 E keystore2:     0: system/security/keystore2/src/security_level.rs:621: While generating Key without explicit attestation key.
12-24 16:01:01.020   694  4563 E keystore2:     1: Error::Km(-10003)
12-24 16:01:01.022  8713  8713 D CompatibilityChangeReporter: Compat change id reported: 171979766; UID 99001; state: ENABLED
12-24 16:01:01.022  8713  8713 D CompatibilityChangeReporter: Compat change id reported: 242716250; UID 99001; state: ENABLED
12-24 16:01:01.024  7919  7932 W id.gms.unstable: Accessing hidden method Landroid/security/KeyStoreException;->getErrorCode()I (blocked,test-api, JNI, denied)
12-24 16:01:01.024  7919  7932 W id.gms.unstable: If this is a platform test consider enabling VMRuntime.ALLOW_TEST_API_ACCESS change id for this package.
12-24 16:01:01.025  7919  7932 D GmsGuardCallback: c[getPackageName]() = com.android.vending
12-24 16:01:01.032     0     0 W servicemanager: Isolated app with UID 99001 requested 'network_management', but the service is not allowed for isolated apps.
12-24 16:01:01.041  8713  8713 I cr_WebViewApkApp: version=131.0.6778.81 (677808101) minSdkVersion=26 isBundle=false processName=com.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:1
12-24 16:01:01.044  8713  8713 I cr_ChildProcessService: Creating new ChildProcessService pid=8713
12-24 16:01:01.038     0     0 W servicemanager: Isolated app with UID 99001 requested 'connectivity', but the service is not allowed for isolated apps.
12-24 16:01:01.043     0     0 E SELinux : avc:  denied  { find } for pid=8713 uid=99001 name=content_capture scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=0
12-24 16:01:01.056  8713  8732 I cr_LibraryLoader: Successfully loaded native library
12-24 16:01:01.057  8713  8732 I cr_CachingUmaRecorder: Flushed 2 samples from 2 histograms, 0 samples were dropped.
12-24 16:01:01.066  8713  8732 W SystemServiceRegistry: No service published for: uimode
12-24 16:01:01.062     0     0 W servicemanager: Isolated app with UID 99001 requested 'uimode', but the service is not allowed for isolated apps.
12-24 16:01:01.076  8713  8732 W chromium: [WARNING:runtime_features.cc(598)] Fenced frames cannot be enabled in this configuration. Use --enable-features=FencedFrames instead.
12-24 16:01:01.076  8713  8732 W chromium: [WARNING:runtime_features.cc(623)] Topics cannot be enabled in this configuration. Use --enable-features=BrowsingTopics in addition.
12-24 16:01:01.076  8713  8732 W chromium: [WARNING:runtime_features.cc(643)] SharedStorage cannot be enabled in this configuration. Use --enable-features=SharedStorageAPI in addition.
12-24 16:01:01.077  8713  8732 W chromium: [WARNING:runtime_features.cc(653)] SharedStorage for M118+ cannot be enabled in this configuration. Use --enable-features=SharedStorageAPI,SharedStorageAPIM118 in addition.
12-24 16:01:01.077  8713  8732 W chromium: [WARNING:runtime_features.cc(675)] AttributionReporting cannot be enabled in this configuration. Use --enable-features=ConversionMeasurement in addition.
12-24 16:01:01.081  1314  1336 D FileUtils: Rounded bytes from 8012386304 to 8000000000
12-24 16:01:01.112  8200  8297 E chromium: [ERROR:ssl_client_socket_impl.cc(878)] handshake failed; returned -1, SSL error code 1, net_error -202
12-24 16:01:01.175  7919  7932 D GmsGuardCallback: b[getAndroidId]() = 4272923741383393086
12-24 16:01:01.363  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyStore algorithm=AndroidKeyStore
12-24 16:01:01.363  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Init proxy KeyStore SPI
12-24 16:01:01.367  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=CertificateFactory algorithm=X.509
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=AlgorithmParameters algorithm=EC
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Proxy key store: get certificate chain
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: dalvik.system.VMStack.getThreadStackTrace(Native Method)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.lang.Thread.getStackTrace(Thread.java:1841)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: b.a.engineGetCertificateChain(SourceFile:1)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.security.KeyStoreSpi.engineGetEntry(KeyStoreSpi.java:513)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.security.KeyStore.getEntry(KeyStore.java:1581)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: com.google.ccc.abuse.droidguard.DroidGuard.initNative(Native Method)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Blocking call
12-24 16:01:01.517  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: QUALCOMM build                   : 8e5405b, I57aaec3440
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Build Date                       : 05/21/21
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: OpenGL ES Shader Compiler Version: EV031.32.02.10
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Local Branch                     : mybranchebba1dbe-451b-f160-ac81-1458d0b52ae8
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Remote Branch                    : quic/gfx-adreno.lnx.1.0.r135-rel
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Remote Branch                    : NONE
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Reconstruct Branch               : NOTHING
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Build Config                     : S P 10.0.7 AArch64
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Driver Path                      : /vendor/lib64/egl/libGLESv2_adreno.so
12-24 16:01:01.520  7919  7932 I AdrenoGLES-0: PFP: 0x016ee190, ME: 0x00000000
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.538  6427  6427 W DroidGuardApiClient: DroidGuardInitReply suggests additional actions in main thread
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[a] = 1
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[b] = [B@31b8607
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[c] = [B@5f86334
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[d] = pia_attest_e1
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[e] = {ParcelFileDescriptor: java.io.FileDescriptor@1520ed2}
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[h] = EA77286092255610BD653E1A63B845FDE2310FA1
12-24 16:01:01.542  7919  7948 D GmsGuardHandleImpl: snapshot({tm_s_key=1735052460, binding_key=<REMOVED>, pkg_key=krypton.tbsafetychecker, vc_key=27700361, nonce_sha256_key=ouZRfTihULxofAe_qc_Yi8PghScs42rm2dgBEFi4UCE})
12-24 16:01:01.792  1314  2121 D WifiClientModeImpl[18186:wlan0]: updateLinkLayerStatsRssiSpeedFrequencyCapabilities rssi=-46 TxLinkspeed=400 freq=5560 RxLinkSpeed=300
12-24 16:01:01.794  1314  2121 D WifiDataStall: tx tput in kbps: 357734
12-24 16:01:01.794  1314  2121 D WifiDataStall: rx tput in kbps: 282421
12-24 16:01:01.861  7919  7948 D GmsGuardHandleImpl: close()
12-24 16:01:01.861  6427  7917 D GmsClient: disconnect()
12-24 16:01:01.861  6427  7917 D GmsMultiConKeeper: unbind(com.google.android.gms.droidguard.service.START, org.microg.gms.common.GmsClient$GmsServiceConnection@771f22b)
12-24 16:01:01.861  6427  7917 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : unbind()
12-24 16:01:01.863  6427  7914 D IntegrityService: Running DroidGuard (flow: pia_attest_e1, droidGuardToken: Cga6oYXM6DbSEFsAAMxJhDkwDjBmAA06E8eGgWWQAJIi0yqypVtzAY08MoPbcsJ2AK7bfnr1zzr6Ac_GdwK746QdAKnHnak7Za2DBV6CVhb6qO81ARvB-909K8_2ARVWM3GYTFYQ2gfpBwDroQgStAnliuwUxKkGJZza22AQ8R4kTpjh0dlw7wWDKRLAkwp7UosW0xNjwciSYZG4Pb5aTILOTduszaHbHgRIVToB_80yrlYqniPerX1o-7KYkWSXs39XtUSyAWdls-xPHqHFNldwtbEBywuBuGN624fLek3eR-U8YIN_v3ikNPA5MokB-7-63fC2wuwqhmW-dnB1JVVyfvzeon0qUml7XKmSI2OrgOioeB98hwQNmPmtkIrsjDSpt3OjTQqaBvNSN3fVY0ZfpPV42w35Lu7IB4dtzvOBH0PfUTmoyvHGDp5ufj_pv_JTb5C4X8gxMEXpa-f2IWjRZjM68EfyxNwyMQ2hhOTS3H4qHcP6hGioCjPHLS1EBOim1XfdkR5pVaSWnKjrFRUeeGqIdVNRNvBZtKs3QUTBPv_1OuACUcT3MnxdZPVKammQi9mLDmcKRtWWy0qanT9Fi1tvDNUE6DlHy0D3FH4Fg0nraAk-SASxL9XuHBJr-hH9DbVIkQ4SHTAbimNEZ1r9Kddd87BDLJBS2L_WRbvf8YEoqep3-KJtv8wCf5pLrgxUsraHfbxJjE8Y5yuH7q_BWSxyp8g9NGiObysN19_qWMlz7Oit_WxhqnDaMw7Dibkeyno0jvUTERWxVFw8R3GfgIPJB4ajvs1DFHnZmPNp3RBrOttbo3-1cLddNd9AoBn-rGekp_Pr29An5RI6Hkob-26p6z4Vy4huSo3k8OOsuOKwkBLiZiqYm5cXN0w1vKK7sse8OqfSI0dPB04hvpL3LO6CXU6rnvrVowrtHEPfzdNAbD0NeadrKWHk_FsqnJZxcDHqeejDWXAmGDq0ytIn-G_x-oSQO4neVu5HkvUn7esitGWaJUVZI0PoztnSxSfTsWzZFikwC7C4VvuUz0Afz-rqV566Q2msjSp1Bzf434X843GhpaGKOJEudmalL2QdYW2GpClUkxL1ZfD6XwRPWXpAxecpTZN3eRPcclKDDnqYktgro5msExq-ihtx0JK5WIRNSg1iQBrQe3vUsDOgd5s8lW-fxAyz2WL4TyHS-QdjgiD0n_dHYmv-USaIbbWCpJPCbe-lY8WTrw2qq5xi361qhy-z4P4uHjKEn0FIwUEZarFVBIcqqPhEUZxBQMUbQJKnDbELBHV1Ob8lMegjsbMtv6nP7OIoX8PhvnxRk7Vd2nMn4U-2BUdNLQOG3xMEIhz-kpnNwiRYYoypkmM6I9Q_UM8BFY-_l5PaOtGF8yckhnM8IGQ0NImIy6ZmOTQCs-5PPrGDeQdfHZPXkpZvlF5lL9Ihm63o4nQhqjR4dABwX50TJU_AosKY2Obq684YOGHQD8Khpvj82a3pIDhrOEuYEqqr-ZXp4dSnMtoNgAHQD4vG1c_Ru6rY9AEST2uM-w4tcX5wCUikCLCZKLlXHHT4jK00MwrKfHQ5Qeg1uVC38ActZCU2Qm2ArJjnZJ4Dn9Qbs8m6ahLRSPBeXxW_sFSirr7wNY_MfCWwK5-qECCXDRqOCwEFci5DlihRtV4bMGCr8kduWoTbK9EO69haIZgSp4nD3v7d8OuoAeIN2iUKBrqhhczoNtIQWwAAzEmEOTAOMGYADToTx4aBZZAAkiLTKrKlW3MBjTwyg9tywnYArtt-evXPOvoBz8Z3ArvjpB0AqcedqTtlrYMFXoJWFvqo7zUBG8H73T0rz_YBFVYzcZhMVhDQD9KigJXqoZPQ7AESwiQ6aalkfar9lXSQqSemNVwQDNw0keQcoWdsE4TNzaOBFAS2LscpIl-FgVqnzr5-Qp7LR0SD80rEdU4rGPFE7GtqZ0ck3exW2-HKtRPq61Z1X6sLEE0_9Zfl6cQTXXDhOR38_DdnY0LYQ7lkzjNr-KIpmNSabU9PKcMkHZziWpLCtQZ7gJUYlW19KkKYUSudLoJ6u8kxZddUxuVvHKe4GMEqRvbYtRG_Y2QIWYtnjNpP3GzGWMk33bsKhV4oEkiVO1HuoceQW55dORgUZH77DL5X6o7HldXHcME1uHczOy_UqgdPn7Jjm3tu32NaazyKPlSSmo8prkRHBtTdtairiOBLmNqD3zF8N1BNR_iGwPyCIUh-XEB3-ochqbznVOnEgIavLdwqrzo8B20hshig6_bfbF_rSiBJq6RBUAIQTgtZxvF4_S_zJxbLCsjrpuCNGkZU3pUC-bWLIsMFp8km5qRkOU1AzcevltqISn7DqQxitVCvCkvGe1AontBspR3D1m8_DvTTTfIEQC3cEElJib8bjdiQNwHptsasYkoaOgu8pyZng0r16XvSnixiVHWlYnmSIWL1i7ETinM1r_7xqtTgq2b1uD5GnPxDsuOfoQwXQu3JUBicaFQDTWWXXe1TyPL5SIaXHF5EMHh50rG3HDCwwzQ1d6tbWIzgeSD6HLA6s4PYk5e8mbMW-m8Wj3M7nOdzdgMOD5ehhGhLf4Q6UQ-TPXwoKlb3vyRBRW9whcgulFz4dV2ciExK-M0Vr_2S2XYBKEVNkFG9FK9tmJ8NyryXfXcX2c6pA67oMd_cj9kA8-FAh5eCWC5ejDcnMM6vv8BVLme2pwbxO3aAQwpG_IVTOfV5tGl-CZm5ceCqnKHA9snC2NF7-DrjndySPTj6CTTc115WmV2b055AzL8Zseguq-NxCmQyyDl_mXbLjcVStkNQRdgYeGHrHvsqrqwQ4PnKgwZVdN1_GUvRPhe4iXB_fogUHuCPxahmNFyvHhltAZqib264gEJ6Qq3d_d4SSneCnw21Uc7hrlmRf1WFNkfZf13K-Yh5gyI7Vz4f45P2RHUtvqQFLMxfTRdcdpNo_FRKr65EyWHFOKmrX7z9schJ_O2ZwaNnWWQaN07YlWLKI9j8e87oT9382EerqRPR2xEOBSvrSQsBdxJmpNmWanc-zEzrZqkqy4WEb0RepfD9Z4Bee6FP9iLnwqxlOnEHePcX4Fmoq56qohCda1ziSLCm3nI3evlzkJ_gbfJK9GmajeQYzu7pEOJeCaMc7WVrs5vHT-Ma6y8laZXX9fErcGwEJ3Hgn9nC68vCrXIV8MYbejZlRCaNG6-8TyxyhlR1KwWkFijFyBBkjs5TKh6c98izQcpO-VyOnvBs0eP9qDT__Bx9X3689sKKSxdY8oNWJPi-6pbo-JHYr5-ECgQ4y-ulvlBY47XKqQRK0Mrmt61CL7jxzEKEmoichbo1U-6Kh3wEmJ6FPv0XYIgQmYMf-1jYT37b3bICc06wxcHZ1ehzkdKYqvop8g5l6HKOVa-P2zZ8gu7IKnB5u99iC7CLtCnxXQIfSWyW7jE12tcGDSf3qcpe5AmNZnwcbPmPNWhLvTBsEVxCULVJQVvpA6g78gQu9_-tECV7kTFfd81EsxSRr1rygpxu21NLEJN5JXjzMCIjilgifxLxmKqvZEe1fkU2ru_5_6T6391-CC3rjSIxHJkU584mf5hEsZ7C-DJf77c8y96MiqLpdiNuXi214r5Tn2UYbOpk6OAZidrH15114EZQCM0fAoiOhEKkSpxo_bOMbppwdcFTB8YKAxUcuEp2SIvMhgYU5S_LeKd5uezT494aXaSop_7FVdDDNRi3hb7qIpOznxpwBmx1BB7HWeVmKdBMQkAoIlUp2z3aA9WQHStl8333XUOXhf28mS-TMQKyMBWRvMkKfYrOGhv71ycv_7yOmF-PAzjHnnv9futl4o-mf48Trap51E06EYZKJvLov7AWoKP-WjYUkoLU4RtsR0odnO_2seu8-AC3maLFlL_hFm1hHb7FDQJATs7-MRPma5Zp2LkHCBUmgynf7sfOTZlNM5i5uNpqBF8tegLcGA_KhGxlBomXRQ_hCpsANKQfmYZNpCEQ0tU
12-24 16:01:01.869  6427  6427 D IntegrityService: requestIntegrityToken integrityRequest: IntegrityRequest{droidGuardTokenRaw=[size=23606 hex=0a06baa185cce836d2105b0000cc498439300e3066000d3a13c786816590009222d32ab2a55b73018d3c3283db72c27600aedb7e7af5cf3afa01cfc67702bbe3…], params=IntegrityParams{packageName=PackageNameWrapper{value_=krypton.tbsafetychecker}, versionCode=VersionCodeWrapper{value_=27700361}, nonce=MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, certificateSha256Digests=[3MOpHFrljB1TAwIhKpT8OgKDVTo0Rs0DuovQIunAPwo], timestampAtRequest=Timestamp{seconds=1735052460, nanos=941000000}}, flowName=pia_attest_e1, playCoreVersion=PlayCoreVersion{major=1, minor=4, patch=0}, playProtectDetails=PlayProtectDetails{state=PLAY_PROTECT_STATE_NO_PROBLEMS}, appAccessRiskDetailsResponse=AppAccessRiskDetailsResponse{installedAppsSignalDataWrapper=InstalledAppsSignalDataWrapper{installedAppsSignalData=.}, screenCaptureSignalDataWrapper=ScreenCaptureSignalDataWrapper{screenCaptureSignalData=.}, screenOverlaySignalDataWrapper=ScreenOverlaySignalDataWrapper{screenOverlaySignalData=.}, accessibilityAbuseSignalDataWrapper=AccessibilityAbuseSignalDataWrapper{}, displayListenerMetadataWrapper=DisplayListenerMetadataWrapper{lastDisplayAddedTimeDelta=Timestamp{seconds=613549617, nanos=160000000}}}}
12-24 16:01:01.877  6427  6427 V VendingRequestHeaders: X-PS-RH: H4sIAAAAAAAA_3WOv07bUBTG7Yii1BIqytRmAlSkqpLt-8fXsYMYTrADbnIdOwSBs0S2uSqYQBSblJiX4A06dOjAxBNUfY6-QueuFUFEqjrwSUfnO2f4fp_yRbk-MAoPlhoxXrK5R_jAo0UWln6Wzv1udOPnEfJzuHFx97ObAfJvI8ydo5IPeog76S13IDRm7ahHA5xkcevsUtB25iXlycE8jfe9CZ84sHd8osKn4ROnX1VWFakm1aXhrrLjghvBuQfhGXSg5fG9DhlOG8W-y53p2PScwxf-xwBJpfoql77Jm8q76lbtDQQENGIgGzENIVqvYGNDqlUS6a18L_-Ulde9KxGMZ4U5qK1M08llfa3nu0H36HADTITpFmmfXxUXpU4bGlvkqMTeJmibtRbjPLug_2yZyYxGgyHj4_8R6MffP7_vHr5-32mGS5i-3NZg5Lrw72piqvc7IdYIXsheFMZ6XxOnVkrSER6R5qwQuZ6LsYgLoV6Isvglf1DeW3b8BDLV2EqwatgWVROR2ipliKWGEJZlWuuVR24UGA_aAQAA
12-24 16:01:01.877  6427  6427 V VendingRequestHeaders: User-Agent: Finsky/37.5.24-29%20%5B0%5D%20%5BPR%5D%20565477504 (api=3,versionCode=244735012,sdk=34,device=OnePlus6T,hardware=qcom,product=OnePlus6T,platformVersionRelease=14,model=ONEPLUS%20A6013,buildId=AP2A.240905.003,isWideScreen=0,supportedAbis=arm64-v8a;armeabi-v7a;armeabi)
12-24 16:01:02.292  6427  6427 D IntegrityService: requestIntegrityToken integrityResponse: IntegrityResponse{contentWrapper=IntegrityContentWrapper{content=IntegrityContent{token=eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JdlS-loZ4Vr4s1LSy-S6pNzbHJaG_F1wYASuNPEA9BWaw2syjVmVMQ.s4jeI2AQJLCD0nnm.HyF-FLHBTOTaJ-v4PuRHyziAh59MKklp5a0BlMp-X5IG6zoxJIT4PBXzVQ0J4wHBqBCHr7GjBJySrTzta56hY6AqxbFsHmTKtOyo0ofbKb_P-2GepZH7vofZeG0lGu62nCJD04w-CySvJ9MFiBZExAleSKbkvJr468cIk00JjdyURvdeQFUhWmJCFD44vZ5sBvltyaf0cIa7cNkE1PAPLaAxU70QySVxrH7niqNS3jBmmdj6MYBlDiSCWy2ACSt2yUk9cvmNAbCcCSOyczB7bSAEBhcKomQWBjHNxq_PqoAQ9PtxhlG8fY_c-e35RcAFOjHZWVuOvjvaUJ3S5lc2cyrvxSXvGQ72NXLS-BocR97L3wu6JfKleEJyBxuJEIdwZqP7VFeCprBYA-V3MZaWsjLADtygyROdpAsuwC7WOWZeWfb4_w6B2PDxpHeAZ0DfUsYZYuZhA81hLhRf_VkFU2wxHML0nqq8m8sGqxii40uxyPHMR-yvsKkqlWN_SqWW0S7ssWejl5-uiKCCp_DAYfYPoM_g8VLULe7sahBpjRqvcJav6i-UhA3KvKay4CsGRPWGlVuc8eTj895zwYkkzjqCh9uG-YUva-TbBeCT1wm83mCxeDXNdSSwO2r-6GolXj_tQ5KyBjbu7DXWQ7GNR9WOHOaZl8mHVw_bx1KUdT42Om-1AIyO8HxAgeZSSTHskZcI6eVkxRPj-X67m3pAqlBQSgqYfBTXpY7A9hCKI_0gc7bp-LrNNqk57FW7qLIkHLIZocNrg-F-pluoIX9_TtIaSZ1kXfCsnaSIlF_6mDW6wQSMaIbIph-8OabvtEHSmTojJobKu8NPWEMz5j4Oq6hPc7fraCwpcpqXp49vTla1erWhtr3nsl-zktMX85g0Q7SInLQsoP38UKTx0Ble49N5sa5upbjLB12ZSOAh5-lQ7wBNPw_DXUUDTSkkIjeVvCwHXaC--4wCe2m9GYyrIuq8rFmkFSiFIry9gZ_qI57gyXhMym14KVSuUMNlEIsnD7tWySSBa_-MkUidZSwBuK4JNHJRYwpDpHAo3xE-O7nk2qymJnR-nUmL3C3kkqY15NL3ckm_jJdXjjjkPueVEExJK9PUfWrzdZJswyAPZQBNKdLd_QoJr-5oQTR2-MRUhNs5bqDky4jqUP5N42C3QeQ9JGsOwGiHJ47yXCiirlabtxMi5PyHlC5JV8iR1bJQCTwAw-wNS7R8yVsKLG-yiNJXKUwps-LGSDhiVENZVjc2JXidGCZfOy-boIn95yGxfH6uzkW4Y31my2gsI8wcGVkZ2Qckk56q_gefy5Zk-7Bym9O6TAtlw0V6sd9RgvehbuuWXZOFK6OBLJb-UHdQ7iuQ4KyFgdBN63x1ueCE2bdIr9b4XTpHLFzfN9LuGeVZKTS01oQajK4OO4utzrcOVid56JIRRzUVeFSKnwmyRncyJMoNinCSPMACxKdz_rjyCIit.EhKA04w4liug2mnrGUFCLw}}}
12-24 16:01:02.292  6427  6427 D IntegrityService: requestIntegrityToken integrityToken: eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JdlS-loZ4Vr4s1LSy-S6pNzbHJaG_F1wYASuNPEA9BWaw2syjVmVMQ.s4jeI2AQJLCD0nnm.HyF-FLHBTOTaJ-v4PuRHyziAh59MKklp5a0BlMp-X5IG6zoxJIT4PBXzVQ0J4wHBqBCHr7GjBJySrTzta56hY6AqxbFsHmTKtOyo0ofbKb_P-2GepZH7vofZeG0lGu62nCJD04w-CySvJ9MFiBZExAleSKbkvJr468cIk00JjdyURvdeQFUhWmJCFD44vZ5sBvltyaf0cIa7cNkE1PAPLaAxU70QySVxrH7niqNS3jBmmdj6MYBlDiSCWy2ACSt2yUk9cvmNAbCcCSOyczB7bSAEBhcKomQWBjHNxq_PqoAQ9PtxhlG8fY_c-e35RcAFOjHZWVuOvjvaUJ3S5lc2cyrvxSXvGQ72NXLS-BocR97L3wu6JfKleEJyBxuJEIdwZqP7VFeCprBYA-V3MZaWsjLADtygyROdpAsuwC7WOWZeWfb4_w6B2PDxpHeAZ0DfUsYZYuZhA81hLhRf_VkFU2wxHML0nqq8m8sGqxii40uxyPHMR-yvsKkqlWN_SqWW0S7ssWejl5-uiKCCp_DAYfYPoM_g8VLULe7sahBpjRqvcJav6i-UhA3KvKay4CsGRPWGlVuc8eTj895zwYkkzjqCh9uG-YUva-TbBeCT1wm83mCxeDXNdSSwO2r-6GolXj_tQ5KyBjbu7DXWQ7GNR9WOHOaZl8mHVw_bx1KUdT42Om-1AIyO8HxAgeZSSTHskZcI6eVkxRPj-X67m3pAqlBQSgqYfBTXpY7A9hCKI_0gc7bp-LrNNqk57FW7qLIkHLIZocNrg-F-pluoIX9_TtIaSZ1kXfCsnaSIlF_6mDW6wQSMaIbIph-8OabvtEHSmTojJobKu8NPWEMz5j4Oq6hPc7fraCwpcpqXp49vTla1erWhtr3nsl-zktMX85g0Q7SInLQsoP38UKTx0Ble49N5sa5upbjLB12ZSOAh5-lQ7wBNPw_DXUUDTSkkIjeVvCwHXaC--4wCe2m9GYyrIuq8rFmkFSiFIry9gZ_qI57gyXhMym14KVSuUMNlEIsnD7tWySSBa_-MkUidZSwBuK4JNHJRYwpDpHAo3xE-O7nk2qymJnR-nUmL3C3kkqY15NL3ckm_jJdXjjjkPueVEExJK9PUfWrzdZJswyAPZQBNKdLd_QoJr-5oQTR2-MRUhNs5bqDky4jqUP5N42C3QeQ9JGsOwGiHJ47yXCiirlabtxMi5PyHlC5JV8iR1bJQCTwAw-wNS7R8yVsKLG-yiNJXKUwps-LGSDhiVENZVjc2JXidGCZfOy-boIn95yGxfH6uzkW4Y31my2gsI8wcGVkZ2Qckk56q_gefy5Zk-7Bym9O6TAtlw0V6sd9RgvehbuuWXZOFK6OBLJb-UHdQ7iuQ4KyFgdBN63x1ueCE2bdIr9b4XTpHLFzfN9LuGeVZKTS01oQajK4OO4utzrcOVid56JIRRzUVeFSKnwmyRncyJMoNinCSPMACxKdz_rjyCIit.EhKA04w4liug2mnrGUFCLw
12-24 16:01:02.294  8200  8213 I PlayCore: UID: [10105]  PID: [8200] OnRequestIntegrityTokenCallback : onRequestIntegrityToken
12-24 16:01:02.295  6427  6427 D IntegrityService: requestIntegrityToken() success for krypton.tbsafetychecker)
12-24 16:01:02.300  8200  8466 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : Unbind from service.
12-24 16:01:02.302  6427  6427 D IntegrityService: onUnbind

I use following magisk modules:
MagiskHide Props Config
Systemless Hosts
Universal SafetyNet Fix (safetynet-fix-v2.4.0-MOD_1.3-microG)

Is it possible to pass device integrity with microG? What magisk modules are required for this?

@Kranzes
Copy link

Kranzes commented Dec 24, 2024

@jurek4321
Copy link
Author

Thanks, It worked.

@freechelmi
Copy link

Thanks, It worked.

You mean you passed "Strong integrity" ?

@Kranzes
Copy link

Kranzes commented Dec 26, 2024

Device, not strong. For strong you need a valid keybox to spoof the device hardware attestation.

@A-Australian
Copy link

Hey, will all the modules listed here, putting Microg on the deny list enforced, and getting trickystore, I still can't pass more than basic. Any help?

@jurek4321
Copy link
Author

@A-Australian
To pass device integrity you only need magisk and these two magisk modules:
https://github.com/osm0sis/PlayIntegrityFork
https://github.com/daboynb/playcurlNEXT

trickystore is not needed to pass device integrity.

@alarmingly
Copy link

@jurek4321 I have tried those 2 modules, I still only pass basic, any idea why?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants