Skip to content

(Optional) blacklist modeΒ #18

@paquitopacoto

Description

@paquitopacoto

Hey, @qwq233. Thanks for the great FOSS version. Works really well! πŸ™‚β€β†•οΈ

I was wondering if you'd think about adding some kind of special use_blacklist_mode empty file that would make target.txt work in a reversed way, so that it works on everything by default but we can exclude any apps we need manually. It feels like it would save everyone a few headaches.

Another interesting thing would be to support wildcards.

I don't see any reason to use a static whitelist, feels like they are making the same mistake as with the original root solutions that exposed su by default instead of just giving it to the few apps that need it. Until the recent managers switched it around and made it sane.

There are more and more apps out there, like Revolut, that are starting to check attestation results manually. And soon the list is going to get unwieldy.

com.google.android.gsf
com.google.android.gms
com.android.vending
io.github.vvb2060.keyattestation
io.github.vvb2060.mahoshojo
icu.nullptr.nativetest
com.reveny.vbmetafix.service
com.reveny.nativecheck
com.zhenxi.hunter
io.github.huskydg.memorydetector
me.garfieldhan.holme
com.revolut.revolut
com.revolut.junior

Either way thanks a ton for sharing your version. While I understand the original team issues about contributions and the like I didn't like having closed source modules at this privilege level, and this is a life saver.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions