com.w2016.sensorfilter
com.w2016.sensorfilter copied to clipboard
Find Xposed
I wrote an app with the same function as you a few days ago. By intercepting sensormanage, or getdefaultsensor or callback function, normal apps can be used, but for apps that detect root, the xposed framework will be exposed. For example, Momo 4.0 1。 In this contradiction, most rogue apps will flash back directly when they detect xposed. They need to use maps scan in HMA to prevent native detection. However, some app blocking maps will also flash back. I hope the author can break through these problems. Thank you.
Sorry, i haven’t learned that before But, could you fake a memory by modifying the kernel?
By modifying some code at the system level, the exposed trace will be detected by native detection and the root will be exposed, resulting in flash back. At present, I prevent shaking by turning off the sensor in the source code of service call sensormanager.