Is it possible to pass device integrity?
Hello, I updated microg to 0.3.6 and play integrity api is working. I'm able to pass "MEETS_BASIC_INTEGRITY" and I'm able to pass safetynet basic and CTS. "Device integrity" is failing. Here is my json output:
{
"requestDetails": {
"requestPackageName": "krypton.tbsafetychecker",
"timestampMillis": "1735052462824",
"nonce": "MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK"
},
"appIntegrity": {
"appRecognitionVerdict": "PLAY_RECOGNIZED",
"packageName": "krypton.tbsafetychecker",
"certificateSha256Digest": [
"3MOpHFrljB1TAwIhKpT8OgKDVTo0Rs0DuovQIunAPwo"
],
"versionCode": "27700361"
},
"deviceIntegrity": {
"deviceRecognitionVerdict": [
"MEETS_BASIC_INTEGRITY"
]
},
"accountDetails": {
"appLicensingVerdict": "UNEVALUATED"
}
}
Adb logcat during integrity test:
12-24 16:01:00.903 8200 8236 I PlayCore: UID: [10105] PID: [8200] IntegrityService : requestIntegrityToken(IntegrityTokenRequest{nonce=MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, cloudProjectNumber=null, network=null})
12-24 16:01:00.904 8200 8466 I PlayCore: UID: [10105] PID: [8200] IntegrityService : Initiate binding to the service.
12-24 16:01:00.905 8200 8200 W DynamiteModule: IDynamite loader version = 2, no high precision latency measurement.
12-24 16:01:00.907 1314 1338 D OomAdjuster: Not killing cached processes
12-24 16:01:00.910 8200 8200 I Ads : Use RequestConfiguration.Builder().setTestDeviceIds(Arrays.asList("48E3EEDE058FBC2CAA45337D7558928D")) to get test ads on this device.
12-24 16:01:00.917 6427 6427 D IntegrityService: onBind
12-24 16:01:00.919 1314 1338 D CompatibilityChangeReporter: Compat change id reported: 161145287; UID 10105; state: ENABLED
12-24 16:01:00.919 1314 2968 D CompatibilityChangeReporter: Compat change id reported: 161145287; UID 10105; state: ENABLED
12-24 16:01:00.924 8200 8704 W DynamiteModule: IDynamite loader version = 2, no high precision latency measurement.
12-24 16:01:00.929 4608 4608 D AdRequestService: onBind: Intent { act=com.google.android.gms.ads.service.START pkg=com.google.android.gms }
12-24 16:01:00.939 8200 8200 I PlayCore: UID: [10105] PID: [8200] IntegrityService : ServiceConnectionImpl.onServiceConnected(ComponentInfo{com.android.vending/com.google.android.finsky.integrityservice.IntegrityService})
12-24 16:01:00.940 8200 8466 I PlayCore: UID: [10105] PID: [8200] IntegrityService : linkToDeath
12-24 16:01:00.940 6427 7408 D IntegrityService: Method (requestIntegrityToken) called
12-24 16:01:00.940 6427 7408 D IntegrityService: requestIntegrityToken(packageName: krypton.tbsafetychecker, nonce: MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, cloudProjectNumber: 0, playCoreVersion: PlayCoreVersion{major=1, minor=4, patch=0})
12-24 16:01:00.942 6427 6427 W IntegrityExtensions: getAuthToken: No Google account found
12-24 16:01:00.942 6427 6427 W IntegrityService: requestIntegrityToken: Got null auth token for type: oauth2:https://www.googleapis.com/auth/googleplay
12-24 16:01:00.942 6427 6427 D IntegrityService: requestIntegrityToken authToken:
12-24 16:01:00.942 6427 7914 D IntegrityService: Running DroidGuard (flow: pia_attest_e1, data: {pkg_key=krypton.tbsafetychecker, vc_key=27700361, nonce_sha256_key=ouZRfTihULxofAe_qc_Yi8PghScs42rm2dgBEFi4UCE, tm_s_key=1735052460, binding_key=<REMOVED>})
12-24 16:01:00.943 6427 7914 D GmsClient: connect()
12-24 16:01:00.943 6427 7914 D GmsMultiConKeeper: bind(com.google.android.gms.droidguard.service.START, org.microg.gms.common.GmsClient$GmsServiceConnection@771f22b, false) has=false
12-24 16:01:00.943 6427 7914 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : bind()
12-24 16:01:00.944 6427 7914 D GmsMultiConKeeper: GMS service found for com.google.android.gms.droidguard.service.START
12-24 16:01:00.945 1314 1338 D ConnectivityService: requestNetwork for uid/pid:10105/8200 activeRequest: null callbackRequest: 177 [NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]] callback flags: 0 order: 2147483647
12-24 16:01:00.946 1314 2137 D ConnectivityService: NetReassign [178 : null → 100] [c 1] [a 0] [i 0]
12-24 16:01:00.946 1314 2121 D WifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 2633 2633 D PhoneSwitcherNetworkRequstListener: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 1314 2121 V WifiNetworkFactory: Accepted network request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 1314 2121 D UntrustedWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 1314 2121 D OemPaidWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 1314 2121 D MultiInternetWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 6427 7914 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : bind() : bindService=true
12-24 16:01:00.947 6427 7914 D GmsMultiConKeeper: bind() : bound=true
12-24 16:01:00.947 1314 2137 D ConnectivityService: NetReassign [no changes] [c 0] [a 0] [i 0]
12-24 16:01:00.948 6427 6427 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : ServiceConnection : onServiceConnected(ComponentInfo{com.google.android.gms/org.microg.gms.droidguard.core.DroidGuardService})
12-24 16:01:00.948 6427 6427 D GmsClient: ServiceConnection : onServiceConnected(ComponentInfo{com.google.android.gms/org.microg.gms.droidguard.core.DroidGuardService})
12-24 16:01:00.949 6427 6427 D GmsClient: GmsCallbacks : onPostInitComplete(com.google.android.gms.droidguard.internal.IDroidGuardService$Stub$Proxy@27c4821)
12-24 16:01:00.949 7919 7932 D GmsGuardServiceImpl: getHandle()
12-24 16:01:00.949 7919 7932 D GmsGuardChimera: b[getCallback](com.android.vending)
12-24 16:01:00.949 8200 8207 I tbsafetychecker: Compiler allocated 5561KB to compile void ngapainbang.hq7.<init>(ngapainbang.hp7, ngapainbang.r18, ngapainbang.l9a, ngapainbang.v38, ngapainbang.sx8, ngapainbang.td8, ngapainbang.y48, ngapainbang.oh9, ngapainbang.tj9, ngapainbang.s7a, ngapainbang.r4a, ngapainbang.r3a, ngapainbang.yq7)
12-24 16:01:00.949 7919 7932 D GmsGuardHandleImpl: initWithRequest(pia_attest_e1, DroidGuardResultsRequest[thirdPartyCallerAppPackageName=krypton.tbsafetychecker, openHandles=0, clientVersion=244735000, appArchitecture=aarch64])
12-24 16:01:00.954 4608 4707 D MeasurementService: bound by: GetServiceRequest[MEASUREMENT, packageName="krypton.tbsafetychecker", gmsVersion=12451000, scopes=[], extras=Bundle[{}], defaultFeatures=[], apiFeatures=[], supportsConnectionInfo=true]
12-24 16:01:00.954 4608 4707 D AdRequestService: bound by: GetServiceRequest[ADREQUEST, packageName="krypton.tbsafetychecker", gmsVersion=12451000, scopes=[], extras=Bundle[{}], defaultFeatures=[], apiFeatures=[], supportsConnectionInfo=true]
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 1 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 2 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 3 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 4 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 5 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 6 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 9 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 12 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 13 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 14 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D AdRequestService: getAdRequest
12-24 16:01:00.963 1314 1336 D GrammaticalInflection: The flag must be enabled to allow calling the API.
12-24 16:01:00.963 1314 1336 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 99001; state: DISABLED
12-24 16:01:00.964 1314 1434 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10105; state: ENABLED
12-24 16:01:00.964 8200 8200 D Ads : Not supported
12-24 16:01:00.964 7919 7932 D GmsGuardCallback: b[getAndroidId]() = 4272923741383393086
12-24 16:01:00.964 8200 8200 I Ads : Ad failed to load : 8
12-24 16:01:00.980 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyStore algorithm=AndroidKeyStore
12-24 16:01:00.980 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Init proxy KeyStore SPI
12-24 16:01:00.980 2469 2469 D Zygote : Forked child process 8713
12-24 16:01:00.981 1314 1434 I ActivityManager: Start proc 8713:com.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:1/u0i1 for {krypton.tbsafetychecker/org.chromium.content.app.SandboxedProcessService0:1}
12-24 16:01:00.985 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyPairGenerator algorithm=EC
12-24 16:01:00.987 4608 4707 D SafeParcel: Unknown field id 34 in com.google.android.gms.measurement.internal.AppMetadata, skipping.
12-24 16:01:00.987 4608 4707 D SafeParcel: Unknown field id 36 in com.google.android.gms.measurement.internal.AppMetadata, skipping.
12-24 16:01:00.987 4608 4707 D MeasurementService: sendEvent(com.google.android.gms.measurement.internal.EventParcel@4ac5e) for AppMetadata[krypton.tbsafetychecker]
12-24 16:01:00.987 694 4563 W keystore2: system/security/keystore2/src/remote_provisioning.rs:105 - Error occurred: system/security/keystore2/src/remote_provisioning.rs:138: Trying to get IRPC name.
12-24 16:01:00.987 694 4563 W keystore2:
12-24 16:01:00.987 694 4563 W keystore2: Caused by:
12-24 16:01:00.987 694 4563 W keystore2: 0: system/security/keystore2/src/globals.rs:440
12-24 16:01:00.987 694 4563 W keystore2: 1: Error::Km(r#HARDWARE_TYPE_UNAVAILABLE)
12-24 16:01:00.990 692 704 D DrmLibTime: got the req here! ret=0
12-24 16:01:00.990 692 704 D DrmLibTime: command id, time_cmd_id = 770
12-24 16:01:00.990 692 704 D DrmLibTime: time_getutcsec starts!
12-24 16:01:00.990 692 704 D DrmLibTime: QSEE Time Listener: time_getutcsec
12-24 16:01:00.990 692 704 D DrmLibTime: QSEE Time Listener: get_utc_seconds
12-24 16:01:00.990 692 704 D DrmLibTime: QSEE Time Listener: time_get_modem_time
12-24 16:01:00.990 692 704 D DrmLibTime: QSEE Time Listener: Checking if ATS_MODEM is set or not.
12-24 16:01:00.990 692 704 D QC-time-services: Lib:time_genoff_operation: pargs->base = 13
12-24 16:01:00.990 692 704 D QC-time-services: Lib:time_genoff_operation: pargs->operation = 2
12-24 16:01:00.990 692 704 D QC-time-services: Lib:time_genoff_operation: pargs->ts_val = 0
12-24 16:01:00.991 692 704 D QC-time-services: Lib:time_genoff_operation: Send to server passed!!
12-24 16:01:00.991 983 993 D QC-time-services: Daemon: Connection accepted:time_genoff
12-24 16:01:00.991 983 8716 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 2,value = 0
12-24 16:01:00.991 983 8716 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 2
12-24 16:01:00.991 983 8716 D QC-time-services: offset is: 1 for base: 13
12-24 16:01:00.991 692 704 E QC-time-services: Receive Passed == base = 13, unit = 1, operation = 2, result = 0
12-24 16:01:00.991 692 704 D DrmLibTime: QSEE Time Listener: ATS_MODEM is set. Try to retrieve it.
12-24 16:01:00.992 983 993 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
12-24 16:01:00.992 983 993 D QC-time-services: Daemon: Connection accepted:time_genoff
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 1,value = 0
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 1
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon: genoff get for 13
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Value read from QTimer mseconds = 617629
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Value read from RTC mseconds on boot = 56179596000
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Value read from QTimer mseconds = 617629
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Value read from generic offset = 1678872262636
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Delta read on boot mseconds = 56179581941
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Final Time = 1735052462206
12-24 16:01:00.992 692 704 D DrmLibTime: QSEE Time Listener: Time GenOff - seconds: 1735052462
12-24 16:01:00.992 692 704 D DrmLibTime: time_getutcsec returns 0, sec = 1735052462; nsec = 0
12-24 16:01:00.992 692 704 D DrmLibTime: time_getutcsec finished!
12-24 16:01:00.992 692 704 D DrmLibTime: iotcl_continue_command finished! and return 0
12-24 16:01:00.992 692 704 D DrmLibTime: before calling ioctl to read the next time_cmd
12-24 16:01:00.992 983 993 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
12-24 16:01:00.993 8713 8713 I ocessService0:1: Using CollectorTypeCC GC.
12-24 16:01:00.997 2633 2633 W FeatureConnection: getRegistrationTech: ImsRegistration is null
12-24 16:01:01.004 8713 8713 E ocessService0:1: Not starting debugger since process cannot load the jdwp agent.
12-24 16:01:01.009 8713 8713 D nativeloader: Load libframework-connectivity-tiramisu-jni.so using APEX ns com_android_tethering for caller /apex/com.android.tethering/javalib/framework-connectivity-t.jar: ok
12-24 16:01:01.011 662 662 E KeyMasterHalDevice: Attest key send cmd failed
12-24 16:01:01.012 662 662 E KeyMasterHalDevice: ret: 0
12-24 16:01:01.012 662 662 E KeyMasterHalDevice: resp->status: -10003
12-24 16:01:01.009 0 0 I binder : 8713:8713 ioctl 40046210 ffc7fdfc returned -22
12-24 16:01:01.018 4509 4537 D ForegroundUtils: Foreground UID status:
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 1027 is in foreground: true
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10104 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10105 is in foreground: true
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10159 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10173 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10227 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10235 is in foreground: true
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10241 is in foreground: true
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10242 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10249 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10258 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 1010241 is in foreground: true
12-24 16:01:01.020 694 4563 E keystore2: system/security/keystore2/src/error.rs:200 - system/security/keystore2/src/security_level.rs:623
12-24 16:01:01.020 694 4563 E keystore2:
12-24 16:01:01.020 694 4563 E keystore2: Caused by:
12-24 16:01:01.020 694 4563 E keystore2: 0: system/security/keystore2/src/security_level.rs:621: While generating Key without explicit attestation key.
12-24 16:01:01.020 694 4563 E keystore2: 1: Error::Km(-10003)
12-24 16:01:01.022 8713 8713 D CompatibilityChangeReporter: Compat change id reported: 171979766; UID 99001; state: ENABLED
12-24 16:01:01.022 8713 8713 D CompatibilityChangeReporter: Compat change id reported: 242716250; UID 99001; state: ENABLED
12-24 16:01:01.024 7919 7932 W id.gms.unstable: Accessing hidden method Landroid/security/KeyStoreException;->getErrorCode()I (blocked,test-api, JNI, denied)
12-24 16:01:01.024 7919 7932 W id.gms.unstable: If this is a platform test consider enabling VMRuntime.ALLOW_TEST_API_ACCESS change id for this package.
12-24 16:01:01.025 7919 7932 D GmsGuardCallback: c[getPackageName]() = com.android.vending
12-24 16:01:01.032 0 0 W servicemanager: Isolated app with UID 99001 requested 'network_management', but the service is not allowed for isolated apps.
12-24 16:01:01.041 8713 8713 I cr_WebViewApkApp: version=131.0.6778.81 (677808101) minSdkVersion=26 isBundle=false processName=com.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:1
12-24 16:01:01.044 8713 8713 I cr_ChildProcessService: Creating new ChildProcessService pid=8713
12-24 16:01:01.038 0 0 W servicemanager: Isolated app with UID 99001 requested 'connectivity', but the service is not allowed for isolated apps.
12-24 16:01:01.043 0 0 E SELinux : avc: denied { find } for pid=8713 uid=99001 name=content_capture scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=0
12-24 16:01:01.056 8713 8732 I cr_LibraryLoader: Successfully loaded native library
12-24 16:01:01.057 8713 8732 I cr_CachingUmaRecorder: Flushed 2 samples from 2 histograms, 0 samples were dropped.
12-24 16:01:01.066 8713 8732 W SystemServiceRegistry: No service published for: uimode
12-24 16:01:01.062 0 0 W servicemanager: Isolated app with UID 99001 requested 'uimode', but the service is not allowed for isolated apps.
12-24 16:01:01.076 8713 8732 W chromium: [WARNING:runtime_features.cc(598)] Fenced frames cannot be enabled in this configuration. Use --enable-features=FencedFrames instead.
12-24 16:01:01.076 8713 8732 W chromium: [WARNING:runtime_features.cc(623)] Topics cannot be enabled in this configuration. Use --enable-features=BrowsingTopics in addition.
12-24 16:01:01.076 8713 8732 W chromium: [WARNING:runtime_features.cc(643)] SharedStorage cannot be enabled in this configuration. Use --enable-features=SharedStorageAPI in addition.
12-24 16:01:01.077 8713 8732 W chromium: [WARNING:runtime_features.cc(653)] SharedStorage for M118+ cannot be enabled in this configuration. Use --enable-features=SharedStorageAPI,SharedStorageAPIM118 in addition.
12-24 16:01:01.077 8713 8732 W chromium: [WARNING:runtime_features.cc(675)] AttributionReporting cannot be enabled in this configuration. Use --enable-features=ConversionMeasurement in addition.
12-24 16:01:01.081 1314 1336 D FileUtils: Rounded bytes from 8012386304 to 8000000000
12-24 16:01:01.112 8200 8297 E chromium: [ERROR:ssl_client_socket_impl.cc(878)] handshake failed; returned -1, SSL error code 1, net_error -202
12-24 16:01:01.175 7919 7932 D GmsGuardCallback: b[getAndroidId]() = 4272923741383393086
12-24 16:01:01.363 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyStore algorithm=AndroidKeyStore
12-24 16:01:01.363 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Init proxy KeyStore SPI
12-24 16:01:01.367 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=CertificateFactory algorithm=X.509
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=AlgorithmParameters algorithm=EC
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Proxy key store: get certificate chain
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: dalvik.system.VMStack.getThreadStackTrace(Native Method)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.lang.Thread.getStackTrace(Thread.java:1841)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: b.a.engineGetCertificateChain(SourceFile:1)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.security.KeyStoreSpi.engineGetEntry(KeyStoreSpi.java:513)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.security.KeyStore.getEntry(KeyStore.java:1581)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: com.google.ccc.abuse.droidguard.DroidGuard.initNative(Native Method)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Blocking call
12-24 16:01:01.517 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: QUALCOMM build : 8e5405b, I57aaec3440
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Build Date : 05/21/21
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: OpenGL ES Shader Compiler Version: EV031.32.02.10
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Local Branch : mybranchebba1dbe-451b-f160-ac81-1458d0b52ae8
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Remote Branch : quic/gfx-adreno.lnx.1.0.r135-rel
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Remote Branch : NONE
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Reconstruct Branch : NOTHING
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Build Config : S P 10.0.7 AArch64
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Driver Path : /vendor/lib64/egl/libGLESv2_adreno.so
12-24 16:01:01.520 7919 7932 I AdrenoGLES-0: PFP: 0x016ee190, ME: 0x00000000
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.538 6427 6427 W DroidGuardApiClient: DroidGuardInitReply suggests additional actions in main thread
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[a] = 1
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[b] = [B@31b8607
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[c] = [B@5f86334
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[d] = pia_attest_e1
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[e] = {ParcelFileDescriptor: java.io.FileDescriptor@1520ed2}
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[h] = EA77286092255610BD653E1A63B845FDE2310FA1
12-24 16:01:01.542 7919 7948 D GmsGuardHandleImpl: snapshot({tm_s_key=1735052460, binding_key=<REMOVED>, pkg_key=krypton.tbsafetychecker, vc_key=27700361, nonce_sha256_key=ouZRfTihULxofAe_qc_Yi8PghScs42rm2dgBEFi4UCE})
12-24 16:01:01.792 1314 2121 D WifiClientModeImpl[18186:wlan0]: updateLinkLayerStatsRssiSpeedFrequencyCapabilities rssi=-46 TxLinkspeed=400 freq=5560 RxLinkSpeed=300
12-24 16:01:01.794 1314 2121 D WifiDataStall: tx tput in kbps: 357734
12-24 16:01:01.794 1314 2121 D WifiDataStall: rx tput in kbps: 282421
12-24 16:01:01.861 7919 7948 D GmsGuardHandleImpl: close()
12-24 16:01:01.861 6427 7917 D GmsClient: disconnect()
12-24 16:01:01.861 6427 7917 D GmsMultiConKeeper: unbind(com.google.android.gms.droidguard.service.START, org.microg.gms.common.GmsClient$GmsServiceConnection@771f22b)
12-24 16:01:01.861 6427 7917 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : unbind()
12-24 16:01:01.863 6427 7914 D IntegrityService: Running DroidGuard (flow: pia_attest_e1, droidGuardToken: Cga6oYXM6DbSEFsAAMxJhDkwDjBmAA06E8eGgWWQAJIi0yqypVtzAY08MoPbcsJ2AK7bfnr1zzr6Ac_GdwK746QdAKnHnak7Za2DBV6CVhb6qO81ARvB-909K8_2ARVWM3GYTFYQ2gfpBwDroQgStAnliuwUxKkGJZza22AQ8R4kTpjh0dlw7wWDKRLAkwp7UosW0xNjwciSYZG4Pb5aTILOTduszaHbHgRIVToB_80yrlYqniPerX1o-7KYkWSXs39XtUSyAWdls-xPHqHFNldwtbEBywuBuGN624fLek3eR-U8YIN_v3ikNPA5MokB-7-63fC2wuwqhmW-dnB1JVVyfvzeon0qUml7XKmSI2OrgOioeB98hwQNmPmtkIrsjDSpt3OjTQqaBvNSN3fVY0ZfpPV42w35Lu7IB4dtzvOBH0PfUTmoyvHGDp5ufj_pv_JTb5C4X8gxMEXpa-f2IWjRZjM68EfyxNwyMQ2hhOTS3H4qHcP6hGioCjPHLS1EBOim1XfdkR5pVaSWnKjrFRUeeGqIdVNRNvBZtKs3QUTBPv_1OuACUcT3MnxdZPVKammQi9mLDmcKRtWWy0qanT9Fi1tvDNUE6DlHy0D3FH4Fg0nraAk-SASxL9XuHBJr-hH9DbVIkQ4SHTAbimNEZ1r9Kddd87BDLJBS2L_WRbvf8YEoqep3-KJtv8wCf5pLrgxUsraHfbxJjE8Y5yuH7q_BWSxyp8g9NGiObysN19_qWMlz7Oit_WxhqnDaMw7Dibkeyno0jvUTERWxVFw8R3GfgIPJB4ajvs1DFHnZmPNp3RBrOttbo3-1cLddNd9AoBn-rGekp_Pr29An5RI6Hkob-26p6z4Vy4huSo3k8OOsuOKwkBLiZiqYm5cXN0w1vKK7sse8OqfSI0dPB04hvpL3LO6CXU6rnvrVowrtHEPfzdNAbD0NeadrKWHk_FsqnJZxcDHqeejDWXAmGDq0ytIn-G_x-oSQO4neVu5HkvUn7esitGWaJUVZI0PoztnSxSfTsWzZFikwC7C4VvuUz0Afz-rqV566Q2msjSp1Bzf434X843GhpaGKOJEudmalL2QdYW2GpClUkxL1ZfD6XwRPWXpAxecpTZN3eRPcclKDDnqYktgro5msExq-ihtx0JK5WIRNSg1iQBrQe3vUsDOgd5s8lW-fxAyz2WL4TyHS-QdjgiD0n_dHYmv-USaIbbWCpJPCbe-lY8WTrw2qq5xi361qhy-z4P4uHjKEn0FIwUEZarFVBIcqqPhEUZxBQMUbQJKnDbELBHV1Ob8lMegjsbMtv6nP7OIoX8PhvnxRk7Vd2nMn4U-2BUdNLQOG3xMEIhz-kpnNwiRYYoypkmM6I9Q_UM8BFY-_l5PaOtGF8yckhnM8IGQ0NImIy6ZmOTQCs-5PPrGDeQdfHZPXkpZvlF5lL9Ihm63o4nQhqjR4dABwX50TJU_AosKY2Obq684YOGHQD8Khpvj82a3pIDhrOEuYEqqr-ZXp4dSnMtoNgAHQD4vG1c_Ru6rY9AEST2uM-w4tcX5wCUikCLCZKLlXHHT4jK00MwrKfHQ5Qeg1uVC38ActZCU2Qm2ArJjnZJ4Dn9Qbs8m6ahLRSPBeXxW_sFSirr7wNY_MfCWwK5-qECCXDRqOCwEFci5DlihRtV4bMGCr8kduWoTbK9EO69haIZgSp4nD3v7d8OuoAeIN2iUKBrqhhczoNtIQWwAAzEmEOTAOMGYADToTx4aBZZAAkiLTKrKlW3MBjTwyg9tywnYArtt-evXPOvoBz8Z3ArvjpB0AqcedqTtlrYMFXoJWFvqo7zUBG8H73T0rz_YBFVYzcZhMVhDQD9KigJXqoZPQ7AESwiQ6aalkfar9lXSQqSemNVwQDNw0keQcoWdsE4TNzaOBFAS2LscpIl-FgVqnzr5-Qp7LR0SD80rEdU4rGPFE7GtqZ0ck3exW2-HKtRPq61Z1X6sLEE0_9Zfl6cQTXXDhOR38_DdnY0LYQ7lkzjNr-KIpmNSabU9PKcMkHZziWpLCtQZ7gJUYlW19KkKYUSudLoJ6u8kxZddUxuVvHKe4GMEqRvbYtRG_Y2QIWYtnjNpP3GzGWMk33bsKhV4oEkiVO1HuoceQW55dORgUZH77DL5X6o7HldXHcME1uHczOy_UqgdPn7Jjm3tu32NaazyKPlSSmo8prkRHBtTdtairiOBLmNqD3zF8N1BNR_iGwPyCIUh-XEB3-ochqbznVOnEgIavLdwqrzo8B20hshig6_bfbF_rSiBJq6RBUAIQTgtZxvF4_S_zJxbLCsjrpuCNGkZU3pUC-bWLIsMFp8km5qRkOU1AzcevltqISn7DqQxitVCvCkvGe1AontBspR3D1m8_DvTTTfIEQC3cEElJib8bjdiQNwHptsasYkoaOgu8pyZng0r16XvSnixiVHWlYnmSIWL1i7ETinM1r_7xqtTgq2b1uD5GnPxDsuOfoQwXQu3JUBicaFQDTWWXXe1TyPL5SIaXHF5EMHh50rG3HDCwwzQ1d6tbWIzgeSD6HLA6s4PYk5e8mbMW-m8Wj3M7nOdzdgMOD5ehhGhLf4Q6UQ-TPXwoKlb3vyRBRW9whcgulFz4dV2ciExK-M0Vr_2S2XYBKEVNkFG9FK9tmJ8NyryXfXcX2c6pA67oMd_cj9kA8-FAh5eCWC5ejDcnMM6vv8BVLme2pwbxO3aAQwpG_IVTOfV5tGl-CZm5ceCqnKHA9snC2NF7-DrjndySPTj6CTTc115WmV2b055AzL8Zseguq-NxCmQyyDl_mXbLjcVStkNQRdgYeGHrHvsqrqwQ4PnKgwZVdN1_GUvRPhe4iXB_fogUHuCPxahmNFyvHhltAZqib264gEJ6Qq3d_d4SSneCnw21Uc7hrlmRf1WFNkfZf13K-Yh5gyI7Vz4f45P2RHUtvqQFLMxfTRdcdpNo_FRKr65EyWHFOKmrX7z9schJ_O2ZwaNnWWQaN07YlWLKI9j8e87oT9382EerqRPR2xEOBSvrSQsBdxJmpNmWanc-zEzrZqkqy4WEb0RepfD9Z4Bee6FP9iLnwqxlOnEHePcX4Fmoq56qohCda1ziSLCm3nI3evlzkJ_gbfJK9GmajeQYzu7pEOJeCaMc7WVrs5vHT-Ma6y8laZXX9fErcGwEJ3Hgn9nC68vCrXIV8MYbejZlRCaNG6-8TyxyhlR1KwWkFijFyBBkjs5TKh6c98izQcpO-VyOnvBs0eP9qDT__Bx9X3689sKKSxdY8oNWJPi-6pbo-JHYr5-ECgQ4y-ulvlBY47XKqQRK0Mrmt61CL7jxzEKEmoichbo1U-6Kh3wEmJ6FPv0XYIgQmYMf-1jYT37b3bICc06wxcHZ1ehzkdKYqvop8g5l6HKOVa-P2zZ8gu7IKnB5u99iC7CLtCnxXQIfSWyW7jE12tcGDSf3qcpe5AmNZnwcbPmPNWhLvTBsEVxCULVJQVvpA6g78gQu9_-tECV7kTFfd81EsxSRr1rygpxu21NLEJN5JXjzMCIjilgifxLxmKqvZEe1fkU2ru_5_6T6391-CC3rjSIxHJkU584mf5hEsZ7C-DJf77c8y96MiqLpdiNuXi214r5Tn2UYbOpk6OAZidrH15114EZQCM0fAoiOhEKkSpxo_bOMbppwdcFTB8YKAxUcuEp2SIvMhgYU5S_LeKd5uezT494aXaSop_7FVdDDNRi3hb7qIpOznxpwBmx1BB7HWeVmKdBMQkAoIlUp2z3aA9WQHStl8333XUOXhf28mS-TMQKyMBWRvMkKfYrOGhv71ycv_7yOmF-PAzjHnnv9futl4o-mf48Trap51E06EYZKJvLov7AWoKP-WjYUkoLU4RtsR0odnO_2seu8-AC3maLFlL_hFm1hHb7FDQJATs7-MRPma5Zp2LkHCBUmgynf7sfOTZlNM5i5uNpqBF8tegLcGA_KhGxlBomXRQ_hCpsANKQfmYZNpCEQ0tU
12-24 16:01:01.869 6427 6427 D IntegrityService: requestIntegrityToken integrityRequest: IntegrityRequest{droidGuardTokenRaw=[size=23606 hex=0a06baa185cce836d2105b0000cc498439300e3066000d3a13c786816590009222d32ab2a55b73018d3c3283db72c27600aedb7e7af5cf3afa01cfc67702bbe3…], params=IntegrityParams{packageName=PackageNameWrapper{value_=krypton.tbsafetychecker}, versionCode=VersionCodeWrapper{value_=27700361}, nonce=MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, certificateSha256Digests=[3MOpHFrljB1TAwIhKpT8OgKDVTo0Rs0DuovQIunAPwo], timestampAtRequest=Timestamp{seconds=1735052460, nanos=941000000}}, flowName=pia_attest_e1, playCoreVersion=PlayCoreVersion{major=1, minor=4, patch=0}, playProtectDetails=PlayProtectDetails{state=PLAY_PROTECT_STATE_NO_PROBLEMS}, appAccessRiskDetailsResponse=AppAccessRiskDetailsResponse{installedAppsSignalDataWrapper=InstalledAppsSignalDataWrapper{installedAppsSignalData=.}, screenCaptureSignalDataWrapper=ScreenCaptureSignalDataWrapper{screenCaptureSignalData=.}, screenOverlaySignalDataWrapper=ScreenOverlaySignalDataWrapper{screenOverlaySignalData=.}, accessibilityAbuseSignalDataWrapper=AccessibilityAbuseSignalDataWrapper{}, displayListenerMetadataWrapper=DisplayListenerMetadataWrapper{lastDisplayAddedTimeDelta=Timestamp{seconds=613549617, nanos=160000000}}}}
12-24 16:01:01.877 6427 6427 V VendingRequestHeaders: X-PS-RH: H4sIAAAAAAAA_3WOv07bUBTG7Yii1BIqytRmAlSkqpLt-8fXsYMYTrADbnIdOwSBs0S2uSqYQBSblJiX4A06dOjAxBNUfY6-QueuFUFEqjrwSUfnO2f4fp_yRbk-MAoPlhoxXrK5R_jAo0UWln6Wzv1udOPnEfJzuHFx97ObAfJvI8ydo5IPeog76S13IDRm7ahHA5xkcevsUtB25iXlycE8jfe9CZ84sHd8osKn4ROnX1VWFakm1aXhrrLjghvBuQfhGXSg5fG9DhlOG8W-y53p2PScwxf-xwBJpfoql77Jm8q76lbtDQQENGIgGzENIVqvYGNDqlUS6a18L_-Ulde9KxGMZ4U5qK1M08llfa3nu0H36HADTITpFmmfXxUXpU4bGlvkqMTeJmibtRbjPLug_2yZyYxGgyHj4_8R6MffP7_vHr5-32mGS5i-3NZg5Lrw72piqvc7IdYIXsheFMZ6XxOnVkrSER6R5qwQuZ6LsYgLoV6Isvglf1DeW3b8BDLV2EqwatgWVROR2ipliKWGEJZlWuuVR24UGA_aAQAA
12-24 16:01:01.877 6427 6427 V VendingRequestHeaders: User-Agent: Finsky/37.5.24-29%20%5B0%5D%20%5BPR%5D%20565477504 (api=3,versionCode=244735012,sdk=34,device=OnePlus6T,hardware=qcom,product=OnePlus6T,platformVersionRelease=14,model=ONEPLUS%20A6013,buildId=AP2A.240905.003,isWideScreen=0,supportedAbis=arm64-v8a;armeabi-v7a;armeabi)
12-24 16:01:02.292 6427 6427 D IntegrityService: requestIntegrityToken integrityResponse: IntegrityResponse{contentWrapper=IntegrityContentWrapper{content=IntegrityContent{token=eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JdlS-loZ4Vr4s1LSy-S6pNzbHJaG_F1wYASuNPEA9BWaw2syjVmVMQ.s4jeI2AQJLCD0nnm.HyF-FLHBTOTaJ-v4PuRHyziAh59MKklp5a0BlMp-X5IG6zoxJIT4PBXzVQ0J4wHBqBCHr7GjBJySrTzta56hY6AqxbFsHmTKtOyo0ofbKb_P-2GepZH7vofZeG0lGu62nCJD04w-CySvJ9MFiBZExAleSKbkvJr468cIk00JjdyURvdeQFUhWmJCFD44vZ5sBvltyaf0cIa7cNkE1PAPLaAxU70QySVxrH7niqNS3jBmmdj6MYBlDiSCWy2ACSt2yUk9cvmNAbCcCSOyczB7bSAEBhcKomQWBjHNxq_PqoAQ9PtxhlG8fY_c-e35RcAFOjHZWVuOvjvaUJ3S5lc2cyrvxSXvGQ72NXLS-BocR97L3wu6JfKleEJyBxuJEIdwZqP7VFeCprBYA-V3MZaWsjLADtygyROdpAsuwC7WOWZeWfb4_w6B2PDxpHeAZ0DfUsYZYuZhA81hLhRf_VkFU2wxHML0nqq8m8sGqxii40uxyPHMR-yvsKkqlWN_SqWW0S7ssWejl5-uiKCCp_DAYfYPoM_g8VLULe7sahBpjRqvcJav6i-UhA3KvKay4CsGRPWGlVuc8eTj895zwYkkzjqCh9uG-YUva-TbBeCT1wm83mCxeDXNdSSwO2r-6GolXj_tQ5KyBjbu7DXWQ7GNR9WOHOaZl8mHVw_bx1KUdT42Om-1AIyO8HxAgeZSSTHskZcI6eVkxRPj-X67m3pAqlBQSgqYfBTXpY7A9hCKI_0gc7bp-LrNNqk57FW7qLIkHLIZocNrg-F-pluoIX9_TtIaSZ1kXfCsnaSIlF_6mDW6wQSMaIbIph-8OabvtEHSmTojJobKu8NPWEMz5j4Oq6hPc7fraCwpcpqXp49vTla1erWhtr3nsl-zktMX85g0Q7SInLQsoP38UKTx0Ble49N5sa5upbjLB12ZSOAh5-lQ7wBNPw_DXUUDTSkkIjeVvCwHXaC--4wCe2m9GYyrIuq8rFmkFSiFIry9gZ_qI57gyXhMym14KVSuUMNlEIsnD7tWySSBa_-MkUidZSwBuK4JNHJRYwpDpHAo3xE-O7nk2qymJnR-nUmL3C3kkqY15NL3ckm_jJdXjjjkPueVEExJK9PUfWrzdZJswyAPZQBNKdLd_QoJr-5oQTR2-MRUhNs5bqDky4jqUP5N42C3QeQ9JGsOwGiHJ47yXCiirlabtxMi5PyHlC5JV8iR1bJQCTwAw-wNS7R8yVsKLG-yiNJXKUwps-LGSDhiVENZVjc2JXidGCZfOy-boIn95yGxfH6uzkW4Y31my2gsI8wcGVkZ2Qckk56q_gefy5Zk-7Bym9O6TAtlw0V6sd9RgvehbuuWXZOFK6OBLJb-UHdQ7iuQ4KyFgdBN63x1ueCE2bdIr9b4XTpHLFzfN9LuGeVZKTS01oQajK4OO4utzrcOVid56JIRRzUVeFSKnwmyRncyJMoNinCSPMACxKdz_rjyCIit.EhKA04w4liug2mnrGUFCLw}}}
12-24 16:01:02.292 6427 6427 D IntegrityService: requestIntegrityToken integrityToken: eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JdlS-loZ4Vr4s1LSy-S6pNzbHJaG_F1wYASuNPEA9BWaw2syjVmVMQ.s4jeI2AQJLCD0nnm.HyF-FLHBTOTaJ-v4PuRHyziAh59MKklp5a0BlMp-X5IG6zoxJIT4PBXzVQ0J4wHBqBCHr7GjBJySrTzta56hY6AqxbFsHmTKtOyo0ofbKb_P-2GepZH7vofZeG0lGu62nCJD04w-CySvJ9MFiBZExAleSKbkvJr468cIk00JjdyURvdeQFUhWmJCFD44vZ5sBvltyaf0cIa7cNkE1PAPLaAxU70QySVxrH7niqNS3jBmmdj6MYBlDiSCWy2ACSt2yUk9cvmNAbCcCSOyczB7bSAEBhcKomQWBjHNxq_PqoAQ9PtxhlG8fY_c-e35RcAFOjHZWVuOvjvaUJ3S5lc2cyrvxSXvGQ72NXLS-BocR97L3wu6JfKleEJyBxuJEIdwZqP7VFeCprBYA-V3MZaWsjLADtygyROdpAsuwC7WOWZeWfb4_w6B2PDxpHeAZ0DfUsYZYuZhA81hLhRf_VkFU2wxHML0nqq8m8sGqxii40uxyPHMR-yvsKkqlWN_SqWW0S7ssWejl5-uiKCCp_DAYfYPoM_g8VLULe7sahBpjRqvcJav6i-UhA3KvKay4CsGRPWGlVuc8eTj895zwYkkzjqCh9uG-YUva-TbBeCT1wm83mCxeDXNdSSwO2r-6GolXj_tQ5KyBjbu7DXWQ7GNR9WOHOaZl8mHVw_bx1KUdT42Om-1AIyO8HxAgeZSSTHskZcI6eVkxRPj-X67m3pAqlBQSgqYfBTXpY7A9hCKI_0gc7bp-LrNNqk57FW7qLIkHLIZocNrg-F-pluoIX9_TtIaSZ1kXfCsnaSIlF_6mDW6wQSMaIbIph-8OabvtEHSmTojJobKu8NPWEMz5j4Oq6hPc7fraCwpcpqXp49vTla1erWhtr3nsl-zktMX85g0Q7SInLQsoP38UKTx0Ble49N5sa5upbjLB12ZSOAh5-lQ7wBNPw_DXUUDTSkkIjeVvCwHXaC--4wCe2m9GYyrIuq8rFmkFSiFIry9gZ_qI57gyXhMym14KVSuUMNlEIsnD7tWySSBa_-MkUidZSwBuK4JNHJRYwpDpHAo3xE-O7nk2qymJnR-nUmL3C3kkqY15NL3ckm_jJdXjjjkPueVEExJK9PUfWrzdZJswyAPZQBNKdLd_QoJr-5oQTR2-MRUhNs5bqDky4jqUP5N42C3QeQ9JGsOwGiHJ47yXCiirlabtxMi5PyHlC5JV8iR1bJQCTwAw-wNS7R8yVsKLG-yiNJXKUwps-LGSDhiVENZVjc2JXidGCZfOy-boIn95yGxfH6uzkW4Y31my2gsI8wcGVkZ2Qckk56q_gefy5Zk-7Bym9O6TAtlw0V6sd9RgvehbuuWXZOFK6OBLJb-UHdQ7iuQ4KyFgdBN63x1ueCE2bdIr9b4XTpHLFzfN9LuGeVZKTS01oQajK4OO4utzrcOVid56JIRRzUVeFSKnwmyRncyJMoNinCSPMACxKdz_rjyCIit.EhKA04w4liug2mnrGUFCLw
12-24 16:01:02.294 8200 8213 I PlayCore: UID: [10105] PID: [8200] OnRequestIntegrityTokenCallback : onRequestIntegrityToken
12-24 16:01:02.295 6427 6427 D IntegrityService: requestIntegrityToken() success for krypton.tbsafetychecker)
12-24 16:01:02.300 8200 8466 I PlayCore: UID: [10105] PID: [8200] IntegrityService : Unbind from service.
12-24 16:01:02.302 6427 6427 D IntegrityService: onUnbind
I use following magisk modules: MagiskHide Props Config Systemless Hosts Universal SafetyNet Fix (safetynet-fix-v2.4.0-MOD_1.3-microG)
Is it possible to pass device integrity with microG? What magisk modules are required for this?
https://github.com/daboynb/playcurlNEXT?tab=readme-ov-file#recommended-setups
Thanks, It worked.
Thanks, It worked.
You mean you passed "Strong integrity" ?
Device, not strong. For strong you need a valid keybox to spoof the device hardware attestation.
Hey, will all the modules listed here, putting Microg on the deny list enforced, and getting trickystore, I still can't pass more than basic. Any help?
@A-Australian To pass device integrity you only need magisk and these two magisk modules: https://github.com/osm0sis/PlayIntegrityFork https://github.com/daboynb/playcurlNEXT
trickystore is not needed to pass device integrity.
@jurek4321 I have tried those 2 modules, I still only pass basic, any idea why?
Can someone close this issue as you can get device integrity with 0.3.7?
Play Integrity now works for most people, if someone has additional problems please open a more specific ticket.