Skip to content

Signature Spoofing

kurt-by edited this page Jul 16, 2021 · 40 revisions

You need a ROM that supports signature spoofing. Some custom ROMs are patched to support signature spoofing out of the box, however most ROMs will require a patch or a Xposed module. Please ask your ROM developer if unsure.

The following ROMs have out-of-box support for signature spoofing.

  • AospExtended: Must be enabled in Settings > Apps > Advanced (gear icon) > App Permissions > Spoof package signature
  • ArrowOS: microG will ask for Signature Spoofing authorization
  • CalyxOS: Bundled with microG
  • CarbonROM: microG will ask for Signature Spoofing authorization
  • crDroid: microG will ask for Signature Spoofing authorization
  • /e/: Bundled with microG
  • LineageOS for microG: Bundled with microG
  • OmniROM 5: Must be enabled at the bottom of the developer settings first
  • OmniROM 6/7: Must be enabled in Settings > Apps > Advanced (gear icon) > Additional permissions > Spoof signature
  • MarshRom: Must be enabled in Settings > Apps > Advanced (gear icon) > Additional permissions > Spoof signature

Also there is another maintained list of custom ROMs that include the signature spoofing patch.

If you have the Xposed Framework installed, the following module will enable signature spoofing: FakeGApps by thermatk

Xposed solution for android 11 and 12 consists of the magisk modules "Riru" and "Riru - LSPosed" and FakeGApps fork by whew-inc

You can also patch your already-install ROM (up to android 10) by flashing NanoDroid-patcher, without any computer interaction. It will auto-patch every updated ROM.

Finally, if you have Root, but are not using Xposed, you can try patching your already-installed ROM using Needle by moosd (or its fork Tingle by ale5000) or Haystack by Lanchon. Haystack can optionally add a simple UI to control spoofing similar to the one offered by OmniROM 5. Note that all 3 patchers require that the ROM to be patched is not odexed.

If you are a ROM developer or just do custom builds for whatever reason, you can download and include the patch from here. Once you've downloaded the correct patch for your build version, change to the frameworks/base directory of your build tree and run patch -p1 -i "path/to/where/you/saved/the/patch", changing the path to the appropriate path of where you saved the patch file. If it runs without error, your build will have Signature Spoofing enabled.

microG GmsCore tests and diagnoses signature spoofing, but unfortunately it cannot be installed on devices that have Google services. For testing on such devices you can use Signature Spoofing Checker instead.