Skip to content

Signature Spoofing

Nat Meysenburg edited this page Oct 8, 2018 · 26 revisions

You need a ROM that supports signature spoofing. Some custom ROMs are patched to support signature spoofing out of the box, however most ROMs will require a patch or a Xposed module. Please ask your ROM developer if unsure.

The following ROMs have out-of-box support for signature spoofing.

  • CarbonROM MicroG will ask for Signature Spoofing authorization
  • OmniROM 5 (Must be enabled at the bottom of the developer settings first)
  • OmniROM 6/7 (Must be enabled in Settings>Apps>Advanced(gear icon)>Additional permissions>Spoof signature)
  • MarshRom (Must be enabled in Settings>Apps>Advanced(gear icon)>Additional permissions>Spoof signature)
  • crDroid (Must be enabled in Settings>crDroid Settings>Miscellaneous>Allow signature spoofing. In addition, spoofing permission must be granted to the app: Settings>Apps>Advanced(gear icon)>App permissions>Spoof package signature)
  • AospExtended (Must be enabled in Settings>Apps>Advanced(gear icon)>App Permissions>Spoof package signature)
  • LineageOS bundled with microG

Also there is another maintained list of a custom ROMs that include the signature spoofing patch.

If you have the Xposed Framework installed, the following module will enable signature spoofing: FakeGApps by thermatk

You can also patch your already-install ROM by flashing NanoDroid-patcher, without any computer interaction. It will auto-patch every updated ROM.

Finally, if you have Root, but are not using Xposed, you can try patching your already-installed ROM using Needle by moosd (or its fork Tingle by ale5000) or Haystack by Lanchon. Haystack can optionally add a simple UI to control spoofing similar to the one offered by OmniROM 5. Note that all 3 patchers require that the ROM to be patched is not odexed.

If you are a ROM developer or just do custom builds for whatever reason, you can download and include the patch from here. Once you've downloaded the correct patch for your build version, change to the frameworks/base directory of your build tree and run patch -p1 -i "path/to/where/you/saved/the/patch", changing the path to the appropriate path of where you saved the patch file. If it runs without error, your build will have Signature Spoofing enabled.

microG GmsCore tests and diagnoses signature spoofing, but unfortunately it cannot be installed on devices that have Google services. For testing on such devices you can use Signature Spoofing Checker instead.

You can’t perform that action at this time.