Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add spoofing SELinux in init.qcom.early_boot.sh as part of the /boot patching process #1

Closed
wants to merge 1 commit into from

Conversation

tuandatdavid
Copy link

Well, on the end of the page, there are lines about SELinux spoofing so whatsapp voIP works. But why not do it in style of https://gitlab.com/suborg/8k-boot-patcher/-/commit/7f2da989be8b2834cf1080ec361704a4223977dd.

Well, on the end of the page, there are lines about SELinux spoofing so whatsapp voIP works. But why not do it in style of https://gitlab.com/suborg/8k-boot-patcher/-/commit/7f2da989be8b2834cf1080ec361704a4223977dd
@bmndc bmndc added the enhancement New feature or request label Feb 19, 2024
@bmndc bmndc self-assigned this Feb 19, 2024
@bmndc
Copy link
Owner

bmndc commented Feb 19, 2024

To be honest, while I've done it many times for my own good, I'm grown on the mindset that getting permanent root access to the phone by disabling a module, and then tricking a service into thinking that module was still there, is plain deceitful practice. Especially with WhatsApp: people trust it to become one of the mainstream social messaging apps because of its privacy and security, and rooting the phone should come with the consequence of losing some of its features. Otherwise, people can risk being banned entirely from the service, or have the features to only work half of the time.

Some people, however, prefer options, and for them I did leave a note at the end. It's always nice to have options.

About the changes you made, I think it might be better to incorporate this into the automatic rooting script root.sh with warnings, as what Luxferre had done with 8k-boot-patcher, rather than adding this as a step that people have to do manually.

@bmndc bmndc changed the title add SELinux spoofing right into the init.qcom.early_boot.sh Add spoofing SELinux in init.qcom.early_boot.sh as part of the /boot patching process Feb 19, 2024
@tuandatdavid
Copy link
Author

To be honest, while I've done it many times for my own good, I'm grown on the mindset that getting permanent root access to the phone by disabling a module, and then tricking a service into thinking that module was still there, is plain deceitful practice. Especially with WhatsApp: people trust it to become one of the mainstream social messaging apps because of its privacy and security, and rooting the phone should come with the consequence of losing some of its features. Otherwise, people can risk being banned entirely from the service, or have the features to only work half of the time.

Some people, however, prefer options, and for them I did leave a note at the end. It's always nice to have options.

About the changes you made, I think it might be better to incorporate this into the automatic rooting script root.sh with warnings, as what Luxferre had done with 8k-boot-patcher, rather than adding this as a step that people have to do manually.

Makes sense :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants