60 days with out root, this unhealthy boy lastly get some Magisk love ?? pic.twitter.com/tEG6P0p32x
— John Wu (@topjohnwu) April 19, 2020
According to Magisk creator John Wu’s tweet, preliminary person suggestions from Pixel 2 customers say the brand new Canary construct resulted in a boot loop. Later on, he discovered the replace impacts most Android 10 gadgets. However, Wu has launched a brand new construct aiming to repair the difficulty. Since it is a Canary construct, bugs like these don’t actually come as a shock. The developer ought to hopefully be fixing them within the coming days, adopted by a secure launch afterward.
Pushed new canary construct, try to repair the difficulty. Replaced the outdated hack with one other new hack I got here up with at 5 AM ? https://t.co/sKELYmYOCE
— John Wu (@topjohnwu) April 20, 2020
If you will have a tool working Android 11 and have an interest to check out new Canary builds of Magisk, chances are you’ll obtain them from here. However, do that at your individual threat, because it may end in lack of knowledge, a boot-loop, or worse.
Also in case you’re questioning, the root implementation handed the SafetyNet take a look at, which is required for lots of fee apps, banking apps, and even video games like Pokemon Go to work.
However, Magisk Hide’s superb days is perhaps numbered as a result of current modifications in SafetyNet Attestation API. According to Wu, MagiskHide is now not capable of spoof an unlocked bootloader, whereas the flexibility to cover root standing features usually.
“This new update utilizes hardware-based key attestation. It will send an unmodified keystore certificate to SafetyNet servers, verify its legitimacy, and check certificate extension data to know whether your device have verified boot enabled (bootloader status)”, defined Wu.