Google Updates SafetyNet, Temporary Fix Available for Magisk, Official Update Coming

Google Updates SafetyNet, Temporary Fix Available for Magisk, Official Update Coming

As we all know, the SafetyNet bypassing is a cat and mouse game between Google and the community. It was only last month when Google had previously updated SafetyNet in order to prevent our bypass attempts with applications such as Magisk. XDA Recognized Contributor and Developer topjohnwu was able to quickly put in a fix in their Magisk beta channel, which led to a stable update for the application toward the start of last week.

Google struck back with a new update to SafetyNet over the weekend that was brought to our attention thanks to XDA Member collinjames. This back and forth game between Google and the community will not likely stop until Google restructures the way it performs these checks. topjohnwu wrote about this previously and said that since Magisk is running as root while SafetyNet checks are not, the community will continue to have an advantage here.


This has led many to speculate that Google will indeed switch to a much more difficult method sometime in the future. Whatever the case may be, the latest update breaks Magisk’s current bypass methods because it has been updated to check for a number of properties that Magisk uses. Then last night, XDA Senior Member [email protected] explained what had changed on Google’s end and did some investigating as to why these properties even exist.

You can read more about this explanation here in our Magisk forum. So for a temporary fix, you will either need to use a terminal emulator application on your smartphone, or execute the following commands via ADB

  1. su
  2. resetprop --delete init.svc.magisk_pfs
  3. resetprop --delete init.svc.magisk_pfsd
  4. resetprop --delete init.svc.magisk_service
  5. resetprop --delete persist.magisk.hide

Alternatively, if you are using Magisk’s core mode feature, then you’ll also need to execute this command as well. . .

  1. resetprop --delete ro.magisk.disable

These commands will need to be executed each time you reboot your smartphone or tablet, or you could add all of these to a .sh file inside /magisk/.core/service.d/ so that Magisk will run them on each boot cycle. [email protected] says they’re not aware exactly how this interferes with Magisk’s behavior, so do this at your own risk. Thankfully though, topjohnwu says they’re aware of the issue and that an official fix is coming in the future.


About author

Doug Lynch
Doug Lynch

When I am passionate about something, I go all in and thrive on having my finger on the pulse of what is happening in that industry. This has transitioned over the years from PCs and video games, but for close to a decade now all of my attention has gone toward smartphones and Android.

We are reader supported. External links may earn us a commission.