Looking for a few people to test the Exposure Notifications API of @microg
- Update your microG to http://microg.org/dl/core-en.apk
- Install and set up your local gov corona tracing app https://www.xda-developers.com/google-apple-covid-19-contact-tracing-exposure-notifications-api-app-list-countries/
- Verify that microG settings has Exposure Notifications enabled and shows the app as using it
- When you are in public tomorrow, go to microG settings again and verify that "Collected IDs" shows a higher number
- Report back here with device name and android version+rom
@larma seems like something was wrong with my MicroG setup... I deinstalled it completely and reinstalled via MinMicroG and after that installed the update from above and now it seems to work... let's try in the wilderness today xD
@jcgruenhage @larma @microg
Official download for migration zip
@mase That one also needs to be fixed first. You probably need to manually enable signature spoofing permission (through system settings or adb) for the FakeStore app.
@Kurt Looks like you are running into the same issue as https://github.com/microg/android_packages_apps_GmsCore/issues/1158#issuecomment-688175761 and given you are also using LOS 14.1 this is probably some issue specific to energy saving implementation features in Android 7.1
@larma just installed a moto e2 lte surnia with updated apk. And crDroid nougat. Still collecting after 3 hours.
@larma nougat roms lineageOS crDroid/e/ - on moto condor surnia and Samsung galaxy S3. Still counting with core-en September 9th
@larma Thanks for your work. Does this require signature spoofing to work or do you see a way to build e.g. the german CWA app without signature checks for the play services?
Reason is I'm running GrapheneOS an have installed MicroG manually and don't have root to spoof signatures and I'm getting "GooglePlayServicesUtil: de.rki.coronawarnapp requires Google Play services, but their signature is invalid."
The original CWA app uses the play services client library which requires signature spoofing to communicate with microG.
It would be possible to modify the client library (its bytecode, as it's not open source) to not check for signatures. I also started working on an alternative client library (that doesn't do signature checks), but it's not fit for use yet.
If you just want to get CWA compatible app running without microG, watch out for https://www.coralibre.de/
@juliusssss Install FakeStore app and grant signature spoofing permission to it via system settings.
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!