In this guide, we will explain to you what exactly is a Target TXT file in Tricky Store and the steps to make full use of the same. While rooting and Google never go hand in hand, but during the initial days, Silicon Valley didn’t out many roadblocks when we tried gaining administrative privileges. However, times have changed now and for the worse, at least for the tech enthusiast.
On one hand, you might argue that they are making the OS more secure by persuading the users away from rooting their devices and advising them to remain in the stock ecosystem. While that’s true. however, the users aren’t doing this unintentionally, they are very well aware of all the risks that these tweaks bring in themselves and are willing to proceed ahead instead of being confined within the walled gardens of an open-source OS [the irony!].
So what exactly are the measures that Google has put in place? Well, initially we had the Safety Net API which has since been depreciated and replaced with the Play Integrity. For the unaware, this test beholds three additional tests, in the form of Basic, Device, and Strong Integrity. Most of the banking and payment only require you to pass the first two tests, which can easily be done by flashing the module.
However, recently we have started getting reports from users that even though they pass the Basic and Device test, they still cannot use the aforementioned apps. The only reason why this is happening is because the apps seem to have started checking the Strong Integrity test as well, which was near about impossible to pass. Well, not anymore.
Using the Tricky Store and an unrevoked keybox XML file, you can now easily pass this test as well. Apart from that, the module also comes with a Target TXT file. So what exactly is this file and how can you use it? Let’s find it out.
What is the Target TXT File in Tricky Store
The Target TXT file in the Tricky Store module allows you to hide the apps from the root. It is a text file in which you need to add the package names for the apps from which you need to hide the root. While there’s no limitation as to how many apps you add to that list, however, you can only add one package name per line. For instance, here’s a target text file for hiding root from various AI features on the Pixel 9 series:
com.google.android.gms io.github.vvb2060.keyattestation io.github.vvb2060.mahoshojo icu.nullptr.nativetest com.google.android.as.oss com.google.android.aicore com.google.android.gms com.google.android.gsf com.google.android.odad com.google.android.aicore com.google.android.as.oss com.google.android.as com.google.android.apps.pixel.creativeassistant com.google.android.apps.pixel.agent com.google.android.apps.weather com.google.android.dialer com.google.android.apps.recorder com.google.android.apps.walletnfcrel com.android.vending com.google.android.apps.privacy.wildlife com.google.android.apps.subscriptions.red
How to Use a Target TXT File in Tricky Store
- To begin with, make sure you pass the Strong, Basic, and Device Integrity Tests.
- Next up, download and install a root-supported file manager app on your device.
- Launch it and go to the root directory. You’ll get a SuperUser request, tap Grant.
- Then head to the below directory. You’ll already see a sample target.txt file there.
data/adb/tricky_store
- You may either edit the existing text file or replace it with the one that you have.
- In case of the former, you need to type in the app package name, one in each line.
- Once that is done, save the changes. Now restart the device and check the results.
So this was all from this guide regarding the Target TXT file for the Tricky Store module. If you have any queries concerning the aforementioned steps, do let us know in the comments. We will get back to you with a solution at the earliest.