Police forcing me to install Jingwang spyware app, how to minimize impact?
Clash Royale CLAN TAG#URR8PPP
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty margin-bottom:0;
up vote
10
down vote
favorite
Chinese police is forcing whole cities to install Android spyware app Jingwang Weishi, stopping people in the street and detaining those who refuse to install it.
Knowing that I may be forced to install it sooner or later, what are my options to prepare against it?
Ideally:
- Make it appear like the app is installed and working as intended,
- without having it actually spy on me.
The app is downloadable and documented, it basically sends the IMEI and other phone metadata, as well as file hashes, to a server. It also monitors messages sent via otherwise secure apps. I don't know whether it includes sophisticated anti-tempering features or not. I can't afford two phones nor two contracts.
encryption android firewalls virtualization spyware
New contributor
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
 |Â
show 1 more comment
up vote
10
down vote
favorite
Chinese police is forcing whole cities to install Android spyware app Jingwang Weishi, stopping people in the street and detaining those who refuse to install it.
Knowing that I may be forced to install it sooner or later, what are my options to prepare against it?
Ideally:
- Make it appear like the app is installed and working as intended,
- without having it actually spy on me.
The app is downloadable and documented, it basically sends the IMEI and other phone metadata, as well as file hashes, to a server. It also monitors messages sent via otherwise secure apps. I don't know whether it includes sophisticated anti-tempering features or not. I can't afford two phones nor two contracts.
encryption android firewalls virtualization spyware
New contributor
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
1
How do police check whether or not the application is installed?
– forest
2 hours ago
@forest: They just take the phone, find the app, open it, and check some status screen, I presume.
– Citizen
2 hours ago
2
Then it is very possible that you could use a dummy program which mimics the interface/behavior of this spyware. Perhaps you could even use the spyware itself, but "crippled" (i.e. use a firewall to prevent it from accessing the internet, assuming its status screen won't give away the fact that it is unable to contact the server).
– forest
1 hour ago
If you have a Xiaomi device, you can install the app in a separate environment as a Dual App. On any device, you may use the Island application, but it may be blocked due to Google Play Services not being available in China. Another possibility, which I recommend, is installing root permissions using Magisk, setting up Magisk Hide and Magisk Manager Hide (just in case), installing the XPosed framework along with the X-Privacy-Lua module. Make sure you have a launcher that lets you somehow make Magisk Manager and any root app invisible. Also see Parallel Space, an Android VM for Android itself.
– alex2003super
17 mins ago
Shot in the dark but the app must have a dns name for the server to contact, maybe you can alter your dns resolution to point it at a server that you control, and redirect the traffic through https to protect your encrypted traffic. I'm not sure how the app verifies the server it's connecting to. Probably easier than modifying the app.
– trogdor
16 mins ago
 |Â
show 1 more comment
up vote
10
down vote
favorite
up vote
10
down vote
favorite
Chinese police is forcing whole cities to install Android spyware app Jingwang Weishi, stopping people in the street and detaining those who refuse to install it.
Knowing that I may be forced to install it sooner or later, what are my options to prepare against it?
Ideally:
- Make it appear like the app is installed and working as intended,
- without having it actually spy on me.
The app is downloadable and documented, it basically sends the IMEI and other phone metadata, as well as file hashes, to a server. It also monitors messages sent via otherwise secure apps. I don't know whether it includes sophisticated anti-tempering features or not. I can't afford two phones nor two contracts.
encryption android firewalls virtualization spyware
New contributor
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Chinese police is forcing whole cities to install Android spyware app Jingwang Weishi, stopping people in the street and detaining those who refuse to install it.
Knowing that I may be forced to install it sooner or later, what are my options to prepare against it?
Ideally:
- Make it appear like the app is installed and working as intended,
- without having it actually spy on me.
The app is downloadable and documented, it basically sends the IMEI and other phone metadata, as well as file hashes, to a server. It also monitors messages sent via otherwise secure apps. I don't know whether it includes sophisticated anti-tempering features or not. I can't afford two phones nor two contracts.
encryption android firewalls virtualization spyware
encryption android firewalls virtualization spyware
New contributor
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
edited 2 hours ago
New contributor
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
asked 2 hours ago
Citizen
514
514
New contributor
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Citizen is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
1
How do police check whether or not the application is installed?
– forest
2 hours ago
@forest: They just take the phone, find the app, open it, and check some status screen, I presume.
– Citizen
2 hours ago
2
Then it is very possible that you could use a dummy program which mimics the interface/behavior of this spyware. Perhaps you could even use the spyware itself, but "crippled" (i.e. use a firewall to prevent it from accessing the internet, assuming its status screen won't give away the fact that it is unable to contact the server).
– forest
1 hour ago
If you have a Xiaomi device, you can install the app in a separate environment as a Dual App. On any device, you may use the Island application, but it may be blocked due to Google Play Services not being available in China. Another possibility, which I recommend, is installing root permissions using Magisk, setting up Magisk Hide and Magisk Manager Hide (just in case), installing the XPosed framework along with the X-Privacy-Lua module. Make sure you have a launcher that lets you somehow make Magisk Manager and any root app invisible. Also see Parallel Space, an Android VM for Android itself.
– alex2003super
17 mins ago
Shot in the dark but the app must have a dns name for the server to contact, maybe you can alter your dns resolution to point it at a server that you control, and redirect the traffic through https to protect your encrypted traffic. I'm not sure how the app verifies the server it's connecting to. Probably easier than modifying the app.
– trogdor
16 mins ago
 |Â
show 1 more comment
1
How do police check whether or not the application is installed?
– forest
2 hours ago
@forest: They just take the phone, find the app, open it, and check some status screen, I presume.
– Citizen
2 hours ago
2
Then it is very possible that you could use a dummy program which mimics the interface/behavior of this spyware. Perhaps you could even use the spyware itself, but "crippled" (i.e. use a firewall to prevent it from accessing the internet, assuming its status screen won't give away the fact that it is unable to contact the server).
– forest
1 hour ago
If you have a Xiaomi device, you can install the app in a separate environment as a Dual App. On any device, you may use the Island application, but it may be blocked due to Google Play Services not being available in China. Another possibility, which I recommend, is installing root permissions using Magisk, setting up Magisk Hide and Magisk Manager Hide (just in case), installing the XPosed framework along with the X-Privacy-Lua module. Make sure you have a launcher that lets you somehow make Magisk Manager and any root app invisible. Also see Parallel Space, an Android VM for Android itself.
– alex2003super
17 mins ago
Shot in the dark but the app must have a dns name for the server to contact, maybe you can alter your dns resolution to point it at a server that you control, and redirect the traffic through https to protect your encrypted traffic. I'm not sure how the app verifies the server it's connecting to. Probably easier than modifying the app.
– trogdor
16 mins ago
1
1
How do police check whether or not the application is installed?
– forest
2 hours ago
How do police check whether or not the application is installed?
– forest
2 hours ago
@forest: They just take the phone, find the app, open it, and check some status screen, I presume.
– Citizen
2 hours ago
@forest: They just take the phone, find the app, open it, and check some status screen, I presume.
– Citizen
2 hours ago
2
2
Then it is very possible that you could use a dummy program which mimics the interface/behavior of this spyware. Perhaps you could even use the spyware itself, but "crippled" (i.e. use a firewall to prevent it from accessing the internet, assuming its status screen won't give away the fact that it is unable to contact the server).
– forest
1 hour ago
Then it is very possible that you could use a dummy program which mimics the interface/behavior of this spyware. Perhaps you could even use the spyware itself, but "crippled" (i.e. use a firewall to prevent it from accessing the internet, assuming its status screen won't give away the fact that it is unable to contact the server).
– forest
1 hour ago
If you have a Xiaomi device, you can install the app in a separate environment as a Dual App. On any device, you may use the Island application, but it may be blocked due to Google Play Services not being available in China. Another possibility, which I recommend, is installing root permissions using Magisk, setting up Magisk Hide and Magisk Manager Hide (just in case), installing the XPosed framework along with the X-Privacy-Lua module. Make sure you have a launcher that lets you somehow make Magisk Manager and any root app invisible. Also see Parallel Space, an Android VM for Android itself.
– alex2003super
17 mins ago
If you have a Xiaomi device, you can install the app in a separate environment as a Dual App. On any device, you may use the Island application, but it may be blocked due to Google Play Services not being available in China. Another possibility, which I recommend, is installing root permissions using Magisk, setting up Magisk Hide and Magisk Manager Hide (just in case), installing the XPosed framework along with the X-Privacy-Lua module. Make sure you have a launcher that lets you somehow make Magisk Manager and any root app invisible. Also see Parallel Space, an Android VM for Android itself.
– alex2003super
17 mins ago
Shot in the dark but the app must have a dns name for the server to contact, maybe you can alter your dns resolution to point it at a server that you control, and redirect the traffic through https to protect your encrypted traffic. I'm not sure how the app verifies the server it's connecting to. Probably easier than modifying the app.
– trogdor
16 mins ago
Shot in the dark but the app must have a dns name for the server to contact, maybe you can alter your dns resolution to point it at a server that you control, and redirect the traffic through https to protect your encrypted traffic. I'm not sure how the app verifies the server it's connecting to. Probably easier than modifying the app.
– trogdor
16 mins ago
 |Â
show 1 more comment
3 Answers
3
active
oldest
votes
up vote
1
down vote
Due to the nature of the spyware, they will be able to detect any mitigation techniques which will make you a person of interest to them.
I know you said you can't afford two phones but it really is the best advice - why not clean and refurb an older phone if you have one around?
A burner phone doesn't need to be anything special and even better if it isn't a smartphone.
There are certainly ways to defeat this spyware without raising red flags. It's not like the spyware's functionality is particularly secret (or particularly sophisticated).
– forest
2 hours ago
3
Police might not be information security gurus, but they are good at telling if I am hiding something in my other pocket. Then the consequences might be worse.
– Citizen
2 hours ago
add a comment |Â
up vote
0
down vote
This is a very delicate question in my opinion.
First of all, I think you should search for solutions that are already implemented by other people. For instance, what do other people in your case do to prevent the spying activities ?
One possible solution would be to have an “app†in the middle, that analyses the information that is being sent, alters it, and sends it to the same server and port the spyware is trying to connect to.
I read a little bit about the functionality of the app, and the information it gathers is, and I quote from the Wikipedia source you provided :
sent in plaintext
Hence doing some tests and analyzing how the information is gathered, you could, if you have root access to your android phone, redirect the traffic of the spyware app to a process that is running on the background of your android OS. This process would change the data that is going to be sent to the server the spyware is trying to connect to. That way, you can send data that matches other cellphone(maybe, literally faking the data is a bad idea, because that can trigger alarms)
You should also take in consideration any kind of validities that the spyware has implemented so you do not alter them.
Of course this is theoretical, but it is a realistic thing to do. Also, you probably will require knowledge in android programming(mostly in C or java) and I.T.
This approach is stealth, and will not required an uninstall of the spyware app.
I hope that helps :)
add a comment |Â
up vote
-2
down vote
I agree with Doomgoose. Get a burner phone for this. Alternatively get an app called orbit(its tor for smartphones ) it can get you a bit of the privacy you so desire by encrypting your online activities. Another alternative is adding a VPN on top of the equation.
New contributor
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
3
Transport encryption doesn't do any good if the endpoint is compromised.
– AndrolGenhald
41 mins ago
add a comment |Â
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
1
down vote
Due to the nature of the spyware, they will be able to detect any mitigation techniques which will make you a person of interest to them.
I know you said you can't afford two phones but it really is the best advice - why not clean and refurb an older phone if you have one around?
A burner phone doesn't need to be anything special and even better if it isn't a smartphone.
There are certainly ways to defeat this spyware without raising red flags. It's not like the spyware's functionality is particularly secret (or particularly sophisticated).
– forest
2 hours ago
3
Police might not be information security gurus, but they are good at telling if I am hiding something in my other pocket. Then the consequences might be worse.
– Citizen
2 hours ago
add a comment |Â
up vote
1
down vote
Due to the nature of the spyware, they will be able to detect any mitigation techniques which will make you a person of interest to them.
I know you said you can't afford two phones but it really is the best advice - why not clean and refurb an older phone if you have one around?
A burner phone doesn't need to be anything special and even better if it isn't a smartphone.
There are certainly ways to defeat this spyware without raising red flags. It's not like the spyware's functionality is particularly secret (or particularly sophisticated).
– forest
2 hours ago
3
Police might not be information security gurus, but they are good at telling if I am hiding something in my other pocket. Then the consequences might be worse.
– Citizen
2 hours ago
add a comment |Â
up vote
1
down vote
up vote
1
down vote
Due to the nature of the spyware, they will be able to detect any mitigation techniques which will make you a person of interest to them.
I know you said you can't afford two phones but it really is the best advice - why not clean and refurb an older phone if you have one around?
A burner phone doesn't need to be anything special and even better if it isn't a smartphone.
Due to the nature of the spyware, they will be able to detect any mitigation techniques which will make you a person of interest to them.
I know you said you can't afford two phones but it really is the best advice - why not clean and refurb an older phone if you have one around?
A burner phone doesn't need to be anything special and even better if it isn't a smartphone.
answered 2 hours ago


Doomgoose
54028
54028
There are certainly ways to defeat this spyware without raising red flags. It's not like the spyware's functionality is particularly secret (or particularly sophisticated).
– forest
2 hours ago
3
Police might not be information security gurus, but they are good at telling if I am hiding something in my other pocket. Then the consequences might be worse.
– Citizen
2 hours ago
add a comment |Â
There are certainly ways to defeat this spyware without raising red flags. It's not like the spyware's functionality is particularly secret (or particularly sophisticated).
– forest
2 hours ago
3
Police might not be information security gurus, but they are good at telling if I am hiding something in my other pocket. Then the consequences might be worse.
– Citizen
2 hours ago
There are certainly ways to defeat this spyware without raising red flags. It's not like the spyware's functionality is particularly secret (or particularly sophisticated).
– forest
2 hours ago
There are certainly ways to defeat this spyware without raising red flags. It's not like the spyware's functionality is particularly secret (or particularly sophisticated).
– forest
2 hours ago
3
3
Police might not be information security gurus, but they are good at telling if I am hiding something in my other pocket. Then the consequences might be worse.
– Citizen
2 hours ago
Police might not be information security gurus, but they are good at telling if I am hiding something in my other pocket. Then the consequences might be worse.
– Citizen
2 hours ago
add a comment |Â
up vote
0
down vote
This is a very delicate question in my opinion.
First of all, I think you should search for solutions that are already implemented by other people. For instance, what do other people in your case do to prevent the spying activities ?
One possible solution would be to have an “app†in the middle, that analyses the information that is being sent, alters it, and sends it to the same server and port the spyware is trying to connect to.
I read a little bit about the functionality of the app, and the information it gathers is, and I quote from the Wikipedia source you provided :
sent in plaintext
Hence doing some tests and analyzing how the information is gathered, you could, if you have root access to your android phone, redirect the traffic of the spyware app to a process that is running on the background of your android OS. This process would change the data that is going to be sent to the server the spyware is trying to connect to. That way, you can send data that matches other cellphone(maybe, literally faking the data is a bad idea, because that can trigger alarms)
You should also take in consideration any kind of validities that the spyware has implemented so you do not alter them.
Of course this is theoretical, but it is a realistic thing to do. Also, you probably will require knowledge in android programming(mostly in C or java) and I.T.
This approach is stealth, and will not required an uninstall of the spyware app.
I hope that helps :)
add a comment |Â
up vote
0
down vote
This is a very delicate question in my opinion.
First of all, I think you should search for solutions that are already implemented by other people. For instance, what do other people in your case do to prevent the spying activities ?
One possible solution would be to have an “app†in the middle, that analyses the information that is being sent, alters it, and sends it to the same server and port the spyware is trying to connect to.
I read a little bit about the functionality of the app, and the information it gathers is, and I quote from the Wikipedia source you provided :
sent in plaintext
Hence doing some tests and analyzing how the information is gathered, you could, if you have root access to your android phone, redirect the traffic of the spyware app to a process that is running on the background of your android OS. This process would change the data that is going to be sent to the server the spyware is trying to connect to. That way, you can send data that matches other cellphone(maybe, literally faking the data is a bad idea, because that can trigger alarms)
You should also take in consideration any kind of validities that the spyware has implemented so you do not alter them.
Of course this is theoretical, but it is a realistic thing to do. Also, you probably will require knowledge in android programming(mostly in C or java) and I.T.
This approach is stealth, and will not required an uninstall of the spyware app.
I hope that helps :)
add a comment |Â
up vote
0
down vote
up vote
0
down vote
This is a very delicate question in my opinion.
First of all, I think you should search for solutions that are already implemented by other people. For instance, what do other people in your case do to prevent the spying activities ?
One possible solution would be to have an “app†in the middle, that analyses the information that is being sent, alters it, and sends it to the same server and port the spyware is trying to connect to.
I read a little bit about the functionality of the app, and the information it gathers is, and I quote from the Wikipedia source you provided :
sent in plaintext
Hence doing some tests and analyzing how the information is gathered, you could, if you have root access to your android phone, redirect the traffic of the spyware app to a process that is running on the background of your android OS. This process would change the data that is going to be sent to the server the spyware is trying to connect to. That way, you can send data that matches other cellphone(maybe, literally faking the data is a bad idea, because that can trigger alarms)
You should also take in consideration any kind of validities that the spyware has implemented so you do not alter them.
Of course this is theoretical, but it is a realistic thing to do. Also, you probably will require knowledge in android programming(mostly in C or java) and I.T.
This approach is stealth, and will not required an uninstall of the spyware app.
I hope that helps :)
This is a very delicate question in my opinion.
First of all, I think you should search for solutions that are already implemented by other people. For instance, what do other people in your case do to prevent the spying activities ?
One possible solution would be to have an “app†in the middle, that analyses the information that is being sent, alters it, and sends it to the same server and port the spyware is trying to connect to.
I read a little bit about the functionality of the app, and the information it gathers is, and I quote from the Wikipedia source you provided :
sent in plaintext
Hence doing some tests and analyzing how the information is gathered, you could, if you have root access to your android phone, redirect the traffic of the spyware app to a process that is running on the background of your android OS. This process would change the data that is going to be sent to the server the spyware is trying to connect to. That way, you can send data that matches other cellphone(maybe, literally faking the data is a bad idea, because that can trigger alarms)
You should also take in consideration any kind of validities that the spyware has implemented so you do not alter them.
Of course this is theoretical, but it is a realistic thing to do. Also, you probably will require knowledge in android programming(mostly in C or java) and I.T.
This approach is stealth, and will not required an uninstall of the spyware app.
I hope that helps :)
answered 11 mins ago
user7519508
692
692
add a comment |Â
add a comment |Â
up vote
-2
down vote
I agree with Doomgoose. Get a burner phone for this. Alternatively get an app called orbit(its tor for smartphones ) it can get you a bit of the privacy you so desire by encrypting your online activities. Another alternative is adding a VPN on top of the equation.
New contributor
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
3
Transport encryption doesn't do any good if the endpoint is compromised.
– AndrolGenhald
41 mins ago
add a comment |Â
up vote
-2
down vote
I agree with Doomgoose. Get a burner phone for this. Alternatively get an app called orbit(its tor for smartphones ) it can get you a bit of the privacy you so desire by encrypting your online activities. Another alternative is adding a VPN on top of the equation.
New contributor
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
3
Transport encryption doesn't do any good if the endpoint is compromised.
– AndrolGenhald
41 mins ago
add a comment |Â
up vote
-2
down vote
up vote
-2
down vote
I agree with Doomgoose. Get a burner phone for this. Alternatively get an app called orbit(its tor for smartphones ) it can get you a bit of the privacy you so desire by encrypting your online activities. Another alternative is adding a VPN on top of the equation.
New contributor
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
I agree with Doomgoose. Get a burner phone for this. Alternatively get an app called orbit(its tor for smartphones ) it can get you a bit of the privacy you so desire by encrypting your online activities. Another alternative is adding a VPN on top of the equation.
New contributor
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
answered 42 mins ago
Malekr
1
1
New contributor
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Malekr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
3
Transport encryption doesn't do any good if the endpoint is compromised.
– AndrolGenhald
41 mins ago
add a comment |Â
3
Transport encryption doesn't do any good if the endpoint is compromised.
– AndrolGenhald
41 mins ago
3
3
Transport encryption doesn't do any good if the endpoint is compromised.
– AndrolGenhald
41 mins ago
Transport encryption doesn't do any good if the endpoint is compromised.
– AndrolGenhald
41 mins ago
add a comment |Â
Citizen is a new contributor. Be nice, and check out our Code of Conduct.
Citizen is a new contributor. Be nice, and check out our Code of Conduct.
Citizen is a new contributor. Be nice, and check out our Code of Conduct.
Citizen is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f194353%2fpolice-forcing-me-to-install-jingwang-spyware-app-how-to-minimize-impact%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
1
How do police check whether or not the application is installed?
– forest
2 hours ago
@forest: They just take the phone, find the app, open it, and check some status screen, I presume.
– Citizen
2 hours ago
2
Then it is very possible that you could use a dummy program which mimics the interface/behavior of this spyware. Perhaps you could even use the spyware itself, but "crippled" (i.e. use a firewall to prevent it from accessing the internet, assuming its status screen won't give away the fact that it is unable to contact the server).
– forest
1 hour ago
If you have a Xiaomi device, you can install the app in a separate environment as a Dual App. On any device, you may use the Island application, but it may be blocked due to Google Play Services not being available in China. Another possibility, which I recommend, is installing root permissions using Magisk, setting up Magisk Hide and Magisk Manager Hide (just in case), installing the XPosed framework along with the X-Privacy-Lua module. Make sure you have a launcher that lets you somehow make Magisk Manager and any root app invisible. Also see Parallel Space, an Android VM for Android itself.
– alex2003super
17 mins ago
Shot in the dark but the app must have a dns name for the server to contact, maybe you can alter your dns resolution to point it at a server that you control, and redirect the traffic through https to protect your encrypted traffic. I'm not sure how the app verifies the server it's connecting to. Probably easier than modifying the app.
– trogdor
16 mins ago