@ -4,7 +4,7 @@ Here you can find instructions on how to manually deodex `services.jar` as prepa
If you want to check beforehand (or afterwards), if your ROM supports Signature Spoofing, use this [tool](https://f-droid.org/de/packages/lanchon.sigspoof.checker/).
## DEODEX
## Pre-Check
If your `/system/framework/services.jar` file contains the file `classes.dex`, you can skip deodexing and start patching right-away, else following theese instructions.
@ -15,7 +15,7 @@ If you can see `/system/framework/oat/[arch]/services.vdex`, where [arch] is the
the instructions are basically simple, though plenty commands:
* connect phone with PC while in TWRP, mount `/system` **read-write**
* get latest `vdexExtractor` (best self-compiled from git)