Here you can find instructions on how to manually deodex `services.jar` as preparation for Signature Spoofing support.
If you want to check beforehand (or afterwards), if your ROM supports Signature Spoofing, use this [tool](https://f-droid.org/de/packages/lanchon.sigspoof.checker/).
## VDEX
If you can see `/system/framework/oat/[arch]/services.vdex`, where [arch] is the device architecture (arm, arm64, x86 or x86_64), you should follow theese instructions.
@ -10,6 +12,7 @@ the instructions are basically simple, though plenty commands:
* connect phone with PC while in TWRP, mount `/system` **read-write**
* get latest `vdexExtractor` (best self-compiled from git)