Android may be a wide-open world compared to iOS, but there are still some things you just can't do on Google'south mobile platform. One of them is capturing screenshots inside apps that prohibit the act — either considering the screen contains sensitive data or content protected past digital rights management. Lucky, then, that we take a trick up our sleeve called rooting! Yes, even in 2020, information technology even so has utility for the people who need it the most. So, if y'all'd like to grab a freezeframe to meme upwardly or spoil a drama series or keep some backup passcodes where you tin hands pull them out, nosotros've got a way (or three) to do that.

In that location are at least a few ways to circumvent screenshot prohibitions in apps. Some that don't piece of work include using a video capture app or using Google Assistant to make a snapshot — the output either gets blocked or distorted, as seen below in Amazon Prime number Video.

We've updated our write-up again to include some solutions that were suggested by people in the comments below — thanks to them for those suggestions! 1 method requires connecting to your calculator, the others will need root.

This is scrcpy. Since writing this article, I have figured out that it'due south a portmanteau of "screen re-create," simply no affair how yous pronounce it, this command prompt programme lets yous mirror, interact with, and record your Android device's screen. In other words, scrcpy has wider uses than only taking screenshots, merely hey, better overkill than underkill, right? Yous tin become the app for Linux, macOS, and Windows from this GitHub page.

Make sure your phone or tablet has USB debugging turned on. Once you've got scrcpy downloaded and exposed, popular open a panel or command prompt from the file'southward location and execute:

scrcpy -r nameyourfile.mp4

Information technology'll record a video of your device's screen in its total resolution. For some installations, you can cease the record session by striking Ctrl+C. Others will demand to disconnect their device. You can configure a raft of aspects such as orientation, framerate, and size with commands that can exist found here.

Of course, you could only not carp and use your computer-based capture tool of choice to take some shots. In this case, the output quality is highly dependent on your monitor, salve for if you're forcing a higher resolution, only y'all can definitely use scrcpy in this manner. If yous're simply picking upwardly a bunch of passwords or login codes — Google Authenticator v5.10 isn't the best example to use, but you're able to utilize the tool on Chrome Incognito tabs unlike about on-device screen recorders — you lot're pretty much fine hither.

Some purposes, though, are a waste product of scrcpy. If yous're on a computer anyways and have a Netflix or Amazon Prime account, you're better off with a screencap your favorite show from a browser instead.

UPDATE: 2021/12/27 09:eighteen EST BY JULES WANG

scrcpy v1.18 and Android 12

It looks similar Android 12 is the cease of the line for scrcpy. Before this year, news came out that the new Bone version has essnetially blocked the artery in which the program allows users to screenshot content from apps that block the action.

In short, the Bone requires a privileged or 'secure' display to show secure content and scrcpy, through adb, was able to create a secure display case on your computer. That's no longer possible on Android 12.

If you want to expend non also much try on your screenshots, consider using scrcpy with an older device.

But what if y'all happen to be watching something and y'all've just got your phone with you? Well, the good news is that information technology's possible to skip around the screenshot security contend. The (slightly) bad news is that you'll have to do some homework in the first identify.

SmaliPatcher (Root, Magisk)

Unlike scrcpy, root methods seek to disable apps from setting FLAG_SECURE, which blocks users from screenshotting or recording content in the starting time place.

This is not a comprehensive tutorial on how to root your device because that'southward not what you lot came to this detail article for (hopefully). The initial process is different from device to device and there are other things we'd want to explain in detail that nosotros tin can't do here for brevity. At that place are probably plenty of manufactures you could search for to aid you out, no matter your expertise or where along in the process you are in.

Here are some convenient links to basic resource if you lot happen to need them:

  • Minimal ADB and Fastboot
  • TWRP recovery device list Magisk download links

From this signal on, though, we're going to presume you have a rooted device.

The proficient affair nigh this method for attaining screenshots where you lot usually can't is that it ultimately works as a Magisk module. Simply while y'all do need to "create" the module yourself, you can practise it in v to 10 minutes with a uncomplicated tool chosen the Smali Patcher courtesy of fOmey, a developer and XDA forums regular — you can check out their full write-up here or get straight to downloading the tool either hither or with this Google Bulldoze mirror link.

Now, we'll have it step by step:

  • Make sure your Android device has USB debugging enabled.
  • Burn upward your ADB tool on your calculator and connect your phone. Make sure your telephone'south recognized past executing:
    adb devices
  • Download and extract SmaliPatcher-0.0.half dozen.7-fOmey@XDA.zip, then run SmaliPatcher.exe

SmaliPatcher requires your computer to have at least 3GB of RAM, .Net Framework four.vii.i or later, Java, and an Android 6.0+ device.

  • At that place are plenty of nifty patches you tin can apply here, just the one that nosotros want hither is Secure flag. Select that checkbox and hit the ADB PATCH button below.
  • The tool volition then generate a patch that will somewhen appear in the same folder as SmaliPatcher.exe named SmaliPatcherModule-0.0.6.7-fOmey@XDA.aught
  • From there, you can sideload it onto your telephone, open Magisk, striking Modules in the side menu, tap the + icon, and select that zip file. And so, reboot the device.
  • Or yous can boot into your recovery and load the zip file through an ADB sideload command.

And we've landed! Despite fOmey'due south disclaimer that some of the tool's patches may non work with Android 10 devices, we were able to brand it happen with our Pocophone F1.

Kim's Convenience / CBC, Netflix

Unfortunately, a number of apps won't fall to this patch — Amazon Prime Video, banking apps, and others still shot-block you — and then your mileage may vary here. But if y'all demand to take hold of a all the same on your phone by any ways necessary, this will be a good bet.

Xposed (Root... and Magisk for some users)

The alternate root route to go is to become the Xposed Framework working on your device — there's a simple module that just disables the system's secure flag.

If yous're however using a device on Android four.0.three to 4.4 (most versions of Ice Foam Sandwich, Jelly Bean, or KitKat), follow the instructions from the official Xposed repository. For users on Android Lollipop, Marshmallow, or Nougat, you'll become your directions from this XDA forums folio.

If you've already got Magisk on your Android Pie or 10 automobile, you just have to obtain a module of a module (don't worry, it'south actually non that hard). You'll need to install the Riru Core framework, the Riru EdXposed module, and and then the EdXposed Installer .apk that will install the ultimate module in question. The above hyperlinks bring you to their corresponding GitHub pages — you can find the commencement ii in Magisk's downloads section or catch the Cadre and the EdXposed module from GitHub and induce via recovery if you'd like.

Once you lot finally have the Framework in identify on your item device, download and install the DisableFlagSecure .apk from the Xposed repo. And then, get to your Xposed or EdXposed installer app, check the modules list and toggle DisableFlagSecure on. Reboot your device and thar she blows!

I won't bore you with more Authenticator and Netflix screenshots because yes, they practice work.

I will share, though, just this blank take hold of from Amazon Prime number Video — unlike the Smali method, y'all can take a screenshot on the app, simply the content volition be blanked out. All the departure in the world, I suppose.

However you do it, we hope you're able to become all the screenshots you demand.

OnePlus broke refresh rate workarounds in OxygenOS 12

Read Next

Almost The Author