This media is not supported in your browser
VIEW IN TELEGRAM
Gonna get blasted and wake up like this
π―2π1π1
Forwarded from The Porkchop Express
Take control of your cortisol by spikemaxxing yourself with personally curated ragebait
π1
Cum Legion 2: Semen Retention Cessation OSINT
Societycats training an army
@societycat can you pick up the tweaker outside my house? He'll be very good at a war cry if you train him
π1
Forwarded from john societycorn must die
my sources say to turn off automatic downloads
Forwarded from Ulveon's channel
https://bsky.app/profile/redteef.bsky.social/post/3mi3ki5tip227
Sorry about repost. Previous page was infested with ads and nagware, bluesky should hopefully be a better reading experience.
Sorry about repost. Previous page was infested with ads and nagware, bluesky should hopefully be a better reading experience.
Forwarded from Ulveon's channel
Ulveon's channel
https://bsky.app/profile/redteef.bsky.social/post/3mi3ki5tip227 Sorry about repost. Previous page was infested with ads and nagware, bluesky should hopefully be a better reading experience.
The post mentions disabling automatic file downloads but it could also be the case that this exploit is triggered sending a string or another kind of push notification. If so, disabling notifications and app background usage (to ensure the app does not wake up in the background and potentially retrieve the exploit code) seems like a good idea too. Also, if you are using 3rd party Telegram forks, well, don't. They are known to lag several versions behind the official Telegram code.
However, knowing mobile phone OS sandboxing, I find it extremely unlikely an app can break out of the sandbox. Check the app permissions too and ensure you have removed all permissions. In such case, the worst thing that could potentially happen is the exploit is able to control other accounts that are logged into the app.
Another possibility is that the exploit affects only Telegram Qt (the desktop version), as desktop operating systems are significantly less protected against exploits and applications are generally not sandboxed
However, knowing mobile phone OS sandboxing, I find it extremely unlikely an app can break out of the sandbox. Check the app permissions too and ensure you have removed all permissions. In such case, the worst thing that could potentially happen is the exploit is able to control other accounts that are logged into the app.
Another possibility is that the exploit affects only Telegram Qt (the desktop version), as desktop operating systems are significantly less protected against exploits and applications are generally not sandboxed
π1
Patiently Awaiting
Brown Bird
Some good smoking songs I recommend
Into the Unknown (feat. Jack Jones)
Over The Garden Wall & The Blasting Company
If you haven't watched otgw please do, it's peak
π1