Cherry Studio
Cherry Studio is a desktop client for Windows, Mac and Linux, which supports many LLM providers, including large cloud services and local models.
Among its main functions is the ability to work with more than 300 pre -designed #AI assistants, the creation of custom assistants, as well as support for various formats of documents, including text, images and office files.
The application offers tools for global search, top management and translating, which significantly improves interaction with the user thanks to the cross -platform and many settings options.
https://github.com/cherryhq/cherry-studio
Cherry Studio is a desktop client for Windows, Mac and Linux, which supports many LLM providers, including large cloud services and local models.
Among its main functions is the ability to work with more than 300 pre -designed #AI assistants, the creation of custom assistants, as well as support for various formats of documents, including text, images and office files.
The application offers tools for global search, top management and translating, which significantly improves interaction with the user thanks to the cross -platform and many settings options.
https://github.com/cherryhq/cherry-studio
GitHub
GitHub - CherryHQ/cherry-studio: AI Agent + Coding Agent + 300+ assistants: agentic AI desktop with autonomous coding, intelligentโฆ
AI Agent + Coding Agent + 300+ assistants: agentic AI desktop with autonomous coding, intelligent automation, and unified access to frontier LLMs. - CherryHQ/cherry-studio
๐16๐3โ2
DisableGoogleAnalytics
https://gitlab.com/adrian.m.miller/disablegoogleanalytics
Attempts To Disable Common Google Analytics And Ads Receivers In All Affected Packages
What it does/How it works:
On 1st run after rebooting after install the module is assuming you want it to disable the listed analytics and ad receivers, so it will:
Wait till boot is completed
Then sleep for 2 minutes
Then test that cpu usage is under 30% before running
It will then disable the analytics and ad receivers as listed below, and log its progress to /sdcard/fixgoogleanalytics.log
Common Analytics And Ad Recievers:
com.google.android.gms.analytics.AnalyticsJobService com.google.android.gms.analytics.CampaignTrackingService com.google.android.gms.measurement.AppMeasurementService com.google.android.gms.measurement.AppMeasurementJobService com.google.android.gms.analytics.AnalyticsReceiver com.google.android.gms.analytics.CampaignTrackingReceiver com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver com.google.android.gms.measurement.AppMeasurementReceiver com.google.android.gms.measurement.AppMeasurementContentProvider com.crashlytics.android.CrashlyticsInitProvider com.google.android.gms.ads.AdActivity com.google.firebase.iid.FirebaseInstanceIdService
Once complete the service.sh script will delete itself
Once that happens any further interaction is purely via the included dga script as a binary in /system/(x)bin
dga takes 2 arguments, disable or enable, though i doubt too many will be looking to enable analytics and ad receivers, unless the disabling has unwanted effects on their system, which is high time to include the usual disclaimer that you run this at your own risk and not even dga enable is garaunteed to undo the changes
Module Installation:
Download from Releases
Install the module via #Magisk app/Fox Magisk Module Manager/MRepo
Reboot
Usage:
After first run optmization has completed, any further interaction is purely via the included dga script as a binary
in /system/(x)bin:
dga takes 2 arguments, disable or enable, though i doubt too many will be looking to enable
analytics and ad receivers, unless the disabling has unwanted effects on their system, which
is high time to include the usual disclaimer that you run this at your own risk and not even
dga enable is garaunteed to undo the changes
Uninstall Note: Uninstalling the module will not reverse the changes, if your intention is to uninstall the module and re-enable the
analytics and ad receivers, please run dga enable first
https://gitlab.com/adrian.m.miller/disablegoogleanalytics
Attempts To Disable Common Google Analytics And Ads Receivers In All Affected Packages
What it does/How it works:
On 1st run after rebooting after install the module is assuming you want it to disable the listed analytics and ad receivers, so it will:
Wait till boot is completed
Then sleep for 2 minutes
Then test that cpu usage is under 30% before running
It will then disable the analytics and ad receivers as listed below, and log its progress to /sdcard/fixgoogleanalytics.log
Common Analytics And Ad Recievers:
com.google.android.gms.analytics.AnalyticsJobService com.google.android.gms.analytics.CampaignTrackingService com.google.android.gms.measurement.AppMeasurementService com.google.android.gms.measurement.AppMeasurementJobService com.google.android.gms.analytics.AnalyticsReceiver com.google.android.gms.analytics.CampaignTrackingReceiver com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver com.google.android.gms.measurement.AppMeasurementReceiver com.google.android.gms.measurement.AppMeasurementContentProvider com.crashlytics.android.CrashlyticsInitProvider com.google.android.gms.ads.AdActivity com.google.firebase.iid.FirebaseInstanceIdService
Once complete the service.sh script will delete itself
Once that happens any further interaction is purely via the included dga script as a binary in /system/(x)bin
dga takes 2 arguments, disable or enable, though i doubt too many will be looking to enable analytics and ad receivers, unless the disabling has unwanted effects on their system, which is high time to include the usual disclaimer that you run this at your own risk and not even dga enable is garaunteed to undo the changes
Module Installation:
Download from Releases
Install the module via #Magisk app/Fox Magisk Module Manager/MRepo
Reboot
Usage:
After first run optmization has completed, any further interaction is purely via the included dga script as a binary
in /system/(x)bin:
dga takes 2 arguments, disable or enable, though i doubt too many will be looking to enable
analytics and ad receivers, unless the disabling has unwanted effects on their system, which
is high time to include the usual disclaimer that you run this at your own risk and not even
dga enable is garaunteed to undo the changes
Uninstall Note: Uninstalling the module will not reverse the changes, if your intention is to uninstall the module and re-enable the
analytics and ad receivers, please run dga enable first
๐6๐ฅ5๐ค1๐1
Tiling Shell
Advanced Window Management for #Linux #gnome desktops
https://extensions.gnome.org/extension/7065/tiling-shell
A GNOME extension for advanced window management. It's highly configurable and offers different ways of tiling and managing your windows. The focus is on delivering the best user experience, highest stability, and full customization.
It also works with multiple monitors (even if they use different scaling), comes with a number of tiling layouts built-in but there is a layout editor to allow you to create and save customs layouts.
Tiling Shell also features the Snap Assistant, borrowed from Windows 11: just move a window to the top with your mouse and the Snap Assistant slides in and you can place the window where you want and how you want.
* Automatic tiling
* Fully customizable keyboard shortcuts to tile, move windows, change focus and more
* You can also move the window to the edge of the screen to tile it
* Right click on the window title to place the window where you want and how you want it
* Coming soon this week, Windows Suggestions: after tiling a window you get suggestions for other windows to fill the remaining tiles
...
There are other features https://github.com/domferr/tilingshell
Tiling Shell supports GNOME Shell 40 to 47 on X11 and Wayland.
Advanced Window Management for #Linux #gnome desktops
https://extensions.gnome.org/extension/7065/tiling-shell
A GNOME extension for advanced window management. It's highly configurable and offers different ways of tiling and managing your windows. The focus is on delivering the best user experience, highest stability, and full customization.
It also works with multiple monitors (even if they use different scaling), comes with a number of tiling layouts built-in but there is a layout editor to allow you to create and save customs layouts.
Tiling Shell also features the Snap Assistant, borrowed from Windows 11: just move a window to the top with your mouse and the Snap Assistant slides in and you can place the window where you want and how you want.
* Automatic tiling
* Fully customizable keyboard shortcuts to tile, move windows, change focus and more
* You can also move the window to the edge of the screen to tile it
* Right click on the window title to place the window where you want and how you want it
* Coming soon this week, Windows Suggestions: after tiling a window you get suggestions for other windows to fill the remaining tiles
...
There are other features https://github.com/domferr/tilingshell
Tiling Shell supports GNOME Shell 40 to 47 on X11 and Wayland.
GitHub
GitHub - domferr/tilingshell: Extend Gnome Shell with advanced tiling window management. Supports multiple monitors, Windows 11โฆ
Extend Gnome Shell with advanced tiling window management. Supports multiple monitors, Windows 11 Snap Assistant, Fancy Zones, customised tiling layouts and more. - domferr/tilingshell
๐4๐2โค1๐1
IronFox Privacy and security-oriented Firefox-based web browser for Android. https://ironfoxoss.org/ releases new update.
Updated to Firefox 135.0
Updated to Phoenix 2025.02.01.1 - (See changes from the last release of IronFox)
uBlock Origin is now installed by default!
Added a toggle that allow users to spoof their locale to en-US (located under Settings -> Language) for additional fingerprinting protection (using patches from Tor Browser). Users fluent in English are highly recommended to enable this setting.
JavaScript & XFA are now disabled in Firefox's PDF Viewer (PDF.js)
Enabled support for Firefox's tab strip feature on compatible devices - #27
Other minor tweaks & fixes.
https://gitlab.com/ironfox-oss/IronFox/-/releases
Updated to Firefox 135.0
Updated to Phoenix 2025.02.01.1 - (See changes from the last release of IronFox)
uBlock Origin is now installed by default!
Added a toggle that allow users to spoof their locale to en-US (located under Settings -> Language) for additional fingerprinting protection (using patches from Tor Browser). Users fluent in English are highly recommended to enable this setting.
JavaScript & XFA are now disabled in Firefox's PDF Viewer (PDF.js)
Enabled support for Firefox's tab strip feature on compatible devices - #27
Other minor tweaks & fixes.
https://gitlab.com/ironfox-oss/IronFox/-/releases
GitLab
Releases ยท IronFox OSS / IronFox ยท GitLab
Private, secure, user first web browser for Android. https://ironfoxoss.org/
๐17๐ฅ1
Net Switch: Isolate Apps from Internet Access
Net Switch is a Magisk module to isolate apps from accessing the internet on your Android device. This tool gives you complete control over which apps can send or receive data, improving security, privacy, and saving bandwidth.
Fully standalone, Operates fully on iptables.
More info :https://github.com/Rem01Gaming/net-switch
#magisk #firewall #privacy #afwallalterernative
Net Switch is a Magisk module to isolate apps from accessing the internet on your Android device. This tool gives you complete control over which apps can send or receive data, improving security, privacy, and saving bandwidth.
Fully standalone, Operates fully on iptables.
More info :https://github.com/Rem01Gaming/net-switch
#magisk #firewall #privacy #afwallalterernative
๐20
๐7๐คก6๐ฏ3
Lennart Poettering intends to replace "sudo" with #systemd's run0. Here's a quick PoC to demonstrate root permission hijacking by exploiting the fact "systemd-run" (the basis of uid0/run0, the sudo replacer) creates a user owned pty for communication with the new "root" process.
This isn't the only bug of course, it's not possible on Linux to read the environment of a root owned process but as systemd creates a service in the system slice, you can query D-BUS and learn sensitive information passed to the process env, such as API keys or other secrets.
https://fixupx.com/hackerfantastic/status/1785495587514638559
Nitter mirror: https://xcancel.com/hackerfantastic/status/1785495587514638559
This isn't the only bug of course, it's not possible on Linux to read the environment of a root owned process but as systemd creates a service in the system slice, you can query D-BUS and learn sensitive information passed to the process env, such as API keys or other secrets.
https://fixupx.com/hackerfantastic/status/1785495587514638559
Nitter mirror: https://xcancel.com/hackerfantastic/status/1785495587514638559
๐งต Thread โข FxTwitter / FixupX
hackerfantastic.x (@hackerfantastic)
Lennart Poettering intends to replace "sudo" with systemd's run0. Here's a quick PoC to demonstrate root permission hijacking by exploiting the fact "systemd-run" (the basis of uid0/run0, the sudo replacer) creates a user owned pty for communication withโฆ
๐5
Here are some links about #systemd #alternatives for #Linux in no particular order.
Which are your favorite alternatives and distros?
https://wiki.gentoo.org/wiki/Comparison_of_init_systems
https://suckless.org/sucks/systemd/
https://unixsheikh.com/articles/the-real-motivation-behind-systemd.html
https://sysdfree.wordpress.com/
https://nosystemd.org/
https://skarnet.org/software/systemd.html
https://the-world-after-systemd.ungleich.ch/
https://ewontfix.com/14/
https://forums.debian.net/viewtopic.php?t=120652
https://www.devuan.org/os/announce/
https://www.devuan.org/os/init-freedom
https://thehackernews.com/2019/01/linux-systemd-exploit.html
https://judecnelson.blogspot.com/2014/09/systemd-biggest-fallacies.html
https://chiefio.wordpress.com/2016/05/18/systemd-it-keeps-getting-worse/
https://systemd-free.artixlinux.org/why.php
Some more added here too: https://start.me/p/Kg8keE/priv-sec
#systemd #Linux
Which are your favorite alternatives and distros?
https://wiki.gentoo.org/wiki/Comparison_of_init_systems
https://suckless.org/sucks/systemd/
https://unixsheikh.com/articles/the-real-motivation-behind-systemd.html
https://sysdfree.wordpress.com/
https://nosystemd.org/
https://skarnet.org/software/systemd.html
https://the-world-after-systemd.ungleich.ch/
https://ewontfix.com/14/
https://forums.debian.net/viewtopic.php?t=120652
https://www.devuan.org/os/announce/
https://www.devuan.org/os/init-freedom
https://thehackernews.com/2019/01/linux-systemd-exploit.html
https://judecnelson.blogspot.com/2014/09/systemd-biggest-fallacies.html
https://chiefio.wordpress.com/2016/05/18/systemd-it-keeps-getting-worse/
https://systemd-free.artixlinux.org/why.php
Some more added here too: https://start.me/p/Kg8keE/priv-sec
#systemd #Linux
๐11๐4๐3๐ค1๐ฑ1
Warning for #Android gapps traitors:
Uninstall the application:
https://play.google.com/store/apps/details?id=com.google.android.safetycore
Be careful on GrapheneOS too if you have Google services installed.
While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.
https://grapheneos.org/releases
https://discuss.grapheneos.org/d/19193-android-system-safety-core
If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.
Locating the App
Go to Settings โ Apps (or Apps & Notifications) โ Show system apps. Look for โAndroid System SafetyCore.โ
Check whether the app has any special permissions (e.g., internet access).
Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.
This is client side scanning. It's a way to spy on your device before it's encrypted.
Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/
Uninstall the application:
Android System SafetyCore, which has been automatically installed on most devices. It is used by Google to scan your data, just like Apple has been doing on iOS, but you have the choice to uninstall it. If you don't have it yet, watch out for it being installed silently over the next few days!https://play.google.com/store/apps/details?id=com.google.android.safetycore
Be careful on GrapheneOS too if you have Google services installed.
While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.
Sandboxed Google Play compatibility layer: stop Play Store from attempting to auto-install some system component packages, such as "Android System SafetyCore" (com.google.android.safetycore) and "Android System Key Verifier" (com.google.android.contactkeys)
https://grapheneos.org/releases
The phone is asking me to install this app, anyone knows information about if its truly need it or not? Im with the Google Play Services sandbox install
https://discuss.grapheneos.org/d/19193-android-system-safety-core
If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.
Locating the App
Go to Settings โ Apps (or Apps & Notifications) โ Show system apps. Look for โAndroid System SafetyCore.โ
Check whether the app has any special permissions (e.g., internet access).
Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.
This is client side scanning. It's a way to spy on your device before it's encrypted.
Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/
๐33โค2๐1๐1
The functionality provided by Google's new Android System SafetyCore app available through the Play Store is covered here:
https://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html
Neither this app or the Google Messages app using it are part of GrapheneOS and neither will be, but GrapheneOS users can choose to install and use both. Google Messages still works without the new app.
The app doesn't provide client-side scanning used to report things to Google or anyone else. It provides on-device machine learning models usable by applications to classify content as being spam, scams, malware, etc. This allows apps to check content locally without sharing it with a service and mark it with warnings for users.
It's unfortunate that it's not open source and released as part of the Android Open Source Project and the models also aren't open let alone open source. It won't be available to GrapheneOS users unless they go out of the way to install it.
We'd have no problem with having local neural network features for users, but they'd have to be open source. We wouldn't want anything saving state by default. It'd have to be open source to be included as a feature in GrapheneOS though, and none of it has been so it's not included.
Google Messages uses this new app to classify messages as spam, malware, nudity, etc. Nudity detection is an optional feature which blurs media detected as having nudity and makes accessing it require going through a dialog.
Apps have been able to ship local AI models to do classification forever. Most apps do it remotely by sharing content with their servers. Many apps have already have client or server side detection of spam, malware, scams, nudity, etc.
Classifying things like this is not the same as trying to detect illegal content and reporting it to a service. That would greatly violate people's privacy in multiple ways and false positives would still exist. It's not what this is and it's not usable for it.
GrapheneOS has all the standard hardware acceleration support for neural networks but we don't have anything using it. All of the features they've used it for in the Pixel OS are in closed source Google apps. A lot is Pixel exclusive. The features work if people install the apps.
https://xcancel.com/GrapheneOS/status/1888280836426084502
https://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html
Neither this app or the Google Messages app using it are part of GrapheneOS and neither will be, but GrapheneOS users can choose to install and use both. Google Messages still works without the new app.
The app doesn't provide client-side scanning used to report things to Google or anyone else. It provides on-device machine learning models usable by applications to classify content as being spam, scams, malware, etc. This allows apps to check content locally without sharing it with a service and mark it with warnings for users.
It's unfortunate that it's not open source and released as part of the Android Open Source Project and the models also aren't open let alone open source. It won't be available to GrapheneOS users unless they go out of the way to install it.
We'd have no problem with having local neural network features for users, but they'd have to be open source. We wouldn't want anything saving state by default. It'd have to be open source to be included as a feature in GrapheneOS though, and none of it has been so it's not included.
Google Messages uses this new app to classify messages as spam, malware, nudity, etc. Nudity detection is an optional feature which blurs media detected as having nudity and makes accessing it require going through a dialog.
Apps have been able to ship local AI models to do classification forever. Most apps do it remotely by sharing content with their servers. Many apps have already have client or server side detection of spam, malware, scams, nudity, etc.
Classifying things like this is not the same as trying to detect illegal content and reporting it to a service. That would greatly violate people's privacy in multiple ways and false positives would still exist. It's not what this is and it's not usable for it.
GrapheneOS has all the standard hardware acceleration support for neural networks but we don't have anything using it. All of the features they've used it for in the Pixel OS are in closed source Google apps. A lot is Pixel exclusive. The features work if people install the apps.
https://xcancel.com/GrapheneOS/status/1888280836426084502
Google Online Security Blog
5 new protections on Google Messages to help keep you safe
Posted by Jan Jedrzejowicz, Director of Product, Android and Business Communications; Alberto Pastor Nieto, Sr. Product Manager Google Messa...
๐12๐3โค2๐ฅ1
#Systemd Adding The Ability to Boot Directly Into A Disk Image Downloaded Via HTTP
https://www.phoronix.com/news/systemd-disk-image-boot-HTTP
#Linux #backdoor
https://www.phoronix.com/news/systemd-disk-image-boot-HTTP
#Linux #backdoor
Phoronix
Systemd Adding The Ability to Boot Directly Into A Disk Image Downloaded Via HTTP
Systemd lead developer Lennart Poettering has been working on adding the ability to let systemd boot directly into a disk image downloaded via HTTP within the initial RAM disk (initrd) during the Linux boot process.
๐ฅ9๐4๐คฃ3๐1๐คฎ1
Krita
Free and open source digital painting application. It is for artists who want to create professional work from start to end. Krita is used by comic book artists, illustrators, concept artists, matte and texture painters and in the digital VFX industry.
https://krita.org
https://invent.kde.org/graphics/krita
Download
https://cdn.kde.org/ci-builds/graphics/krita/
#AI plugin
https://kritaaidiffusion.com
#krita #image #editor #paint
Free and open source digital painting application. It is for artists who want to create professional work from start to end. Krita is used by comic book artists, illustrators, concept artists, matte and texture painters and in the digital VFX industry.
https://krita.org
https://invent.kde.org/graphics/krita
Download
https://cdn.kde.org/ci-builds/graphics/krita/
#AI plugin
https://kritaaidiffusion.com
#krita #image #editor #paint
GitLab
Graphics / Krita ยท GitLab
Krita is a free and open source cross-platform application that offers an end-to-end solution for creating digital art files from scratch built on the KDE and Qt frameworks.
๐ฅ10๐7โค6๐1๐1๐คก1
kitty
The fast, feature-rich, GPU based #terminal emulator
Uses GPU and SIMD vector CPU instructions for best in class
Uses threaded rendering for absolutely minimal latency
Performance tradeoffs can be tuned
Capable Scriptable Composable Cross-platform Innovative
To get started see Quickstart.
https://sw.kovidgoyal.net/kitty/
With software, such as "Kitty", it is possible to read documents, images and other graphical formats with these software:
https://github.com/dsanson/termpdf.py
http://www.kraxel.org/blog/linux/fbida/
https://github.com/itsjunetime/tdf
It means, that we no longer need GTK+ (which dropped support for X11), Qt and other graphical toolkits in order to have a full operational computer.
The fast, feature-rich, GPU based #terminal emulator
Uses GPU and SIMD vector CPU instructions for best in class
Uses threaded rendering for absolutely minimal latency
Performance tradeoffs can be tuned
Capable Scriptable Composable Cross-platform Innovative
To get started see Quickstart.
https://sw.kovidgoyal.net/kitty/
With software, such as "Kitty", it is possible to read documents, images and other graphical formats with these software:
https://github.com/dsanson/termpdf.py
http://www.kraxel.org/blog/linux/fbida/
https://github.com/itsjunetime/tdf
It means, that we no longer need GTK+ (which dropped support for X11), Qt and other graphical toolkits in order to have a full operational computer.
kitty
If you live in the terminal, kitty is made for YOU! The fast, feature-rich, GPU based terminal emulator. Fast Uses GPU and SIMD vector CPU instructions for best in class performance, Uses threaded ...
โค5๐คฎ1