Forwarded from #TBOT: Take Back Our Tech
Hi friends,
This week I'll be interviewing Aaron Day of the Daylight Freedom Foundation.
He is working on a multitude of projects with AI, strategically giving people actionable info about technocracy, medical insurance fraud, alternative currencies and more.
https://theaarondayshow.com/
He also published this list of questions which casts a lot of doubt on Bitcoin as a freedom tool.
https://theaarondayshow.com/Thanksgiving_Bitcoin_Questions.pdf
Does anyone have any questions for him? Reply to this post in @takebackourtech_chat
This week I'll be interviewing Aaron Day of the Daylight Freedom Foundation.
He is working on a multitude of projects with AI, strategically giving people actionable info about technocracy, medical insurance fraud, alternative currencies and more.
https://theaarondayshow.com/
He also published this list of questions which casts a lot of doubt on Bitcoin as a freedom tool.
https://theaarondayshow.com/Thanksgiving_Bitcoin_Questions.pdf
Does anyone have any questions for him? Reply to this post in @takebackourtech_chat
Theaarondayshow
THE AARON DAY SHOW - Sovereign Luxury Media
Sovereign Luxury Media - Art Deco × Rolls Royce Aesthetic. Privacy-first podcast for disillusioned citizens seeking truth beyond mainstream media.
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
Google Drops Sideloading Ban, Uses Dark UI Instead
Google quietly softened a policy many thought would fracture Android — blocking normal users from FOSS apps. The original developer-verification plan would have forced developers to hand over app IDs and signing keys to Google, making it impossible to install many privacy-focused or community apps from source.
After unanimous backlash, Google now says “developers and power users” can still install these apps — but only after jumping through hoops. Dark UI and extra steps make the process cumbersome.
Google cites an internal study about “malicious apps,” but offers no numbers, no methodology, and only one unnamed malware example. The first proposal was a prison wall; this new one is barbed wire — you can get through, but it hurts.
🪧 Read the full article on Substack
📲 Step into digital freedom- choose tools that answer to you, not big tech.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Google quietly softened a policy many thought would fracture Android — blocking normal users from FOSS apps. The original developer-verification plan would have forced developers to hand over app IDs and signing keys to Google, making it impossible to install many privacy-focused or community apps from source.
After unanimous backlash, Google now says “developers and power users” can still install these apps — but only after jumping through hoops. Dark UI and extra steps make the process cumbersome.
Google cites an internal study about “malicious apps,” but offers no numbers, no methodology, and only one unnamed malware example. The first proposal was a prison wall; this new one is barbed wire — you can get through, but it hurts.
🪧 Read the full article on Substack
📲 Step into digital freedom- choose tools that answer to you, not big tech.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from Disclosed_Russia
Media is too big
VIEW IN TELEGRAM
New resolution No. 1667 comes into force on the territory of Russia which essentially starts the process of complete digital isolation of the country from the external Internet
This document obliges telecom operators redirect all traffic through government data centers under the full control of Roskomnadzor And in fact this is a technical opportunity for the sovereign Runet in which every user's step will be recorded and controlled.
Thus, the Internet in Russia will become a closed ecosystem with strict control and a complete absence of the outside world?
🇷🇺 Subscribe to Disclosed_Russia
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Pavel Durov (Paul Du Rove)
Please open Telegram to view this post
VIEW IN TELEGRAM
Cocoon
Confidential Compute Open Network
Cocoon connects GPU power, AI, and Telegram’s vast ecosystem – all built on privacy and blockchain.
🐼 ShadyPanda quietly turned trusted Chrome and Edge extensions into spyware.
Over 4.3 million installs in 7 years — some were even once verified by Google.
After silent updates in mid-2024, they began sending users’ browsing data and cookies to remote servers.
🔗 Read here → https://thehackernews.com/2025/12/shadypanda-turns-popular-browser.html
Over 4.3 million installs in 7 years — some were even once verified by Google.
After silent updates in mid-2024, they began sending users’ browsing data and cookies to remote servers.
🔗 Read here → https://thehackernews.com/2025/12/shadypanda-turns-popular-browser.html
This media is not supported in your browser
VIEW IN TELEGRAM
Here's why you should buy an Oppo Find X7 Ultra in 2025:
1. It's an Oppo phone
2. It's an Ultra flagship
3. Cameras are damn powerful
And the last and most important thing is the fact, its bootloader can be unlocked 🥳.
Yes, an Oppo flagship with an unlocked bootloader.
It uses an unauthorised EDL exploit and after flashing OCDT from the OnePlus 12, fastboot works in the Find X7 Ultra and thus bootloader unlocked.
Follow @TechLeaksZone
1. It's an Oppo phone
2. It's an Ultra flagship
3. Cameras are damn powerful
And the last and most important thing is the fact, its bootloader can be unlocked 🥳.
Yes, an Oppo flagship with an unlocked bootloader.
It uses an unauthorised EDL exploit and after flashing OCDT from the OnePlus 12, fastboot works in the Find X7 Ultra and thus bootloader unlocked.
Follow @TechLeaksZone
Trump Mobile now sells renewed phones as well, which is "brought to life right here in the USA." Interesting addition.
In order to buy the renewed phone, you will have to "pay for your first month of Trump Mobile Service" as well.
I wonder who would actually buy renewed phones from Trump Mobile.
🔗 Trump Mobile
🧑💻 @agamtechtricks
In order to buy the renewed phone, you will have to "pay for your first month of Trump Mobile Service" as well.
I wonder who would actually buy renewed phones from Trump Mobile.
🔗 Trump Mobile
🧑💻 @agamtechtricks
Coolapk @Str123
* 自己写的一个免费工具 Qualcomm Debug Tool
* 支持高通设备 9008 自由读写
* 支持发送签名证书
* 支持单独发送消防软管
* 支持 Oplus 设备自由读写
* 无需 rawprogram 支持自动生成 rawprogram
* 自动读取分区表分析
* 可以读取 Oplus super 以及其他无法读取的分区
* 已经在 华为 Mate50 和 真我 GT7 Pro 上面进行测试
QQ:528531990
* A free tool I wrote myself: Qualcomm Debug Tool
* Supports free read and write on Qualcomm 9008 devices
* Supports sending signature certificates
* Supports sending the firehose/loader separately (This often refers to the firehose loader used in EDL/9008 mode)
* Supports free read and write on Oplus (Oppo/OnePlus) devices
* No need for rawprogram, supports automatic generation of rawprogram
* Automatic reading and analysis of the partition table
* Can read Oplus super and other partitions that cannot be read (The 'super' partition is used in dynamic partitioning)
* Has been tested on Huawei Mate50 and Realme GT7 Pro
* 528531990 is the group (number)
* 自己写的一个免费工具 Qualcomm Debug Tool
* 支持高通设备 9008 自由读写
* 支持发送签名证书
* 支持单独发送消防软管
* 支持 Oplus 设备自由读写
* 无需 rawprogram 支持自动生成 rawprogram
* 自动读取分区表分析
* 可以读取 Oplus super 以及其他无法读取的分区
* 已经在 华为 Mate50 和 真我 GT7 Pro 上面进行测试
QQ:528531990
* A free tool I wrote myself: Qualcomm Debug Tool
* Supports free read and write on Qualcomm 9008 devices
* Supports sending signature certificates
* Supports sending the firehose/loader separately (This often refers to the firehose loader used in EDL/9008 mode)
* Supports free read and write on Oplus (Oppo/OnePlus) devices
* No need for rawprogram, supports automatic generation of rawprogram
* Automatic reading and analysis of the partition table
* Can read Oplus super and other partitions that cannot be read (The 'super' partition is used in dynamic partitioning)
* Has been tested on Huawei Mate50 and Realme GT7 Pro
* 528531990 is the group (number)
https://youtu.be/LLg2OUacUKU
How to Unlock Bootloader/Root And Install Custom ROM's Or GSI ROM's in Infinix/Techno MediaTek Devices
How to Unlock Bootloader/Root And Install Custom ROM's Or GSI ROM's in Infinix/Techno MediaTek Devices
YouTube
How To Unlock Bootloader/Root And Install Custom ROMs Or GSI ROMs In Infinix/Tecno Mediatek Devices
Hello ElectricMoves! It sounds like you're about to provide a tutorial on how to unlock the bootloader, root, and install custom ROMs or GSI ROMs on Infinix, Tecno, and MediaTek devices. That's great! If users have any questions or need assistance, they can…
Seems Google did a full crazy and revoked all currently working keybox yesterday. So max anyone can pass right now is Device integrity.
This might give some explanation: https://xdaforums.com/t/module-play-integrity-fix.4607985/post-90382104
This might give some explanation: https://xdaforums.com/t/module-play-integrity-fix.4607985/post-90382104
XDA Forums
🔧 [MODULE] Play Integrity Fix
PLAY INTEGRITY FIX
I've decided to discontinue the PIF project.
Google is increasingly putting up more obstacles, and I no longer have as much time to dedicate to this as I used to. It's been a...
I've decided to discontinue the PIF project.
Google is increasingly putting up more obstacles, and I no longer have as much time to dedicate to this as I used to. It's been a...
https://www.pcmag.com/news/oneplus-to-address-this-software-flaw-after-initial-silence
Oneplus and Oppo took 7 months to fix vulnerability CVE 2025-10184, which tells a lot about their security practices.
Through this vulnerabity, any application or malware could access SMS/MMS data without asking for permission, thereby stealing your 2FA codes and other sensitive data.
https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/
@PrivacySecureTechCornerChannel
Oneplus and Oppo took 7 months to fix vulnerability CVE 2025-10184, which tells a lot about their security practices.
Through this vulnerabity, any application or malware could access SMS/MMS data without asking for permission, thereby stealing your 2FA codes and other sensitive data.
https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/
@PrivacySecureTechCornerChannel
PCMAG
OnePlus To Address This SMS Leak Flaw After Initial Silence
The vulnerability can let installed mobile apps access SMS/MMS data on a OnePlus phone without asking for user permission, creating a pathway to steal two-factor authentication codes.
Forwarded from News and Tips
telega! 1.
PROXY_ADDRESS leads to VK servers, MYTRACKER_SDK_KEY is a mail.ru tracker (linked to VK), and CALLS_BASE_URL is sent through Odnoklassniki (also linked to VK) (a cherry on top of the MAX messenger).2. There are ads, also through
mail.ru.3. There's a "proprietary channel blacklist" to restrict users to blogs "undesirable in Russia," and this line isn't in the official client.
4. The client code is partially copied from Catogram*, right down to the variable names.
5. Phone numbers, authorization keys, and a lot of unnecessary data are sent to their servers.
6. The VK Video and VK Clips interfaces are substituted in JS to hide their branding.
7. Icons can be replaced with VK-specific ones.
* bruhcollective owns the Catogram development - @iTysonLab.
Why did this client appear? There's an explanation.
Sources: 💌, 💌, 💌
Please open Telegram to view this post
VIEW IN TELEGRAM
[beginners] Android Recon for Bug Bounty
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
YesWeHack
Android recon for Bug Bounty hunters: A complete guide
An in-depth Bug Bounty guide to performing reconnaissance on Android apps – from extracting APKs to mapping endpoints, secrets and vulnerable components.
BREAKING: Qualcomm has started killing Arduino development
Qualcomm has "quietly" made some massive changes to Arduino's Terms of Service and Privacy Policy.
According to Adafruit, the new policies introduce sweeping user-license provisions, broaden data collection & embed long-term account data retention, all while integrating user information into Qualcomm’s broader data to ecosystem.
Section 7.1 grants Arduino a perpetual, irrevocable license over anything you upload. Your code, projects, forum posts, and comments all fall under this & it will still remain in effect even after you delete your account.
Arduino retains rights to your content indefinitely. The license is also royalty-free and sub-licensable. Arduino can use your content however they want, distribute it, modify it, and even sublicense it to others.
Section 8.2 further states that users are not allowed to reverse engineer or attempt to understand how the platform works unless #Arduino gives permission
fuck #Qualcomm
Follow @TechLeaksZone
Qualcomm has "quietly" made some massive changes to Arduino's Terms of Service and Privacy Policy.
According to Adafruit, the new policies introduce sweeping user-license provisions, broaden data collection & embed long-term account data retention, all while integrating user information into Qualcomm’s broader data to ecosystem.
Section 7.1 grants Arduino a perpetual, irrevocable license over anything you upload. Your code, projects, forum posts, and comments all fall under this & it will still remain in effect even after you delete your account.
Arduino retains rights to your content indefinitely. The license is also royalty-free and sub-licensable. Arduino can use your content however they want, distribute it, modify it, and even sublicense it to others.
Section 8.2 further states that users are not allowed to reverse engineer or attempt to understand how the platform works unless #Arduino gives permission
fuck #Qualcomm
Follow @TechLeaksZone