Privacy + Secure Tech Corner Channel 🛡️
92 subscribers
6.69K photos
588 videos
564 files
16.3K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Tech & Leaks Zone
Xiaomi After-Sales Service: A Long Road of Broken Promises
Twitter

A user’s flagship Xiaomi 13 Pro continues to face serious issues, even after "three" official repairs and multiple visits to service centers. The issues began after the May HyperOS 2 update, when a pink line appeared. The service center replaced the display, but things only got worse. For over 1.5 months, the device has been lagging, the screen frequently freezes, touch response fails, the fingerprint sensor stops working intermittently, it overheats, and there are serious battery drain problems.

The After Sales Manager gave multiple false promises. He claimed the device would be fixed at another center, said parts were being arranged, and even mentioned sending an expert engineer. But none of that ever happened, and there was no follow-up despite weeks of waiting & showing videos of the issues to both SC and the ASM.

The complaint escalated from Grievance Desk to Head of Customer Service Desk. Xiaomi’s premium desk claimed that the issue is related to software aka HyperOS 2. However, other Xiaomi 13 Pro users haven’t faced this issue. Despite two display replacements costing over ₹40,000 (~$500) to Xiaomi, issue still isn't permanently fixed.

Now, the matter reached Xiaomi India President's Office: L3 Level.
The Relationship Manager said the service center found NO issues during inspection and asked the user to take the device back. Videos showing the problems were dismissed since no faults were detected by the service center and they denied the device replacement as well.

The the user then demonstrated the issues live in front of the service center engineer. The fingerprint sensor and touch failed even after a full reset with no apps installed. Yet, the grievance team closed the complaint without resolving the problem.

These issues seems related to false touch detection which started happening after Xiaomi replaced the original display when pink line appeared. It’s frustrating to deal with such bad after sales service & support from Xiaomi for a flagship device when all anyone wants is a phone that actually works.

Follow
@TechLeaksZone
Forwarded from NoGoolag
Media is too big
VIEW IN TELEGRAM
"Your smart TV is listening to every word you say."

"And the companies actually warned you about it, buried in the fine print."

"In Samsung's own privacy policy, it literally says: 'Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured'."

"LG was caught doing the same: Collecting conversations, tracking your viewing habits, and sending it back to their servers, even when you weren't watching anything."

"Ask yourself: Why does your TV need to know what you're talking about at dinner? Why would they warn you, unless they knew it was going to be abused?"
"CHOICEJACKING: Compromising Mobile Devices through Malicious Chargers like a Decade ago", 2025.| Zenodo

CHOICEJACKING attacks exploit JuiceJacking vulnerabilities on mobile devices, targeting Android and iOS to gain file access or code execution

#JuiceJacking #ChoiceJacking #Research #MobileSecurity

1/2
JuiceJacking is an attack in which malicious chargers com-promise connected mobile devices. Shortly after the attack was discovered about a decade ago, mobile OSs introduced
user prompts for confirming data connections from a USB host to a mobile device. Since the introduction of this counter-measure, no new USB-based attacks with comparable impacthave been found.

In this paper, we present a novel family of USB-based attacks on mobile devices, CHOICEJACKING, which is the
first to bypass existing JuiceJacking mitigations. We observe that these mitigations assume that an attacker cannot inject input events while establishing a data connection. However, we show that this assumption does not hold in practice. We present a platform-agnostic attack principle and three concrete attack techniques for Android and iOS that allow a malicious charger to autonomously spoof user input to enable its own data connection. Our evaluation using a custom cheap malicious charger design reveals an alarming state of USB security on mobile platforms.

Despite vendor customizations in USB stacks, CHOICEJACKING attacks gain access to sensitive user files (pictures, documents, app data) on all tested devices from 8 vendors including the top 6 by market share. For two vendors, our attacks allow file extraction from locked devices. For stealthily performing attacks that require an unlocked device,we use a power line side-channel to detect suitable moments, i.e., when the user does not notice visual artifacts. We responsibly disclosed all findings to affected vendors.All but one (including Google, Samsung, Xiaomi, and Apple) acknowledged our attacks and are in the process of integrating mitigations
.

2/2
Forwarded from The Hacker News
🚨 Facebook now asks to upload your phone photos—even unposted ones—to generate AI recaps, collages, and story ideas.

Say yes, and Meta can scan faces, locations, and more.

Full story → https://thehackernews.com/2025/06/facebooks-new-ai-tool-requests-photo.html
Forwarded from The Hacker News
🚨 A Ukrainian military phishing campaign just escalated.

GIFTEDCROOK malware now steals not just browser data—but sensitive documents, emails, and VPN configs.

It hides in fake Excel files, exfiltrates via Telegram, and wipes its tracks.

The goal? Targeted intelligence ops.

Full report → https://thehackernews.com/2025/06/giftedcrook-malware-evolves-from.html
Forwarded from The Hacker News
🚨 Scattered Spider is now targeting airlines, FBI warns.

Their method? Impersonate staff, trick help desks, bypass MFA—no malware needed.

Why it matters: Even C-level accounts are being hijacked with just a phone call.

Details here → https://thehackernews.com/2025/06/fbi-warns-of-scattered-spiders.html