Forwarded from Treble GSI's | Privacy + Secure
Modern Android Lock Screen Project
Malsp is a preset for KLCK that brings the Google Pixel lock screen experience to older devices and OEM Android distributions with some additional customization features.
🔗 Links:
- Download
- Installation
- Screenshots
- Features
- Source code
Post credits: @kwgtiOS
Developer: brianKordy
🏷️ Tags: #Android #Customization
Malsp is a preset for KLCK that brings the Google Pixel lock screen experience to older devices and OEM Android distributions with some additional customization features.
🔗 Links:
- Download
- Installation
- Screenshots
- Features
- Source code
Post credits: @kwgtiOS
Developer: brianKordy
🏷️ Tags: #Android #Customization
Forwarded from Treble GSI's | Privacy + Secure
Home
About
Releases
Download
Documentation
Architectures
OS kernel
Packages
Targets
Hardware
Developer
Knowledge Base
Contact
Support
FAQ
Art
More than a distribution...
Define the target
T2 started as a community driven fork from the ROCK Linux Project with the aim to create a decentralized development and clean a framework for spin-off projects and customized distributions. Another goal was to provide a more continuous release stream for stable security updates.
With T2 you can define targets for various purposes, ranging from embedded linux systems with a few MB of size over server configurations to a full desktop system featuring X.Org foundation, KDE, Gnome, OpenOffice.Org and many more. Those targets can be compiled for use on the most common architectures: Alpha, ARM, HPPA (incl. HPPA64), IA64, MIPS, PowerPC (incl. PowerPC-64), SPARC (incl. SPARC64), SuperH, x86 (incl. x86-64) - theoretically any GCC/Linux supported one.
T2 comes with many predefined targets (desktop, router, live CD ...) and over 2000 package descriptions ready to build. A quick introduction how to compile a target for your favorite architecture can be found here.
White paper: english german
The Build Environment
T2 features an automated build system which manages the whole compilation process including a possible installer CD creation. After initial creation of the build-tool chain, all packages are built inside a sandbox environment to monitor installed files and dependencies automatically. The build system can also modify the execution of various programs to provide a generic way to control compiler flags and file manipulations.
The T2 framework allows the creation of individual custom build target definitions and to customize any build aspect, as well as every single package built for it. Due to the nature of the clean source packages and its automatic build system, T2 is highly portable. Adding new architectures is easy and can be done within a day!
Since the automatic build system controls the whole build, it can transform compiler arguments used by the various packages on-the-fly. This allows adapting the optimization for the specified CPU platform, thus accelerating your product over its current limits.
QA - Quality Assurance
During T2 development, measurements are used to assure the high quality level defined by the developers. The sandbox environment is used to review the content installed by the packages, as well as the preconditions needed to build the package. In addition, a regression tester automatically verifies cross builds for the supported architectures and tracks the build status for every package included in T2.
With all the points outlined above, T2 offers a solid base and a flexible framework for integration with your custom applications. The state-of-the-art technology reduces the development time and the time to market.
Come in, we're open
Many end users and system administrators enjoy T2 with its clean and tested packages for daily home or office use.
With developers around the world, T2 is best suited for commercial scale products, especially in the embedded and high performance clustering market.
T2 aims to be open for active maintainers, with already over 20 people with write access to the T2 Subversion source repository. This organization provides for delivery of quick bug and security fixes (not relying on a single person in the process) and offers a nice development climate.
About
Releases
Download
Documentation
Architectures
OS kernel
Packages
Targets
Hardware
Developer
Knowledge Base
Contact
Support
FAQ
Art
More than a distribution...
Define the target
T2 started as a community driven fork from the ROCK Linux Project with the aim to create a decentralized development and clean a framework for spin-off projects and customized distributions. Another goal was to provide a more continuous release stream for stable security updates.
With T2 you can define targets for various purposes, ranging from embedded linux systems with a few MB of size over server configurations to a full desktop system featuring X.Org foundation, KDE, Gnome, OpenOffice.Org and many more. Those targets can be compiled for use on the most common architectures: Alpha, ARM, HPPA (incl. HPPA64), IA64, MIPS, PowerPC (incl. PowerPC-64), SPARC (incl. SPARC64), SuperH, x86 (incl. x86-64) - theoretically any GCC/Linux supported one.
T2 comes with many predefined targets (desktop, router, live CD ...) and over 2000 package descriptions ready to build. A quick introduction how to compile a target for your favorite architecture can be found here.
White paper: english german
The Build Environment
T2 features an automated build system which manages the whole compilation process including a possible installer CD creation. After initial creation of the build-tool chain, all packages are built inside a sandbox environment to monitor installed files and dependencies automatically. The build system can also modify the execution of various programs to provide a generic way to control compiler flags and file manipulations.
The T2 framework allows the creation of individual custom build target definitions and to customize any build aspect, as well as every single package built for it. Due to the nature of the clean source packages and its automatic build system, T2 is highly portable. Adding new architectures is easy and can be done within a day!
Since the automatic build system controls the whole build, it can transform compiler arguments used by the various packages on-the-fly. This allows adapting the optimization for the specified CPU platform, thus accelerating your product over its current limits.
QA - Quality Assurance
During T2 development, measurements are used to assure the high quality level defined by the developers. The sandbox environment is used to review the content installed by the packages, as well as the preconditions needed to build the package. In addition, a regression tester automatically verifies cross builds for the supported architectures and tracks the build status for every package included in T2.
With all the points outlined above, T2 offers a solid base and a flexible framework for integration with your custom applications. The state-of-the-art technology reduces the development time and the time to market.
Come in, we're open
Many end users and system administrators enjoy T2 with its clean and tested packages for daily home or office use.
With developers around the world, T2 is best suited for commercial scale products, especially in the embedded and high performance clustering market.
T2 aims to be open for active maintainers, with already over 20 people with write access to the T2 Subversion source repository. This organization provides for delivery of quick bug and security fixes (not relying on a single person in the process) and offers a nice development climate.
Forwarded from The Hacker News
Sapphire Sleet, a North Korea-linked threat group, has stolen over $10 million in cryptocurrency through sophisticated social engineering schemes.
Curious how these attacks work? Learn more: https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html
Curious how these attacks work? Learn more: https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html
Forwarded from The Hacker News
Google blocks over 1,000 websites linked to China’s GLASSBRIDGE influence operation.
These fake news sites push pro-China narratives, disguising themselves as legitimate news outlets.
Learn more: https://thehackernews.com/2024/11/google-exposes-glassbridge-pro-china.html
These fake news sites push pro-China narratives, disguising themselves as legitimate news outlets.
Learn more: https://thehackernews.com/2024/11/google-exposes-glassbridge-pro-china.html
Forwarded from Gizchina.com
Microsoft Begins Preview Rollout of Recall Feature for Snapdragon PCs
https://www.gizchina.com/2024/11/23/microsoft-begins-preview-rollout-of-recall-feature-for-snapdragon-pcs/
https://www.gizchina.com/2024/11/23/microsoft-begins-preview-rollout-of-recall-feature-for-snapdragon-pcs/
Forwarded from Libreware
Invidious is currently being blocked by Google. Use Materialious on Android or Desktop to get around this with local video fallback.
#yt
#yt
GitHub
GitHub - Materialious/Materialious: Materialious is a modern material design frontend for Invidious, focused on a clean, privacy…
Materialious is a modern material design frontend for Invidious, focused on a clean, privacy-friendly YouTube experience. It supports local video fallback when Invidious fails and is available on W...
Forwarded from ATT • Tech News (Agam)
Google removes 1.1.1.1 and Other VPNs at India's Request
The Indian Ministry of Home Affairs made a removal request to Google, which targets links to VPNs including Chrome extensions, Android apps and direct download links.
The removed VPNs include the well-known:
•
•
• X-VPN (Android, Extension)
Other VPNs include:
The reason is unspecified, but it's likely related to regulatory or security concerns. Google has acknowledged the request, but there are no documents yet.
If you use
• Migrate to Cloudflare One Agent
• Install the APK manually
🔗 Lumen
🧑💻 @agamtechtricks
The Indian Ministry of Home Affairs made a removal request to Google, which targets links to VPNs including Chrome extensions, Android apps and direct download links.
The removed VPNs include the well-known:
•
1.1.1.1 by Cloudflare (Android)•
Hide.me (Android)• X-VPN (Android, Extension)
Other VPNs include:
Thunder VPN, SuperVPN Free, Touch VPN, PrivadoVPN, Potato VPN, Neo VPN, Fast VPN, FreeVPN Planet.
The reason is unspecified, but it's likely related to regulatory or security concerns. Google has acknowledged the request, but there are no documents yet.
If you use
1.1.1.1 on Android, you can:• Migrate to Cloudflare One Agent
• Install the APK manually
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Bones' Tech Garage
If there is any company that needs to be broken up and smashed for antitrust it is Microsoft.
https://www.howtogeek.com/microsoft-edge-browser-game-assist-preview/
https://www.howtogeek.com/microsoft-edge-browser-game-assist-preview/
How-To Geek
Microsoft Edge Is Invading Your PC Games
Look up guides without leaving your game.
Forwarded from Treble GSI's | Privacy + Secure
FluidAC
FluidAC is a music downloader that lets you grab high-quality tracks in FLAC, MQA, and Dolby Atmos. It features a clean interface, fast downloads, and advanced search.
🔗 Links:
- Download
- Screenshots
- Features
- Channel
- Support group
- Github Repo ( no source code due to ToS)
Developer: Jyotiraditya Panda
🏷️ Tags: #Android #Music #Downloader #Utilities
FluidAC is a music downloader that lets you grab high-quality tracks in FLAC, MQA, and Dolby Atmos. It features a clean interface, fast downloads, and advanced search.
🔗 Links:
- Download
- Screenshots
- Features
- Channel
- Support group
- Github Repo ( no source code due to ToS)
Developer: Jyotiraditya Panda
🏷️ Tags: #Android #Music #Downloader #Utilities
Forwarded from NoGoolag
'Alarming' bugs lay low in Linux's needrestart for decade
https://www.theregister.com/2024/11/21/qualys_needrestart_linux_vulnerabilities/
CVE- 2024-48990 : Linux LPE via needrestart
PATCHED: Nov 19, 2024
PoC: https://github.com/makuga01/CVE-2024-48990-PoC
Info: https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
P.S. Although you need to wait for
#exploit #pentest #redteam #lpe #linux
https://www.theregister.com/2024/11/21/qualys_needrestart_linux_vulnerabilities/
CVE- 2024-48990 : Linux LPE via needrestart
PATCHED: Nov 19, 2024
PoC: https://github.com/makuga01/CVE-2024-48990-PoC
Info: https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
P.S. Although you need to wait for
needrestart to run for the add-on (which starts, for example, with apt upgrade ), the patch is only three days old, and it has not yet been added to all Debian repos)#exploit #pentest #redteam #lpe #linux
Forwarded from NoGoolag
Researchers unearth two previously unknown Linux backdoors
https://www.helpnetsecurity.com/2024/11/21/linux-backdoors-wolfsbane-firewood/
https://www.helpnetsecurity.com/2024/11/21/linux-backdoors-wolfsbane-firewood/
Help Net Security
Researchers unearth two previously unknown Linux backdoors
ESET researchers have identified multiple samples of two previously unknown Linux backdoors: WolfsBane and FireWood.
Forwarded from cKure
■■■■■ Chaining Three Bugs to Access All Your ServiceNow Data.
https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data
https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data
www.assetnote.io
Chaining Three Bugs to Access All Your ServiceNow Data
Through the course of 3/4 weeks, we were able to find a chain of vulnerabilities that allows full database access and full access to any MID servers configured. This resulted in 3 separate CVE's.
Forwarded from Treble GSI's | Privacy + Secure
And that's why I'm saying mullvad is better
Yahoo News
‘Secure’ Email Provider ProtonMail Handed Over User Data to Law Enforcement
Photo Illustration by Kelly Caminero/The Daily BeastPrivacy experts consider it one of the safest email providers on the internet, but ProtonMail’s recent decision to hand over sensitive customer information to European law enforcement is raising questions…