Forwarded from CoMaps (Oleg)
Introducing the CoMaps Logo!
We're proud to reveal the logo for CoMaps — designed and chosen by the community.
From maps to code to design, CoMaps is 100% community-powered — and this logo is no different. It’s a symbol of what we’re building together: free, open, and offline map navigation for everyone.
The winning logo was created by @Flummic. The initial round had 21 logos submitted, resulting in 6 finalists, followed by an iteration process where people collaborated to make improvements (https://codeberg.org/comaps/Governance/issues/78).
Thank you to everyone who shaped this milestone. We’re just getting started.
We're proud to reveal the logo for CoMaps — designed and chosen by the community.
From maps to code to design, CoMaps is 100% community-powered — and this logo is no different. It’s a symbol of what we’re building together: free, open, and offline map navigation for everyone.
The winning logo was created by @Flummic. The initial round had 21 logos submitted, resulting in 6 finalists, followed by an iteration process where people collaborated to make improvements (https://codeberg.org/comaps/Governance/issues/78).
Thank you to everyone who shaped this milestone. We’re just getting started.
Forwarded from Mishaal's Android News Feed
✨This could be our first look at Gemini Space, which could be Google's version of Now Bar for Pixel phones.
Last month I reported on the existence of Gemini Space, now my colleague AssembleDebug has managed to get it partially working.
Images👇
🔗 https://www.androidauthority.com/google-pixel-gemini-space-first-look-apk-teardown-3577101/
Last month I reported on the existence of Gemini Space, now my colleague AssembleDebug has managed to get it partially working.
Images👇
🔗 https://www.androidauthority.com/google-pixel-gemini-space-first-look-apk-teardown-3577101/
Android Authority
First look at Gemini Space: Google's Now Bar-like upgrade to Pixel's At a Glance (APK teardown)
Here's your first look at Google's Gemini Space, an intelligent upgrade to Pixel's At a Glance experience, bringing dynamic contextual cards.
Forwarded from The Hacker News
⚡ Bluetooth car exploits. macOS backdoors. Ransomware returns. Arrests hit top cyber gangs.
This week, trusted tools turned toxic—and no one’s perimeter is safe.
Get the full intel in our latest recap →
https://thehackernews.com/2025/07/weekly-recap-scattered-spider-arrests.html
This week, trusted tools turned toxic—and no one’s perimeter is safe.
Get the full intel in our latest recap →
https://thehackernews.com/2025/07/weekly-recap-scattered-spider-arrests.html
Forwarded from Lawnchair News (Lawnchair Bot)
*Lawnchair 15 Beta 1 is here!*
We're excited to release the first beta for Lawnchair 15, a foundational update based on Android 15.
The biggest new feature is one of our most requested ever: **App Drawer Folders**. You can now create and reorder custom folders to finally organize your app drawer.
This release is packed with many other improvements, from a more powerful dock to dozens of UI refinements.
**Read the full announcement on our blog:**
https://lawnchair.app/blog/lawnchair-15-beta-1
We're excited to release the first beta for Lawnchair 15, a foundational update based on Android 15.
The biggest new feature is one of our most requested ever: **App Drawer Folders**. You can now create and reorder custom folders to finally organize your app drawer.
This release is packed with many other improvements, from a more powerful dock to dozens of UI refinements.
**Read the full announcement on our blog:**
https://lawnchair.app/blog/lawnchair-15-beta-1
Forwarded from Mishaal's Android News Feed
Android's lock screen widgets are getting a slick new background blur effect
In the first Android Canary build, the lock screen widget page now shows a blurred version of your wallpaper
More details👇
🔗 https://www.androidauthority.com/android-lock-screen-widget-background-blur-3577218/
In the first Android Canary build, the lock screen widget page now shows a blurred version of your wallpaper
More details👇
🔗 https://www.androidauthority.com/android-lock-screen-widget-background-blur-3577218/
Forwarded from Gizchina.com
Anker, Baseus, Romoss among brands hit by mass power bank recalls in China due to “safety risks”
https://www.gizchina.com/2025/07/14/anker-baseus-romoss-among-brands-hit-by-mass-power-bank-recalls-in-china-due-to-safety-risks/
https://www.gizchina.com/2025/07/14/anker-baseus-romoss-among-brands-hit-by-mass-power-bank-recalls-in-china-due-to-safety-risks/
Forwarded from Hacker News
Forwarded from Gizchina.com
[Tenorshare AI Bypass Review] Humanize AI Text & Bypass Detection Tools Easily
https://www.gizchina.com/2025/07/14/tenorshare-ai-bypass-review-humanize-ai-text-bypass-detection/
https://www.gizchina.com/2025/07/14/tenorshare-ai-bypass-review-humanize-ai-text-bypass-detection/
Forwarded from The Hacker News
🚨 A fake CAPTCHA is all it takes.
Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix that hijacks File Explorer.
Targets? Everyone.
Tactics? Evolving fast.
Here’s what they’re hiding behind Cloudflare Tunnels ↓ https://thehackernews.com/2025/07/new-php-based-interlock-rat-variant.html
Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix that hijacks File Explorer.
Targets? Everyone.
Tactics? Evolving fast.
Here’s what they’re hiding behind Cloudflare Tunnels ↓ https://thehackernews.com/2025/07/new-php-based-interlock-rat-variant.html
Forwarded from The Hacker News
🚨 39 million secrets leaked on GitHub in 2024 alone.
Not just mistakes—these are entry points for attackers to breach your cloud, CI/CD, and data stores without triggering alerts.
Even a forgotten repo can cost everything.
Here’s how to stop it → https://thehackernews.com/2025/07/the-unusual-suspect-git-repos.html
Not just mistakes—these are entry points for attackers to breach your cloud, CI/CD, and data stores without triggering alerts.
Even a forgotten repo can cost everything.
Here’s how to stop it → https://thehackernews.com/2025/07/the-unusual-suspect-git-repos.html
The XLIBRE Technical Bifurcation of the Graphic Server X.ORG unmasks the intrinsic policy of the Foss Ecosystem: its project rejects codes of conduct and initiatives ofi, explaining a conservative ideological agenda. This reflects the historical tension between the free software movement (ethical, focused on user liberties) and the Open Source (pragmatic, focused on technical efficiency), whose fusion under the term "foss" is fragile. Any technical decision - forms, language changes or licenses - redistributes power: altera hierarchies of expertise, controls infrastructure and defines who participate in the development culture. Thus, protocols such as Wayland vs.11 or Copyleft (GPL) vs permissive (MIT) embody battles for values, not just efficiency. Ignore this human dimension - Igo, fear of obsolescence, struggle for influence - is to deny that the code is a political artifact where control over users and developers materializes. Survival in the AI era and surveillance capitalism requires choosing flags: technical neutrality is a myth.
https://www.gizvault.com/archives/ideological-gravity-of-foss
💬 Another article talking about the same, think what they want but this says in the end "technical neutrality is a myth" is true
https://www.gizvault.com/archives/ideological-gravity-of-foss
💬 Another article talking about the same, think what they want but this says in the end "technical neutrality is a myth" is true
Gizvault
The Ideological Gravity of FOSS
Dive into the heart of the **FOSS** world! This blog post explores the hidden **ideology** and politics at play in software development, from language choices t
Hardware Security Threats Against Bluetooth Mesh Networks
https://ieeexplore.ieee.org/document/8433184/authors#authors
. Security risks of Bluetooth
Man-in-the-middle attacks (MITM):
Bluetooth connections can be susceptible to eavesdropping attacks if strong encryption is not used. Older Bluetooth versions (before 4.2) are particularly risky.
Bluejacking & bluesnarfing:
Attackers could try to send unwanted messages (bluejacking) or even steal data from devices (bluesnarfing).
Traceability:
Bluetooth devices often send unique MAC addresses, which makes users traceable.
Weak standard pairing methods:
Many devices still use simple PINs or confirm connections without verification (e.g. "Just Works" mode with Bluetooth LE).
Risks specific to Bluetooth mesh networks
Mesh networks increase the attack surface:
Each device in the mesh acts as a relay, which means that a compromised device could influence the entire data traffic.
Lack of end-to-end encryption:
If the app/software does not implement additional encryption, messages can be forwarded in plain text.
Decentralized management:
Without centralized control, it is difficult to identify and remove malicious nodes.
yes a mesh network is not best in class security, user case is for "emergency" or other edge cases. For example where you have no other radio signal like mining sites.
Also mesh network were used during mass protest in Hong Kong and was so effective that China asked apple to disable it...
Even a UHF radio is useful in some situation even if it's not safe for private communications.
Is like meshtastic security is not main goal, for now at least...
https://ieeexplore.ieee.org/document/8433184/authors#authors
. Security risks of Bluetooth
Man-in-the-middle attacks (MITM):
Bluetooth connections can be susceptible to eavesdropping attacks if strong encryption is not used. Older Bluetooth versions (before 4.2) are particularly risky.
Bluejacking & bluesnarfing:
Attackers could try to send unwanted messages (bluejacking) or even steal data from devices (bluesnarfing).
Traceability:
Bluetooth devices often send unique MAC addresses, which makes users traceable.
Weak standard pairing methods:
Many devices still use simple PINs or confirm connections without verification (e.g. "Just Works" mode with Bluetooth LE).
Risks specific to Bluetooth mesh networks
Mesh networks increase the attack surface:
Each device in the mesh acts as a relay, which means that a compromised device could influence the entire data traffic.
Lack of end-to-end encryption:
If the app/software does not implement additional encryption, messages can be forwarded in plain text.
Decentralized management:
Without centralized control, it is difficult to identify and remove malicious nodes.
yes a mesh network is not best in class security, user case is for "emergency" or other edge cases. For example where you have no other radio signal like mining sites.
Also mesh network were used during mass protest in Hong Kong and was so effective that China asked apple to disable it...
Even a UHF radio is useful in some situation even if it's not safe for private communications.
Is like meshtastic security is not main goal, for now at least...
Forwarded from GSMArena (IFTTT)
Report: Chinese Android makers are testing under-display selfie cameras with 3D facial recognition
https://ift.tt/x4ojb2q
https://ift.tt/x4ojb2q
GSMArena.com
Report: Chinese Android makers are testing under-display selfie cameras with 3D facial recognition
The race to the first phone with a 3D UD selfie cam is on. 3D facial recognition hardware is a luxury in today's smartphone market, with Apple being the...
Forwarded from Tech & Leaks Zone
Nothing says that the Phone 3 reaches more than 60°C in benchmarking apps like 3D wildlife extreme tests because the phone doesn't have any bulky, multi-chamber cooling system as found in "gaming phones".
But with Google Pixels and iPhones, even without having any VC, the phones do not reach 60C. Clearly lack of optimization and thermal management but Nothing blamed it on the hardware lacking multi VC .
But with Google Pixels and iPhones, even without having any VC, the phones do not reach 60C. Clearly lack of optimization and thermal management but Nothing blamed it on the hardware lacking multi VC .