Forwarded from Gizchina.com
UMIDIGI Smartphones: Trusted Worldwide, Loved by Users Everywhere
https://www.gizchina.com/2025/07/29/umidigi-smartphones-trusted-worldwide-loved-by-users-everywhere/
https://www.gizchina.com/2025/07/29/umidigi-smartphones-trusted-worldwide-loved-by-users-everywhere/
Forwarded from Gizchina.com
Ulefone Armor 33 Series Launched: 25,500mAh Super Battery and Dual-Screen Rugged Phone
https://www.gizchina.com/2025/07/30/ulefone-armor-33-series-launched-25500mah-super-battery/
https://www.gizchina.com/2025/07/30/ulefone-armor-33-series-launched-25500mah-super-battery/
Forwarded from Gizchina.com
Tech Companies Are the New Governments – And We Never Voted
https://www.gizchina.com/2025/07/30/tech-companies-are-the-new-governments-and-we-never-voted/
https://www.gizchina.com/2025/07/30/tech-companies-are-the-new-governments-and-we-never-voted/
Forwarded from The Hacker News
⚡ Scattered Spider hacker group just went quiet—but don’t exhale yet.
After UK arrests, Mandiant says the group’s intrusions have stopped.
But copycats are already using their same ruthless tactics.
Now’s the moment to harden your defenses.
Read - https://thehackernews.com/2025/07/scattered-spider-hacker-arrests-halt.html
After UK arrests, Mandiant says the group’s intrusions have stopped.
But copycats are already using their same ruthless tactics.
Now’s the moment to harden your defenses.
Read - https://thehackernews.com/2025/07/scattered-spider-hacker-arrests-halt.html
Forwarded from The Hacker News
A critical SAP flaw just gave hackers remote access to a U.S. chemicals company.
They deployed Auto-Color—stealthy Linux malware that hides itself when it can’t reach its C2 server.
Details you need to know ↓ https://thehackernews.com/2025/07/hackers-exploit-sap-vulnerability-to.html
They deployed Auto-Color—stealthy Linux malware that hides itself when it can’t reach its C2 server.
Details you need to know ↓ https://thehackernews.com/2025/07/hackers-exploit-sap-vulnerability-to.html
Forwarded from The Hacker News
🚨 Most ransomware attacks don’t hack in—they log in.
EDR alone can’t stop attackers using legit credentials.
The fix? Pair it with Endpoint Privilege Management (EPM) to shut down stealthy privilege abuse before it starts.
Here’s why both are critical ↓ https://thehackernews.com/expert-insights/2025/07/edr-detects-epm-prevents-why-using-both.html
EDR alone can’t stop attackers using legit credentials.
The fix? Pair it with Endpoint Privilege Management (EPM) to shut down stealthy privilege abuse before it starts.
Here’s why both are critical ↓ https://thehackernews.com/expert-insights/2025/07/edr-detects-epm-prevents-why-using-both.html
Forwarded from The Hacker News
🚨 Google just fired a double shot at cyber threats:
➟ DBSC is now in open beta — it locks session cookies to your device, stopping attackers from hijacking logins.
➟ Project Zero goes public with unpatched bug reports to pressure faster fixes.
Big moves to end cookie theft & shrink patch gaps.
Details here ↓ https://thehackernews.com/2025/07/google-launches-dbsc-open-beta-in.html
➟ DBSC is now in open beta — it locks session cookies to your device, stopping attackers from hijacking logins.
➟ Project Zero goes public with unpatched bug reports to pressure faster fixes.
Big moves to end cookie theft & shrink patch gaps.
Details here ↓ https://thehackernews.com/2025/07/google-launches-dbsc-open-beta-in.html
Forwarded from Hacker News
Forwarded from Tech & Leaks Zone
Even to listen to music and podcasts on Spotify, people in the UK atleast now need to verify their age through Face or ID verification
This is real btw: https://support.spotify.com/uk/article/age-restricted-content-age-check/
Follow @TechLeaksZone
This is real btw: https://support.spotify.com/uk/article/age-restricted-content-age-check/
Follow @TechLeaksZone
Forwarded from Tech & Leaks Zone
Europe is changing — but not by accident.
Censorship is rising. Elections are manipulated. Borders are exploited. Democracy is being quietly dismantled by those in power.
We investigate what others won’t:
– How free speech is being erased
– How unelected elites pressure entire nations
– How propaganda networks shape public opinion
– And who truly benefits from the chaos
This isn’t a newsfeed. It’s a warning system.
👉 Subscribe now — and see what they want buried. Truth still matters. Help us defend it.
https://t.me/restinvestigate
Censorship is rising. Elections are manipulated. Borders are exploited. Democracy is being quietly dismantled by those in power.
We investigate what others won’t:
– How free speech is being erased
– How unelected elites pressure entire nations
– How propaganda networks shape public opinion
– And who truly benefits from the chaos
This isn’t a newsfeed. It’s a warning system.
👉 Subscribe now — and see what they want buried. Truth still matters. Help us defend it.
https://t.me/restinvestigate
Forwarded from 𝚁𝚎𝚟𝚎𝚕𝚊𝚝𝚒𝚘𝚗𝚜 𝚊𝚗𝚍 𝚁𝚊𝚋𝚋𝚒𝚝 𝙷𝚘𝚕𝚎𝚜
When Your Power Meter Becomes a Tool of Mass Surveillance
Sacramento’s power company and law enforcement agencies have been running an illegal mass surveillance scheme for years, using our power meters as home-mounted spies. – Article
Sacramento’s power company and law enforcement agencies have been running an illegal mass surveillance scheme for years, using our power meters as home-mounted spies. – Article
Matrix.org will start complying with age verification.
Forwarded from 0•Bytes•1
Hello, my Sonys and Cheshire Cats! 🐭✨🐈⬛
Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet andmyths about killer towers, then 6G will raise the bar📡
Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩
6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:it doesn't work well in practice, as these waves don't pass through walls very well😓, so dense networks with lots of small antennas (massive MIMO) are needed. Traffic and security management is handled by AI, which distributes the data. Quantum encryption is also used to protect communications. 6G also has blockchain, which is needed for transparency: blockchain records who uses the network and how. Satellites are connected to provide coverage in remote areas, and RIS (smart reflective surfaces) technology helps direct signals where walls interfere.
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection — developers are already coming up with ways to deal with threats🛡
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (although some algorithms could use some refinement against conventional threats ). Quantum key distribution makes encryption unbreakable; any attempt at interception is immediately noticeable. For devices such as IoT sensors, encryption algorithms are being developed that do not require powerful hardware.
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet and
Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩
6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection — developers are already coming up with ways to deal with threats
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
it seems to me that they want to cram a bunch of hyped technologies into it that may not work as intended in practice. But it seems that this technology is being actively developed, so let's see what happens next🔑If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 0•Bytes•1
6g.zip
10.7 MB
В архиве есть статьи про архктикуру 6g, про возможные атаки на него, а так же про меры защиты. Надеюсь вам будет полезно 📶❤️🔥
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
Forwarded from 0•Bytes•1
Welcome to my Alice tea party! 🫖🎀
I decided to write a series of short posts about secure operating systems 🖥🐧
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.Spoiler alert: no, it's not.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?🧩
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix 🔓
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that — you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems — everything works out of the box.
But what's wrong with VirtualBox?🪤
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer🫠. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? ⚙️
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it💊
I hope you found this useful.❤️✨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf — here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations — about the shortcomings of Whonix and Tor.
JOSH Article — analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
I decided to write a series of short posts about secure operating systems 🖥
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?🧩
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix 🔓
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that — you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems — everything works out of the box.
But what's wrong with VirtualBox?🪤
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer🫠. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? ⚙️
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it
I hope you found this useful.❤️✨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf — here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations — about the shortcomings of Whonix and Tor.
JOSH Article — analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Whonix
Whonix Documentation
A Crash Course in Anonymity and Security on the Internet.