Forwarded from 𝚁𝚎𝚟𝚎𝚕𝚊𝚝𝚒𝚘𝚗𝚜 𝚊𝚗𝚍 𝚁𝚊𝚋𝚋𝚒𝚝 𝙷𝚘𝚕𝚎𝚜
When Your Power Meter Becomes a Tool of Mass Surveillance
Sacramento’s power company and law enforcement agencies have been running an illegal mass surveillance scheme for years, using our power meters as home-mounted spies. – Article
Sacramento’s power company and law enforcement agencies have been running an illegal mass surveillance scheme for years, using our power meters as home-mounted spies. – Article
Matrix.org will start complying with age verification.
Forwarded from 0•Bytes•1
Hello, my Sonys and Cheshire Cats! 🐭✨🐈⬛
Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet andmyths about killer towers, then 6G will raise the bar📡
Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩
6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:it doesn't work well in practice, as these waves don't pass through walls very well😓, so dense networks with lots of small antennas (massive MIMO) are needed. Traffic and security management is handled by AI, which distributes the data. Quantum encryption is also used to protect communications. 6G also has blockchain, which is needed for transparency: blockchain records who uses the network and how. Satellites are connected to provide coverage in remote areas, and RIS (smart reflective surfaces) technology helps direct signals where walls interfere.
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection — developers are already coming up with ways to deal with threats🛡
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (although some algorithms could use some refinement against conventional threats ). Quantum key distribution makes encryption unbreakable; any attempt at interception is immediately noticeable. For devices such as IoT sensors, encryption algorithms are being developed that do not require powerful hardware.
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet and
Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩
6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance:
But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓
For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.
But there is no shortage of protection — developers are already coming up with ways to deal with threats
They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.
Personally, I am still a little skeptical about 6G:
it seems to me that they want to cram a bunch of hyped technologies into it that may not work as intended in practice. But it seems that this technology is being actively developed, so let's see what happens next🔑If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 0•Bytes•1
6g.zip
10.7 MB
В архиве есть статьи про архктикуру 6g, про возможные атаки на него, а так же про меры защиты. Надеюсь вам будет полезно 📶❤️🔥
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
Forwarded from 0•Bytes•1
Welcome to my Alice tea party! 🫖🎀
I decided to write a series of short posts about secure operating systems 🖥🐧
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.Spoiler alert: no, it's not.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?🧩
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix 🔓
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that — you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems — everything works out of the box.
But what's wrong with VirtualBox?🪤
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer🫠. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? ⚙️
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it💊
I hope you found this useful.❤️✨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf — here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations — about the shortcomings of Whonix and Tor.
JOSH Article — analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
I decided to write a series of short posts about secure operating systems 🖥
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?🧩
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix 🔓
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that — you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems — everything works out of the box.
But what's wrong with VirtualBox?🪤
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer🫠. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? ⚙️
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it
I hope you found this useful.❤️✨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf — here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations — about the shortcomings of Whonix and Tor.
JOSH Article — analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Whonix
Whonix Documentation
A Crash Course in Anonymity and Security on the Internet.
Forwarded from NoGoolag
🇬🇧🇪🇺🇦🇺 Things you've missed.
>UK talks about Banning VPNS
>Russia Talks about Banning VPNS
>Cloudflare asked to ban VPNS in UK
>Kids bypassed the age verification with AI generated pictures or fortnite characters making me believe that in the future facial scan will be removed in favor for ID verification only.
>Itch io removed thousands of games.
>Horror games are now banned. You've mentioned Mouth wash but fear and hunger also got banned
>collective shout claims innocence they never wanted this, asks people stop engaging with them
>EU is passing a digital safety act next year which is the reason the sites are restricted
>Australia is passing an act too which is just as draconic if not more so than the one in UK
>Protests and anti imigration topics including a speech in the UK parlament by a politician is labled as "not safe for kids, despite kids at the age of 16 will be able to vote in UK"
🔗 Vee
>UK talks about Banning VPNS
>Russia Talks about Banning VPNS
>Cloudflare asked to ban VPNS in UK
>Kids bypassed the age verification with AI generated pictures or fortnite characters making me believe that in the future facial scan will be removed in favor for ID verification only.
>Itch io removed thousands of games.
>Horror games are now banned. You've mentioned Mouth wash but fear and hunger also got banned
>collective shout claims innocence they never wanted this, asks people stop engaging with them
>EU is passing a digital safety act next year which is the reason the sites are restricted
>Australia is passing an act too which is just as draconic if not more so than the one in UK
>Protests and anti imigration topics including a speech in the UK parlament by a politician is labled as "not safe for kids, despite kids at the age of 16 will be able to vote in UK"
🔗 Vee
Forwarded from Gizchina.com
Unlock Your Phone Effortlessly: Google’s WearOS & Android Integration May Arrive Soon
https://www.gizchina.com/2025/07/30/wearos-android-smart-unlock/
https://www.gizchina.com/2025/07/30/wearos-android-smart-unlock/
Forwarded from It's FOSS
A new TUXEDO Computers laptop for you to consider. 😉
https://news.itsfoss.com/tuxedo-infinitybook-pro-15-gen10/
https://news.itsfoss.com/tuxedo-infinitybook-pro-15-gen10/
It's FOSS News
Best Linux Laptop of 2025? TUXEDO InfinityBook Pro 15 (Gen10) Launches
Beast specifications. Pre-orders open now, mid-August shipping.
Forwarded from The Hacker News
🚨 Critical flaws in Dahua smart cameras let attackers take full remote control—no login needed.
Used in homes, stores, and casinos, these bugs allow root access, persistent malware, and no easy fix.
Exposed devices are still at risk.
Full details → https://thehackernews.com/2025/07/critical-dahua-camera-flaws-enable.html
Used in homes, stores, and casinos, these bugs allow root access, persistent malware, and no easy fix.
Exposed devices are still at risk.
Full details → https://thehackernews.com/2025/07/critical-dahua-camera-flaws-enable.html
Forwarded from The Hacker News
🚨 Your AI agent might already be vulnerable.
Pillar Security just launched a full-lifecycle AI defense platform—built by ex-offensive and defensive cyber ops—to catch threats before code is even written.
From threat modeling to runtime guardrails, this flips AI security on its head.
Full story → https://thehackernews.com/2025/07/product-walkthrough-look-inside-pillars.html
Pillar Security just launched a full-lifecycle AI defense platform—built by ex-offensive and defensive cyber ops—to catch threats before code is even written.
From threat modeling to runtime guardrails, this flips AI security on its head.
Full story → https://thehackernews.com/2025/07/product-walkthrough-look-inside-pillars.html
Forwarded from The Hacker News
Custom containers, zero headaches.
ActiveState builds and scans your stack from OS to app—SBOM, low-to-no CVEs, ready for your CI/CD. Own your security. Stop inheriting risk.
Customize Your Container → https://thn.news/activestate-container-security
#DevSecOps #OpenSourceSecurity
ActiveState builds and scans your stack from OS to app—SBOM, low-to-no CVEs, ready for your CI/CD. Own your security. Stop inheriting risk.
Customize Your Container → https://thn.news/activestate-container-security
#DevSecOps #OpenSourceSecurity
Forwarded from VD Priv8 (VD171) 🇧🇷🇷🇺🇮🇳🇨🇳🇮🇷🇻🇪
Banning the SSAID (Settings.Secure.ANDROID_ID) is a common behavior of rooting detectors, as we can see here:
https://helpcenter.appsealing.com/hc/en-us/articles/11795270760345-Android-Hacking-detection-codes
Changing or spoofing the SSAID should be considered when bypassing some eventual persistent detection.
Here are some ways for changing or spoofing the SSAID:
All them are free.
All them are per app based.
SettingsFirewall (For noob users) (Spoof temporarily)
Download: https://github.com/canyie/SettingsFirewall/releases
XPL-EX (For experienced users) (Spoof temporarily)
Download: @XPL_EX @XPL_EX_CHAT
AppManager (For noob users) (Change permanently)
Download: @AppManagerChannel @AppManagerDebug
settings_ssaid.xml (For experienced users) (Change permanently)
Some example apps with this behavior:
https://t.me/RootDetected/2450
Do you need help with rooting suites?
Join @BlankAssistance
Do you want to get news about rooting solutions?
Join @RootDetected
https://helpcenter.appsealing.com/hc/en-us/articles/11795270760345-Android-Hacking-detection-codes
Changing or spoofing the SSAID should be considered when bypassing some eventual persistent detection.
Here are some ways for changing or spoofing the SSAID:
All them are free.
All them are per app based.
SettingsFirewall (For noob users) (Spoof temporarily)
Install the app SettingsFirewall, enable it in LSPosed, enable System Framework in scope list, reboot, open SettingsFirewall, search for the app, enable the app, click the app, search for "android_id" and set a new SSAID for it.
Download: https://github.com/canyie/SettingsFirewall/releases
XPL-EX (For experienced users) (Spoof temporarily)
Install the app XPL-EX, enable it in LSPosed, enable the app in scope list, open XPL-EX, search for the app, enable ID hooks and set a new SSAID for it.
Download: @XPL_EX @XPL_EX_CHAT
AppManager (For noob users) (Change permanently)
Install the app AppManager, open AppManager, grant root access, search for the app and set a new SSAID for it.
Download: @AppManagerChannel @AppManagerDebug
settings_ssaid.xml (For experienced users) (Change permanently)
Edit the file /data/system/users/(user_id_number)/settings_ssaid.xml, search for the app and write a new SSAID for it.
Some example apps with this behavior:
- Attendance Management System (com.icici.iciciattendance)
- Bancolombia Negocios (co.com.bancolombia.canalesmoviles.apppyme)
- BBVA España | Banca Online (com.bbva.bbvacontigo)
- BIZ MBBANK (com.mbcorp)
- BJJ Mobile (com.dwidasa.mb.bjj)
- BNI Merchant (id.co.bni.merchant)
- CorePass ID (net.corepass.app)
- DigiSales (com.digisaleswebview)
- FED MERCHANT APP (com.federalbank.bqr.bharat_qr)
- FIRSTFORWARD AGENT APP (com.idfcfirstbank.fastag)
- ICICI Bank Money2India (com.icicibank.m2i)
- iFAST GB (com.ifast.gb)
- IVB Mobile Banking (com.vnpay.ivb)
- m-BNISmarter (com.bnicorpu.smarter)
- Mobile Approval System (MAS) (com.icici.mas)
- Money2India Europe (com.icicibank.m2iEuropenew)
- NextGen mParivahan (com.nic.mparivahan)
- NSDL Jiffy: Zero Balance A/C (com.nsdlpb.jiffy)
- RailOne (org.cris.aikyam)
- TPBank Mobile (com.tpb.mb.gprsandroid)
- WalkTask-Contador de passos (com.walktask.app)
https://t.me/RootDetected/2450
Do you need help with rooting suites?
Join @BlankAssistance
Do you want to get news about rooting solutions?
Join @RootDetected
Forwarded from Hacker News
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Infamick
Infamick is a powerful system utility script for rooted Android devices. It provides easy access to various system information and settings, making it an essential tool for all users.
🔗 Links:
- Download
- Usage and commands
- Features
- Source code
Developer:Infamousmick
🏷 Tags: #Android #Root #Modules #Optimization
Infamick is a powerful system utility script for rooted Android devices. It provides easy access to various system information and settings, making it an essential tool for all users.
🔗 Links:
- Download
- Usage and commands
- Features
- Source code
Developer:Infamousmick
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #Root #Modules #Optimization
Forwarded from Gizchina.com
Best Smartphones Under $400 – July 2025
https://www.gizchina.com/2025/07/30/best-smartphones-under-400-july-2025/
https://www.gizchina.com/2025/07/30/best-smartphones-under-400-july-2025/
Forwarded from Gizchina.com
Best Smartphones Under $600 – July 2025
https://www.gizchina.com/2025/07/30/best-smartphones-under-600-july-2025/
https://www.gizchina.com/2025/07/30/best-smartphones-under-600-july-2025/