Forwarded from 0•Bytes•1
6g.zip
10.7 MB
В архиве есть статьи про архктикуру 6g, про возможные атаки на него, а так же про меры защиты. Надеюсь вам будет полезно 📶❤️🔥
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️🔥
#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
Forwarded from 0•Bytes•1
Welcome to my Alice tea party! 🫖🎀
I decided to write a series of short posts about secure operating systems 🖥🐧
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.Spoiler alert: no, it's not.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?🧩
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix 🔓
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that — you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems — everything works out of the box.
But what's wrong with VirtualBox?🪤
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer🫠. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? ⚙️
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it💊
I hope you found this useful.❤️✨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf — here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations — about the shortcomings of Whonix and Tor.
JOSH Article — analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
I decided to write a series of short posts about secure operating systems 🖥
Today, we'll take a look at Whonix and find out if it's as good and anonymous as people say.
Let me clarify right away: Whonix is not a full-fledged operating system, but a tool for anonymity that can work independently or as a router in Qubes OS. In this article, I will focus on analyzing how it works as a standalone system
How does Whonix work?🧩
Whonix is built on two virtual machines: Whonix-Gateway and Whonix-Workstation. Gateway configures and routes all your traffic through the Tor network. Workstation is your workplace. If you want to dig deeper, check out their documentation.
Problems with Whonix 🔓
Now to the point: why Whonix isn't really necessary. Let's start with Gateway. It's just Debian with Tor pre-installed and a bunch of scripts that redirect traffic through Tor. Everything is tied to the configuration in the settings file and iptables rules. Cool? Not really. Plus, Whonix drags along old Debian, where packages are updated once in a blue moon.
Whonix positions itself as super protection against leaks, but if you don't understand what you're doing, no virtual machine will save you. For example, if you run a browser with JavaScript or download files and then open them outside of Workstation, your anonymity is gone.
By the way, Whonix can only be run without problems on VirtualBox. You may argue that there are versions for KVM/QEMU on their website. But that's where the problems begin. If you take Whonix for KVM, you won't be able to install it just like that — you need to edit the configuration, and there are no detailed instructions on how to do this anywhere. With VirtualBox, however, there are no such problems — everything works out of the box.
But what's wrong with VirtualBox?🪤
Besides the fact that it is significantly slower than KVM. In March 2025, a vulnerability CVE-2025-30712 with a rating of 8.1 appeared in Virtualbox. It allows an attacker with access to the host system to perform a VM escape, i.e., to get out of the virtual machine onto your main computer🫠. Proof-of-concept is already circulating on the network, and exploitation is easier than it seems. If the host is compromised, all your anonymity goes down the drain, and your real IP or other data may leak.
How to make an analogue of Whunix Gateway? ⚙️
But there is another way. The Gateway model itself is not bad. But you can create a machine with it yourself without Whunix, using a minimalist Linux (such as Gentoo or even FreeBSD instead of Linux). Then configure Tor directly. After all, Gateway is just a wrapper around the standard Tor and iptables settings, which can be found on Google in five minutes. Now add the iptables you found and DNSPort to the Tor config so that DNS requests also go through Tor, and that's it. This takes up less space and reduces the attack surface.
Conclusion
To be fair, Whonix isn't always bad. But it can be useful in conjunction with Qubes OS (where it runs in KVM, by the way), which has additional security mechanisms, such as domain isolation, that enhance security. But apart from Qubes, Whonix is pretty pointless. You might think it's suitable for those who don't want to bother with configuring Tor, but that's not the case. To run Whonix on a decent VM, such as KVM, you'll have to go through just as much trouble.
The bottom line is simple: Whonix is not a super-anonymous OS, but a tool that complicates life more than it protects it
I hope you found this useful.❤️✨ If you wish, you can explore the topic yourself by reading research and testing the system.
Here are some good articles about Whonix:
THESIS.pdf — here is an overview of anonymous operating systems, including Whonix.
Whonix and Tor Limitations — about the shortcomings of Whonix and Tor.
JOSH Article — analysis of Whonix limitations.
#anonymity #linux #whunix #cve #anonymity_os #tor #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Whonix
Whonix Documentation
A Crash Course in Anonymity and Security on the Internet.
Forwarded from NoGoolag
🇬🇧🇪🇺🇦🇺 Things you've missed.
>UK talks about Banning VPNS
>Russia Talks about Banning VPNS
>Cloudflare asked to ban VPNS in UK
>Kids bypassed the age verification with AI generated pictures or fortnite characters making me believe that in the future facial scan will be removed in favor for ID verification only.
>Itch io removed thousands of games.
>Horror games are now banned. You've mentioned Mouth wash but fear and hunger also got banned
>collective shout claims innocence they never wanted this, asks people stop engaging with them
>EU is passing a digital safety act next year which is the reason the sites are restricted
>Australia is passing an act too which is just as draconic if not more so than the one in UK
>Protests and anti imigration topics including a speech in the UK parlament by a politician is labled as "not safe for kids, despite kids at the age of 16 will be able to vote in UK"
🔗 Vee
>UK talks about Banning VPNS
>Russia Talks about Banning VPNS
>Cloudflare asked to ban VPNS in UK
>Kids bypassed the age verification with AI generated pictures or fortnite characters making me believe that in the future facial scan will be removed in favor for ID verification only.
>Itch io removed thousands of games.
>Horror games are now banned. You've mentioned Mouth wash but fear and hunger also got banned
>collective shout claims innocence they never wanted this, asks people stop engaging with them
>EU is passing a digital safety act next year which is the reason the sites are restricted
>Australia is passing an act too which is just as draconic if not more so than the one in UK
>Protests and anti imigration topics including a speech in the UK parlament by a politician is labled as "not safe for kids, despite kids at the age of 16 will be able to vote in UK"
🔗 Vee
Forwarded from Gizchina.com
Unlock Your Phone Effortlessly: Google’s WearOS & Android Integration May Arrive Soon
https://www.gizchina.com/2025/07/30/wearos-android-smart-unlock/
https://www.gizchina.com/2025/07/30/wearos-android-smart-unlock/
Forwarded from It's FOSS
A new TUXEDO Computers laptop for you to consider. 😉
https://news.itsfoss.com/tuxedo-infinitybook-pro-15-gen10/
https://news.itsfoss.com/tuxedo-infinitybook-pro-15-gen10/
It's FOSS News
Best Linux Laptop of 2025? TUXEDO InfinityBook Pro 15 (Gen10) Launches
Beast specifications. Pre-orders open now, mid-August shipping.
Forwarded from The Hacker News
🚨 Critical flaws in Dahua smart cameras let attackers take full remote control—no login needed.
Used in homes, stores, and casinos, these bugs allow root access, persistent malware, and no easy fix.
Exposed devices are still at risk.
Full details → https://thehackernews.com/2025/07/critical-dahua-camera-flaws-enable.html
Used in homes, stores, and casinos, these bugs allow root access, persistent malware, and no easy fix.
Exposed devices are still at risk.
Full details → https://thehackernews.com/2025/07/critical-dahua-camera-flaws-enable.html
Forwarded from The Hacker News
🚨 Your AI agent might already be vulnerable.
Pillar Security just launched a full-lifecycle AI defense platform—built by ex-offensive and defensive cyber ops—to catch threats before code is even written.
From threat modeling to runtime guardrails, this flips AI security on its head.
Full story → https://thehackernews.com/2025/07/product-walkthrough-look-inside-pillars.html
Pillar Security just launched a full-lifecycle AI defense platform—built by ex-offensive and defensive cyber ops—to catch threats before code is even written.
From threat modeling to runtime guardrails, this flips AI security on its head.
Full story → https://thehackernews.com/2025/07/product-walkthrough-look-inside-pillars.html
Forwarded from The Hacker News
Custom containers, zero headaches.
ActiveState builds and scans your stack from OS to app—SBOM, low-to-no CVEs, ready for your CI/CD. Own your security. Stop inheriting risk.
Customize Your Container → https://thn.news/activestate-container-security
#DevSecOps #OpenSourceSecurity
ActiveState builds and scans your stack from OS to app—SBOM, low-to-no CVEs, ready for your CI/CD. Own your security. Stop inheriting risk.
Customize Your Container → https://thn.news/activestate-container-security
#DevSecOps #OpenSourceSecurity
Forwarded from VD Priv8 (VD171) 🇧🇷🇷🇺🇮🇳🇨🇳🇮🇷🇻🇪
Banning the SSAID (Settings.Secure.ANDROID_ID) is a common behavior of rooting detectors, as we can see here:
https://helpcenter.appsealing.com/hc/en-us/articles/11795270760345-Android-Hacking-detection-codes
Changing or spoofing the SSAID should be considered when bypassing some eventual persistent detection.
Here are some ways for changing or spoofing the SSAID:
All them are free.
All them are per app based.
SettingsFirewall (For noob users) (Spoof temporarily)
Download: https://github.com/canyie/SettingsFirewall/releases
XPL-EX (For experienced users) (Spoof temporarily)
Download: @XPL_EX @XPL_EX_CHAT
AppManager (For noob users) (Change permanently)
Download: @AppManagerChannel @AppManagerDebug
settings_ssaid.xml (For experienced users) (Change permanently)
Some example apps with this behavior:
https://t.me/RootDetected/2450
Do you need help with rooting suites?
Join @BlankAssistance
Do you want to get news about rooting solutions?
Join @RootDetected
https://helpcenter.appsealing.com/hc/en-us/articles/11795270760345-Android-Hacking-detection-codes
Changing or spoofing the SSAID should be considered when bypassing some eventual persistent detection.
Here are some ways for changing or spoofing the SSAID:
All them are free.
All them are per app based.
SettingsFirewall (For noob users) (Spoof temporarily)
Install the app SettingsFirewall, enable it in LSPosed, enable System Framework in scope list, reboot, open SettingsFirewall, search for the app, enable the app, click the app, search for "android_id" and set a new SSAID for it.
Download: https://github.com/canyie/SettingsFirewall/releases
XPL-EX (For experienced users) (Spoof temporarily)
Install the app XPL-EX, enable it in LSPosed, enable the app in scope list, open XPL-EX, search for the app, enable ID hooks and set a new SSAID for it.
Download: @XPL_EX @XPL_EX_CHAT
AppManager (For noob users) (Change permanently)
Install the app AppManager, open AppManager, grant root access, search for the app and set a new SSAID for it.
Download: @AppManagerChannel @AppManagerDebug
settings_ssaid.xml (For experienced users) (Change permanently)
Edit the file /data/system/users/(user_id_number)/settings_ssaid.xml, search for the app and write a new SSAID for it.
Some example apps with this behavior:
- Attendance Management System (com.icici.iciciattendance)
- Bancolombia Negocios (co.com.bancolombia.canalesmoviles.apppyme)
- BBVA España | Banca Online (com.bbva.bbvacontigo)
- BIZ MBBANK (com.mbcorp)
- BJJ Mobile (com.dwidasa.mb.bjj)
- BNI Merchant (id.co.bni.merchant)
- CorePass ID (net.corepass.app)
- DigiSales (com.digisaleswebview)
- FED MERCHANT APP (com.federalbank.bqr.bharat_qr)
- FIRSTFORWARD AGENT APP (com.idfcfirstbank.fastag)
- ICICI Bank Money2India (com.icicibank.m2i)
- iFAST GB (com.ifast.gb)
- IVB Mobile Banking (com.vnpay.ivb)
- m-BNISmarter (com.bnicorpu.smarter)
- Mobile Approval System (MAS) (com.icici.mas)
- Money2India Europe (com.icicibank.m2iEuropenew)
- NextGen mParivahan (com.nic.mparivahan)
- NSDL Jiffy: Zero Balance A/C (com.nsdlpb.jiffy)
- RailOne (org.cris.aikyam)
- TPBank Mobile (com.tpb.mb.gprsandroid)
- WalkTask-Contador de passos (com.walktask.app)
https://t.me/RootDetected/2450
Do you need help with rooting suites?
Join @BlankAssistance
Do you want to get news about rooting solutions?
Join @RootDetected
Forwarded from Hacker News
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Infamick
Infamick is a powerful system utility script for rooted Android devices. It provides easy access to various system information and settings, making it an essential tool for all users.
🔗 Links:
- Download
- Usage and commands
- Features
- Source code
Developer:Infamousmick
🏷 Tags: #Android #Root #Modules #Optimization
Infamick is a powerful system utility script for rooted Android devices. It provides easy access to various system information and settings, making it an essential tool for all users.
🔗 Links:
- Download
- Usage and commands
- Features
- Source code
Developer:Infamousmick
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #Root #Modules #Optimization
Forwarded from Gizchina.com
Best Smartphones Under $400 – July 2025
https://www.gizchina.com/2025/07/30/best-smartphones-under-400-july-2025/
https://www.gizchina.com/2025/07/30/best-smartphones-under-400-july-2025/
Forwarded from Gizchina.com
Best Smartphones Under $600 – July 2025
https://www.gizchina.com/2025/07/30/best-smartphones-under-600-july-2025/
https://www.gizchina.com/2025/07/30/best-smartphones-under-600-july-2025/
Forwarded from Gizchina.com
Best Smartphones Under $200 – July 2025
https://www.gizchina.com/2025/07/30/best-smartphones-under-200-july-2025/
https://www.gizchina.com/2025/07/30/best-smartphones-under-200-july-2025/
Forwarded from The Hacker News
🔥 A free decryptor just landed for FunkSec ransomware — 172 victims hit across tech, gov, and education can now get their files back.
Built with AI. Written in Rust. Broken by rookies.
Get the tool + full story ↓ https://thehackernews.com/2025/07/funksec-ransomware-decryptor-released.html
Built with AI. Written in Rust. Broken by rookies.
Get the tool + full story ↓ https://thehackernews.com/2025/07/funksec-ransomware-decryptor-released.html
Forwarded from The Hacker News
🚨 Thousands tricked by fake crypto apps via Facebook ads.
They install a stealthy new malware—JSCEAL—that hijacks wallets, steals passwords in real-time, and evades most detection tools.
Worse? It's still active.
Here’s how it works (and how to avoid it) ↓ https://thehackernews.com/2025/07/hackers-use-facebook-ads-to-spread.html
They install a stealthy new malware—JSCEAL—that hijacks wallets, steals passwords in real-time, and evades most detection tools.
Worse? It's still active.
Here’s how it works (and how to avoid it) ↓ https://thehackernews.com/2025/07/hackers-use-facebook-ads-to-spread.html
Forwarded from Mishaal's Android News Feed
📺 It's another day that ends in Y, so YouTube is testing another UI change.
This time, YouTube is testing a new UI on mobile that hides the comments box and channel info by default.
Screenshots👇
🔗 https://www.androidauthority.com/youtube-hide-comments-dropdown-3582521/
This time, YouTube is testing a new UI on mobile that hides the comments box and channel info by default.
Screenshots👇
🔗 https://www.androidauthority.com/youtube-hide-comments-dropdown-3582521/
Android Authority
YouTube is thinking about letting you avoid video comments entirely on mobile
YouTube is testing a new UI in the mobile app where the comments box and channel info are hidden by default.