Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
579 videos
530 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Hacker News
If you Google 'bad UX', all the results appear in Comic Sans
Article, Comments
Forwarded from cKure
■■□□□ DoS campaign continue to batter Israel 🇮🇱 as disruptions continue.

In a message, by the hacker group.

The website of MEPROLIGHT an Israeli company specializing in the manufacture of optical systems and illuminated optical sights used in weapons for many militaries and law enforcement agencies around the world has been taken down

https://check-host.net/check-report/2adfe3e7kdde
https://check-host.net/check-report/2adfe1c4ke32

#DieNet
Forwarded from cKure
■■■■■ #️⃣ hashcat v7.0.0 released!

After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had.

https://hashcat.net/forum/thread-13330.html
Please open Telegram to view this post
VIEW IN TELEGRAM
■■□□□ Interesting thread!

ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index.

https://fixupx.com/henkvaness/status/1951252284953763844

https://nitter.poast.org/henkvaness/status/1951252284953763844

ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index after our investigation. They thought they'd solved the problem. They were wrong. (1/5)

A new Digital Digging investigation, conducted with @osint77760, has uncovered 110,000 ChatGPT conversations preserved in http://Archive.org's Wayback Machine—a digital time capsule OpenAI can't touch. (2/5)

@osint77760 While OpenAI scrambled to de-index conversations from Google, they forgot the internet's most basic rule—nothing truly disappears. http://Archive.org had already captured everything. (3/5)

@osint77760 In one particularly damning conversation, an Italian-speaking lawyer for a multinational energy corporation laid bare their strategy to displace indigenous Amazonian communities. (4/5)

@osint77760 Read the full story here https://www.digitaldigging.org/p/chatgpt-confessions-gone-they-are
No deleted account found from 67 scanned users from this group 🚫👻
#A16 #Official #TD #GSI #DerpFest #AOSP

Build Date: 2025 08 01
July Security Patch

DerpFest 16.0 | A16 QPR0 | TREBLE GSI OFFICIAL-signed

Changelog:
Sync latest source of DerpFest
MicroG build
arm32_binder64 build
More little things here and there, just enjoy derpfest
Telegram file download here
Note
circle to search works depending on your device as the feature has not been fully implemented


SCREENSHOTS - LINK
SUPPORT GROUP - LINK

Maintainer: Doze-off
Download: LINK

@TrebleGsis_PrivacySecure_Chat
@TrebleGsis_PrivacySecure_Channel
The CIA is preparing for a powerful artificial intelligence “game changer” to emerge and upend the spy business.

CIA Deputy Director Michael Ellis told The Washington Times it is “still unclear” when artificial general intelligence may arrive, but the agency is gearing up.
Forwarded from KernelSU Next
https://github.com/Kernel-SU/ksuinit/commits/master/

Ksuinit finally open sourced, so ksu is now fully open source!

Bruh i wasted time on my own ksuninit... Oh well i will fork and work on it instead.
This media is not supported in your browser
VIEW IN TELEGRAM
Xbox to introduce age verification in the UK.

You know it's getting pretty bad, when the government, starts to fully want verification of your ID to play a video game....

This is purely wanted for surveillance and analyzing the information used while people are chatting with friends. So if you try to use other ways of communication, you're linked to your government ID. No anonymity.

https://news.xbox.com/en-us/2025/07/28/xbox-age-verification-uk/
Forwarded from The Hacker News
🚨 Akira ransomware is hitting SonicWall SSL VPNs—some fully patched.

Researchers suspect a zero-day or credential abuse. Attacks surged in late July.

Org? Disable SSL VPN until further notice.

Full details ↓ https://thehackernews.com/2025/08/akira-ransomware-exploits-sonicwall.html
https://linuxmint.hu/hir/2025/08/ujabb-rosszindulatu-program-az-arch-aur-ban

Another Malware Found in Arch AUR

Another Malware Found in Arch AUR: Another Malicious Code Found in the Popular Package Repository

Just ten days after the previous incident, another malicious software was found among the Arch Linux AUR packages. This time, the attackers hid a Remote Access Trojan (RAT) in a seemingly harmless package disguised as a browser.

What exactly happened?

The AUR (Arch User Repository) is a collection of software created by the Arch Linux community and maintained by users, which many consider to be one of the greatest advantages of Arch, almost a “hidden treasure”. However, due to its completely open upload system, it can also become a target for malware.

After the previous incident ten days ago, a Remote Access Trojan (RAT) has now been added to the package repository. This time, the malicious code was hidden in a package called google-chrome-stable. The package not only installed the Google Chrome browser, but also used a Python script to download and run an external resource containing the malicious code every time it was started.

This type of malware can give attackers full access to the infected machine, allowing them to steal data, install additional malicious software, or even spy on it.

How did the package get uploaded?

The problematic package was uploaded by a newly registered user under the username “forsenontop”. In the PKGBUILD file, an install script (google-chrome-bin.install) called a launcher script (google-chrome-stable.sh) that ran a Python command with the -c option before Chrome was launched. This command pulled in an external resource on every launch, which downloaded the malware.

The good news is that the package was only available in the AUR for a few hours before it was detected and immediately removed by administrators. However, it still received a few upvotes, suggesting that several users may have already installed it.

What should affected users do?

If someone has installed the malicious package, they should immediately remove it and run a full security scan on their system. However, experts in the Arch community say that the safest solution is a full system reinstall (OS preinstall) to rule out any backdoors or hidden malicious code.

What’s the lesson?

This incident once again highlights that while the AUR is an extremely useful resource, the security of packages is not the responsibility of the official Arch Linux developers, but rather the community.

The incident clearly demonstrates how easy it is to upload a legitimate-looking package using a fake account. That’s why it’s important for users to always check the history of a package:

Check how long the package has been around.

Check the uploader’s reputation and the contents of the PKGBUILD file.

Avoid freshly uploaded packages with no history, even if the name seems official.

Browsers, as in the previous incident, are a particularly attractive target for attackers, as they are among the most widely used software.

Strengthen your future protection

Always check the PKGBUILD contents before installing:

yay -G packagename cd packagename less PKGBUILD

Avoid newly uploaded packages. If the AUR package has no history or reviews, it is not recommended to install it.