Forwarded from Mishaal's Android News Feed
🖋Here's a look at the unreleased Pixel Tablet Pen's hidden note-taking trick
Last week, Google's unreleased stylus for the Pixel Tablet mysteriously appeared. Early reports said the stylus button doesn't work, but it works after enabling some settings.
🔗 https://www.androidauthority.com/pixel-tablet-pen-notetaking-trick-3586042/
Last week, Google's unreleased stylus for the Pixel Tablet mysteriously appeared. Early reports said the stylus button doesn't work, but it works after enabling some settings.
🔗 https://www.androidauthority.com/pixel-tablet-pen-notetaking-trick-3586042/
Android Authority
Here's a look at the unreleased Pixel Tablet Pen's hidden note-taking trick
The cancelled Pixel Tablet Pen has a hidden trick: With a button press, it can launch your favorite notetaking app in a floating bubble!
https://github.com/winapps-org/winapps
Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE as if they were a part of the native OS, including Nautilus integration. Hard fork of https://github.com/Fmstrat/winapps/
Run Windows applications (including Microsoft 365 and Adobe Creative Cloud) on GNU/Linux with KDE Plasma, GNOME or XFCE, integrated seamlessly as if they were native to the OS.
Underlying Mechanism
WinApps works by:
Running Windows in a Docker, Podman or libvirt virtual machine.
Querying Windows for all installed applications.
Creating shortcuts to selected Windows applications on the host GNU/Linux OS.
Using FreeRDP as a backend to seamlessly render Windows applications alongside GNU/Linux applications.
Additional Features
The GNU/Linux /home directory is accessible within Windows via the \\tsclient\home mount.
Integration with Nautilus, allowing you to right-click files to open them with specific Windows applications based on the file MIME type.
The official taskbar widget enables seamless administration of the Windows subsystem and offers an easy way to launch Windows applications.
Microsoft Office links (e.g. ms-word://) from the host system are automatically opened in the Windows subsystem. (Note: You may need to use a User Agent Switcher browser extension and set the User-Agent to Windows, as the Office webapps typically hide the "Open in Desktop App" option for Linux users.)
Supported Applications
WinApps supports ALL Windows applications.
Universal application support is achieved by:
Scanning Windows for any officially supported applications (list below).
Scanning Windows for any other .exe files listed within the Windows Registry.
Officially supported applications benefit from high-resolution icons and pre-populated MIME types. This enables file managers to determine which Windows applications should open files based on file extensions. Icons for other detected applications are pulled from .exe files.
Contributing to the list of supported applications is encouraged through submission of pull requests! Please help us grow the WinApps community.
Please note that the provided list of officially supported applications is community-driven. As such, some applications may not be tested and verified by the WinApps team.
Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE as if they were a part of the native OS, including Nautilus integration. Hard fork of https://github.com/Fmstrat/winapps/
Run Windows applications (including Microsoft 365 and Adobe Creative Cloud) on GNU/Linux with KDE Plasma, GNOME or XFCE, integrated seamlessly as if they were native to the OS.
Underlying Mechanism
WinApps works by:
Running Windows in a Docker, Podman or libvirt virtual machine.
Querying Windows for all installed applications.
Creating shortcuts to selected Windows applications on the host GNU/Linux OS.
Using FreeRDP as a backend to seamlessly render Windows applications alongside GNU/Linux applications.
Additional Features
The GNU/Linux /home directory is accessible within Windows via the \\tsclient\home mount.
Integration with Nautilus, allowing you to right-click files to open them with specific Windows applications based on the file MIME type.
The official taskbar widget enables seamless administration of the Windows subsystem and offers an easy way to launch Windows applications.
Microsoft Office links (e.g. ms-word://) from the host system are automatically opened in the Windows subsystem. (Note: You may need to use a User Agent Switcher browser extension and set the User-Agent to Windows, as the Office webapps typically hide the "Open in Desktop App" option for Linux users.)
Supported Applications
WinApps supports ALL Windows applications.
Universal application support is achieved by:
Scanning Windows for any officially supported applications (list below).
Scanning Windows for any other .exe files listed within the Windows Registry.
Officially supported applications benefit from high-resolution icons and pre-populated MIME types. This enables file managers to determine which Windows applications should open files based on file extensions. Icons for other detected applications are pulled from .exe files.
Contributing to the list of supported applications is encouraged through submission of pull requests! Please help us grow the WinApps community.
Please note that the provided list of officially supported applications is community-driven. As such, some applications may not be tested and verified by the WinApps team.
GitHub
GitHub - winapps-org/winapps: Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE as if they…
Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE as if they were a part of the native OS, including Nautilus integration. Hard fork of https://github.com/Fmst...
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
🔐 Sharing Files Without Big Tech: Meet Above Share
On the Shield Your Body webinar, I shared how we make phone calls without EMF and how Above Share lets you send files securely — no Apple, Google, or cloud snooping. Add a password, limit downloads, and keep your data off surveillance servers.
Watch the full interview.
Learn more at abovephone.com/above-share-secure-file-sharing/
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
On the Shield Your Body webinar, I shared how we make phone calls without EMF and how Above Share lets you send files securely — no Apple, Google, or cloud snooping. Add a password, limit downloads, and keep your data off surveillance servers.
Watch the full interview.
Learn more at abovephone.com/above-share-secure-file-sharing/
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from 0•Bytes•1
Enjoy your tea, my Alices in Wonderland! 🎀
Many people have heard of onion routing in Tor and have a rough idea of how it works. However, fewer people know about garlic routing.
That's why I decided to write a short note about what it is and how it works in I2P🚥
How is a message sent? ✉️
In I2P, your message travels through a tunnel—a chain of randomly picked computers (nodes) on the network. Each node only knows where to send the data next, not the message content, thanks to garlic encryption🧄.
Your message is first encrypted for the recipient using end-to-end encryption. Asymmetric encryption🔐 uses a public key to encrypt and a private key to decrypt.
How are encryption layers created?🔒
Now the process of wrapping the message in layers begins.
Imagine that you have a tunnel with three nodes: A, B, C.
The encrypted message (already protected for the recipient) must be passed through these nodes so that each one knows only the next step. To do this, I2P creates encryption layers one for each node.
Each layer is additional encryption with instructions for a specific node, such as “forward to node B” or “send to recipient.”
It works like this: you encrypt the message with the public key of node C, adding the instruction “forward to node B.” You encrypt this packet again with the public key of node B with the instruction “forward to node A.” Then the entire packet is encrypted with the public key of node A with the instruction “send to recipient.”
When you send the packet, it goes to node A. Node A opens its layer with its secret key, sees the instruction “forward to node B” and forwards the data. The data remains encrypted for other nodes. Node B opens its layer, sees the instruction “forward to node C” and forwards it. Node C opens the last layer, sees that it needs to be sent to the recipient, and does so.
Each node only knows its own step and does not see the content of the message, its sender, or its recipient.
Why is encryption called garlic?🧄
Now, let's talk about “garlic” encryption in detail. In I2P, your message is packed with others into one encrypted packet🗂, called garlic. This packet may include your message, others’ messages, and network data like tunnel commands⚙️
All these messages are encrypted together, and each layer of encryption (for nodes A, B, C) covers the entire large packet, not each message individually.
When node A opens its layer, it sees the instruction for the entire packet, such as “forward to node B,” and sends it on. It does not know how many messages are inside, whose they are, or where they are going. Node B does the same, opening its layer and forwarding the packet to node C. Node C, opening the last layer, can send the entire packet or parts of it (depending on the instruction) to the recipients, but it does not know how many messages are inside and to whom they are addressed. This makes it impossible to determine whose message is where, even when observing the network.
Each message in the packet is protected by individual encryption for its recipient🔑 so that no one but the intended person can open it.
The messages inside the packet are not explicitly separated they are sort of stuck together into one continuous encrypted piece of data. I2P can also add “garbage” data🗑 fake messages that masquerade as real ones but mean nothing.
In addition, I2P mixes♻️ your packet with other data on the network and can add random delays during transmission. This makes it difficult to analyze traffic. Tunnels change every 10 minutes, and the nodes in them are selected again, so it is impossible to track the path.
How does garlic encryption differ onion encryption?🧅
In onion encryption, each message is encrypted separately and transmitted through its own chain of nodes. Garlic encryption not only wraps your message in layers of encryption, but also combines it with other messages and fake data into a single encrypted packet.
#i2p #cryptography #garlic_encryption #anonymity #tor
Many people have heard of onion routing in Tor and have a rough idea of how it works. However, fewer people know about garlic routing.
That's why I decided to write a short note about what it is and how it works in I2P🚥
How is a message sent? ✉️
In I2P, your message travels through a tunnel—a chain of randomly picked computers (nodes) on the network. Each node only knows where to send the data next, not the message content, thanks to garlic encryption🧄.
Your message is first encrypted for the recipient using end-to-end encryption. Asymmetric encryption🔐 uses a public key to encrypt and a private key to decrypt.
How are encryption layers created?🔒
Now the process of wrapping the message in layers begins.
Imagine that you have a tunnel with three nodes: A, B, C.
The encrypted message (already protected for the recipient) must be passed through these nodes so that each one knows only the next step. To do this, I2P creates encryption layers one for each node.
Each layer is additional encryption with instructions for a specific node, such as “forward to node B” or “send to recipient.”
It works like this: you encrypt the message with the public key of node C, adding the instruction “forward to node B.” You encrypt this packet again with the public key of node B with the instruction “forward to node A.” Then the entire packet is encrypted with the public key of node A with the instruction “send to recipient.”
When you send the packet, it goes to node A. Node A opens its layer with its secret key, sees the instruction “forward to node B” and forwards the data. The data remains encrypted for other nodes. Node B opens its layer, sees the instruction “forward to node C” and forwards it. Node C opens the last layer, sees that it needs to be sent to the recipient, and does so.
Each node only knows its own step and does not see the content of the message, its sender, or its recipient.
Why is encryption called garlic?🧄
Now, let's talk about “garlic” encryption in detail. In I2P, your message is packed with others into one encrypted packet🗂, called garlic. This packet may include your message, others’ messages, and network data like tunnel commands⚙️
All these messages are encrypted together, and each layer of encryption (for nodes A, B, C) covers the entire large packet, not each message individually.
When node A opens its layer, it sees the instruction for the entire packet, such as “forward to node B,” and sends it on. It does not know how many messages are inside, whose they are, or where they are going. Node B does the same, opening its layer and forwarding the packet to node C. Node C, opening the last layer, can send the entire packet or parts of it (depending on the instruction) to the recipients, but it does not know how many messages are inside and to whom they are addressed. This makes it impossible to determine whose message is where, even when observing the network.
Each message in the packet is protected by individual encryption for its recipient🔑 so that no one but the intended person can open it.
The messages inside the packet are not explicitly separated they are sort of stuck together into one continuous encrypted piece of data. I2P can also add “garbage” data🗑 fake messages that masquerade as real ones but mean nothing.
In addition, I2P mixes♻️ your packet with other data on the network and can add random delays during transmission. This makes it difficult to analyze traffic. Tunnels change every 10 minutes, and the nodes in them are selected again, so it is impossible to track the path.
How does garlic encryption differ onion encryption?🧅
In onion encryption, each message is encrypted separately and transmitted through its own chain of nodes. Garlic encryption not only wraps your message in layers of encryption, but also combines it with other messages and fake data into a single encrypted packet.
#i2p #cryptography #garlic_encryption #anonymity #tor
Please open Telegram to view this post
VIEW IN TELEGRAM
No deleted account found from
78 scanned users from this group 🚫👻Forwarded from Hacker News
TechCrunch
TeaOnHer, a rival Tea app for men, is leaking users' personal data and driver's licenses | TechCrunch
The newly launched app, now trending on Apple's App Store, contains at least one major security flaw that exposes the private information of its users, including their uploaded selfies and government-issued IDs.
Forwarded from Hacker News
GitHub
gpt-oss 20b gguf model fail to run · Issue #11714 · ollama/ollama
What is the issue? The original model coudl run without problem, but the gguf model fail to run for below errors May need an update of ggml dependencies like llama.cpp ggml-org/llama.cpp#15091 Note...
UK police working with controversial tech giant Palantir on real-time surveillance network - Liberty Investigates
https://libertyinvestigates.org.uk/articles/uk-police-working-with-controversial-tech-giant-palantir-on-real-time-surveillance-network/
https://libertyinvestigates.org.uk/articles/uk-police-working-with-controversial-tech-giant-palantir-on-real-time-surveillance-network/
Liberty Investigates
UK police working with controversial tech giant Palantir on real-time surveillance network - Liberty Investigates
Hello, my Mad Hatter friends! 🎩
Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?🪙
In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.🛡
I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. 🔑
The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.
I hope you will find it interesting to delve into this topic. 🧩 At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. ⚙️
Enjoy your tea! ☕️🩷
English version:
#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection
Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?🪙
In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.🛡
I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. 🔑
The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.
I hope you will find it interesting to delve into this topic. 🧩 At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. ⚙️
Enjoy your tea! ☕️🩷
English version:
#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Telegram Downloader
Instantly save any video (MP4, MKV), photo, music (MP3), or document directly from Telegram with just one click. (No app needed)
🔗 Links:
- Website
- Add it to your Firefox
- Screenshots
🏷 Tags: #Website #Extension #Utilities
Instantly save any video (MP4, MKV), photo, music (MP3), or document directly from Telegram with just one click. (No app needed)
🔗 Links:
- Website
- Add it to your Firefox
- Screenshots
🏷 Tags: #Website #Extension #Utilities
Forwarded from The Bug Bounty Hunter
From Signal to the Android SDK: Chaining Path Traversal, Mimetype Confusion, Security Check Bypass and File Descriptor Bruteforce for Arbitrary File Access
https://blog.ostorlab.co/signal-arbitrary-file-read.html
https://blog.ostorlab.co/signal-arbitrary-file-read.html
blog.ostorlab.co
Ostorlab: Mobile App Security Testing for Android and iOS
This technical analysis reveals how sophisticated attack chains—combining path traversal, symbolic link manipulation, and Android SDK quirks—can breach Signal Android's defenses to extract sensitive internal files, despite its legendary encryption remaining…
Forwarded from Tech & Leaks Zone
So apparently microsoft calls their employees "microsofties" 😭
Credits
https://github.blog/news-insights/company-news/goodbye-github/
Credits
https://github.blog/news-insights/company-news/goodbye-github/
Forwarded from Tech & Leaks Zone
There is also a company called 'Double Negative' and they call their employees… The niggers Dneggers 💀
Credits
Credits
Forwarded from It's FOSS
This Handbrake release is a good one for content creators. 📹
https://news.itsfoss.com/handbrake-1-10-release/
https://news.itsfoss.com/handbrake-1-10-release/
It's FOSS News
HandBrake 1.10 Adds Social Media Presets: Convert Videos Under 10MB for Instagram, TikTok, and More
These new presets optimize videos for social media posting.
Forwarded from The Hacker News
🚨 WARNING: Dutch cyber watchdog confirms: a Citrix zero-day (CVE-2025-6543) was exploited for months before disclosure—hitting critical orgs, leaving hidden web shells, and erasing traces.
Patches are out. If you run NetScaler, act now.
Full story → https://thehackernews.com/2025/08/dutch-ncsc-confirms-active-exploitation.html
Patches are out. If you run NetScaler, act now.
Full story → https://thehackernews.com/2025/08/dutch-ncsc-confirms-active-exploitation.html