Privacy + Secure Tech Corner Channel 🛡️
92 subscribers
6.71K photos
588 videos
565 files
16.3K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
⚡️TBOT 11: AI Companions Worse Than Porn, Why Your Word Doc Never Looks Right, Deep Sea Desalination, Find the Perfect XMPP Provider

WATCH THE SHOW ON SUBSTACK

Here’s the stories for the week:

AI Companions Worse Than Porn: People are turning to to AI for companionship, seeking emotional connection. AI companies are more than happy to supply this drug, realizing personalized AI brings the most user enagement.

Why Your Word Doc Never Looks Right: Shots fired as LibreOffice, popular open-source office suite calls out Microsoft for their proprietary document format.

Deep Sea Desalination: Water shortages are leading companies to start pumping water from the deep sea. But is this safe? What’s the environmental impact?

Solutions: Find your perfect XMPP server: I love XMPP, although finding a server isn’t the easiest. That’s changing with providers.xmpp.net a project by XMPP community members to let you sort and find high quality servers.

🪄 We aim for our show to be well-researched, well-informed and focused on the most impactful stories all in about 20 minutes(ain’t nobody got more time than that)

PLUS - Each story comes with recommendations and there’s one cool tech trick or open-source solution every week.

We’ll be publishing full posts and clips of each of these stories soon.

Share this post with your crew. 🚢

Follow the show:

https://takebackourtech.org

https://tbot.substack.com
Media is too big
VIEW IN TELEGRAM
📱 How Phones Are Used Against Us

On the Man in America podcast, I talked about why your phone might be the most powerful surveillance tool ever created. From real-time tracking and secret geolocation databases to AI-curated feeds that shape your thoughts and behavior — phones aren’t just monitoring devices, they’re psychological weapons.

But there are alternatives. The key is becoming the master of your phone, not the other way around.

Listen to the full interview.

Explore conscious technology solutions at
Above Phone


🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
CADroid: A Cross-combination Attention based Framework for Android Malware Detection
https://www.sciencedirect.com/science/article/abs/pii/S0957417425030623
Forwarded from The Hacker News
CISA just flagged 3 new actively exploited flaws—two in Citrix Session Recording, one in Git.

The Git bug (CVE-2025-48384) can let attackers run arbitrary code just by cloning a repo. Proof-of-concept exploit is already out.

Here’s what you need to know ↓ https://thehackernews.com/2025/08/cisa-adds-three-exploited.html
Forwarded from The Hacker News
🛑 Important: Google is locking down Android.

Starting Sept 2026, every app — even outside the Play Store — must come from a verified developer.

No more anonymous sideloads. No quick comebacks for malware gangs.

First up: Brazil, Indonesia, Singapore, Thailand.

Full story ↓ https://thehackernews.com/2025/08/google-to-verify-all-android-developers.html
Forwarded from The Hacker News
📢 Google & Workday both confirmed breaches this summer — attackers slipped in through social engineering, not software flaws.

The group behind it, ShinyHunters, used phone scams + fake apps to access Salesforce data.

Here’s what actually happened ↓ https://thehackernews.com/expert-insights/2025/08/shinyhunters-data-breach-vs-saas-why.html
Forwarded from The Hacker News
🚨 A new Android banking trojan just leveled up: HOOK now locks victims’ screens with ransomware-style extortion demands.

Worse? It can also steal your banking logins, crypto wallets, PIN codes—and even stream your screen.

Here’s how it works ↓ https://thehackernews.com/2025/08/hook-android-trojan-adds-ransomware.html
Forwarded from The Hacker News
🚨 Over 100 hacked WordPress sites are being used in a new campaign called ShadowCaptcha — luring visitors with fake CAPTCHA checks that drop info-stealers, ransomware, and crypto miners.

The trick? Copy-pasted commands from your clipboard turn into attacks.

Here’s what you need to know ↓ https://thehackernews.com/2025/08/shadowcaptcha-exploits-wordpress-sites.html