Forwarded from GSMArena (IFTTT)
Oppo F31 Pro and F31 Pro+ launch with enhanced durability, 7,000 mAh batteries
https://ift.tt/swPLWAU
https://ift.tt/swPLWAU
GSMArena.com
Oppo F31 Pro and F31 Pro+ launch with enhanced durability, 7,000 mAh batteries
The F31 should imminently join them. Just as previously promised, today Oppo made the F31 Pro and F31 Pro+ official in India. The vanilla F31 was...
Forwarded from XiaomiTime: Xiaomi & HyperOS News (IFTTT)
"Xiaomi has fired Wang Teng, General Manager of Redmi, for leaking confidential information. He admitted to past mistakes but denied selling company secrets. His exit raises questions about Redmi's future direction."
🔗 Check More
🔗 Check More
XiaomiTime
REDMI's top executive fired for leaking company secrets - XiaomiTime
In a surprising development, Xiaomi has officially dismissed Wang Teng, the General Manager and well-known face of its Redmi brand. The announcement came via
Forwarded from XiaomiTime: Xiaomi & HyperOS News (IFTTT)
"Xiaomi Pad 8 Pro spotted on Geekbench! - Snapdragon 8 Elite processor- 16GB RAM- 11.16-inch high-refresh-rate LCD- 10,000mAh+ battery with 67W fast charging- Launching alongside Xiaomi 16 series smartphonesReady for productivity!"
🔗 Check More
🔗 Check More
XiaomiTime
Xiaomi Pad 8 Pro surfaces on Geekbench with competitive specs - XiaomiTime
Recently, the Xiaomi Pad 8 Pro emerged on Geekbench, catching the attention of industry watchers and consumers alike. Identified under model number
Forwarded from XiaomiTime: Xiaomi & HyperOS News (IFTTT)
"Xiaomi Pad Mini officially launching on September 24!- 8.8-inch 2.5K LCD, 165Hz refresh rate- MediaTek Dimensity 9400+ processor- 7500 mAh battery with 67W fast charging- 13MP main & 8MP front cameras- HyperOS 2 on Android 15Your productivity powerhouse!"
🔗 Check More
🔗 Check More
XiaomiTime
New Xiaomi Pad Mini revealed ahead of September 24 launch - XiaomiTime
The newly unveiled Xiaomi Pad Mini is making its official debut, scheduled to launch alongside the Xiaomi 15T Series on September 24. With Xiaomi sharing a
Forwarded from Android Security & Malware
PhantomCall unmasked: An Antidot variant disguised as fake Chrome apps in a global banking malware campaign
https://www.ibm.com/think/news/phantomcall-antidot-variant-in-fake-chrome-apps
https://www.ibm.com/think/news/phantomcall-antidot-variant-in-fake-chrome-apps
Ibm
PhantomCall unmasked: An Antidot variant disguised as fake Chrome apps in a global banking malware campaign | IBM
Android users beware! A new Antidot campaign (banking trojan) named PhantomCall is targeting users of major financial institutions across Europe. Trusteer Labs shares what they’ve learned.
Forwarded from XIAOMI Fuckups
Xiaomi has identified that their 20000mAh powerbanks are essentially a time bomb 💣 and thus they have announced a recall
https://www.mi.com/global/support/safety-notice/
https://www.mi.com/global/support/safety-notice/
Forwarded from Tech & Leaks Zone
Turns out Gemini can kill itself when using agents ...... RIP
https://x.com/sonochichi/status/1964744126026711541
https://x.com/sonochichi/status/1964744126026711541
Forwarded from Tech & Leaks Zone
Xiaomi fired General Manager of Redmi and Market Department
Xiaomi China promoted Wang Teng as the General Manager of Xiaomi China Marketing Department, while still holding the role of General Manager of the REDMI brand in December 2024. But now, Xiaomi has fired him for allegedly leaking the company's secrets.
Funfact: Wang Teng was recently caught using SukiSU Ultra to root his Xiaomi tablet, thus indicating, unlocking bootloader on his Xiaomi tablet could also be one of the reasons.
Wang Teng has even issued a public apology for his wrongdoings.
Follow @TechLeaksZone
Xiaomi China promoted Wang Teng as the General Manager of Xiaomi China Marketing Department, while still holding the role of General Manager of the REDMI brand in December 2024. But now, Xiaomi has fired him for allegedly leaking the company's secrets.
Funfact: Wang Teng was recently caught using SukiSU Ultra to root his Xiaomi tablet, thus indicating, unlocking bootloader on his Xiaomi tablet could also be one of the reasons.
Wang Teng has even issued a public apology for his wrongdoings.
Follow @TechLeaksZone
Forwarded from vx-underground
> do largest supply chain attack in history
> potentially infect millions of apps
> doesnt do the thing good
> makes $0 from compromise
I don't wanna support the villain here, but my guy, you gotta lock in. You could have infected hundreds of millions of apps and you FUMBLE IT
> potentially infect millions of apps
> doesnt do the thing good
> makes $0 from compromise
I don't wanna support the villain here, but my guy, you gotta lock in. You could have infected hundreds of millions of apps and you FUMBLE IT
Forwarded from XIAOMI Fuckups
Xiaomi has started blocking third-party launchers like Niagara. Try setting one as default, and you get a dramatic warning about “data leaks,” “battery drain,” and other doomsday scenarios. Suddenly, switching your launcher is a national security risk.
However, users were easily able to bypass this grand “security feature” through a simple app from the Play Store. Just open Activity Launcher, tap a hidden setting, and voila — third-party launcher is back like nothing happened.
So much for “security,” but in reality, just an annoying pop-up with zero actual protection. That's Xiaomi
Follow @XiaomiFuckup for more fake security
However, users were easily able to bypass this grand “security feature” through a simple app from the Play Store. Just open Activity Launcher, tap a hidden setting, and voila — third-party launcher is back like nothing happened.
So much for “security,” but in reality, just an annoying pop-up with zero actual protection. That's Xiaomi
Follow @XiaomiFuckup for more fake security
Forwarded from vx-underground
Nerds angry at ProtonMail today (yesterday?) due to internet drama (as is tradition). People are big mad. Is it a big deal? Are people overreacting? Why did normie accounts comment on the issue like they know what's going on?
Phrack did some silly things on the internet. They were able to get access to North Korean state-sponsored machines, or something, which were being used to attack South Korean government stuff. Specifically, the DPRK was targeting:
- South Korea Defense Counterintelligence Command
- South Korea Ministry of Foreign Affairs
- ???
Phrack was able to do some internet nerd stuff and dump DPRK password sheets (domain, username, password) which were stored in various files unencrypted (literally a .docx). They also dumped screenshots of user stuff, more credentials, tooling, documentation, and 20,000 browser history entries.
Following this, Phrack decided to be nice and notify the South Korean government regarding the DPRK.
I'm not a government nerd, but I'd guess that the South Korean government would like to be notified of any intelligence regarding the DPRK and their offensive cybersecurity actions toward them.
Here is the drama:
Phrack was speaking to South Korean nerds in proxy. Some nerd made a Proton e-mail and contacted the South Korean government from Proton e-mail. On August 15th, proxy nerd had their Proton e-mail magically nuked. Additionally, Phrack nerd had their Proton e-mail magically nuked August 16th.
It doesn't take a rocket scientist to put 2 and 2 together here and determine that Proton, for reasons not explained, took action against them (in some capacity) and terminated their accounts.
Phrack then contacted Proton e-mail requesting an unban, or something. Proton replied with, "your account will cause further damage to our service, therefore we will keep the account suspended."
Phrack then decided to contact Proton legal department. Phrack contacted Proton's legal department on 8 separate occasions and was ignored.
Did Proton violate their privacy stuff by terminating the Phrack accounts? Why was Phrack stuff terminated? Did the South Korean government get big mad and decide to send legal stuff to Phrack? Is Proton illegal and for nerds?
Find out next time on Dragon Ball Z
Phrack did some silly things on the internet. They were able to get access to North Korean state-sponsored machines, or something, which were being used to attack South Korean government stuff. Specifically, the DPRK was targeting:
- South Korea Defense Counterintelligence Command
- South Korea Ministry of Foreign Affairs
- ???
Phrack was able to do some internet nerd stuff and dump DPRK password sheets (domain, username, password) which were stored in various files unencrypted (literally a .docx). They also dumped screenshots of user stuff, more credentials, tooling, documentation, and 20,000 browser history entries.
Following this, Phrack decided to be nice and notify the South Korean government regarding the DPRK.
I'm not a government nerd, but I'd guess that the South Korean government would like to be notified of any intelligence regarding the DPRK and their offensive cybersecurity actions toward them.
Here is the drama:
Phrack was speaking to South Korean nerds in proxy. Some nerd made a Proton e-mail and contacted the South Korean government from Proton e-mail. On August 15th, proxy nerd had their Proton e-mail magically nuked. Additionally, Phrack nerd had their Proton e-mail magically nuked August 16th.
It doesn't take a rocket scientist to put 2 and 2 together here and determine that Proton, for reasons not explained, took action against them (in some capacity) and terminated their accounts.
Phrack then contacted Proton e-mail requesting an unban, or something. Proton replied with, "your account will cause further damage to our service, therefore we will keep the account suspended."
Phrack then decided to contact Proton legal department. Phrack contacted Proton's legal department on 8 separate occasions and was ignored.
Did Proton violate their privacy stuff by terminating the Phrack accounts? Why was Phrack stuff terminated? Did the South Korean government get big mad and decide to send legal stuff to Phrack? Is Proton illegal and for nerds?
Find out next time on Dragon Ball Z
Forwarded from R0rt1z2’s Dumpster
This is likely the first Amazon Alexa device running Linux with a mainline kernel and postmarketOS.
All credit goes to Ben, who did the heavy lifting by porting everything to MT8163. I just helped by testing and providing UART logs.
Overall, the kernel is surprisingly solid, and a lot of hardware is already working , including Wi-Fi.
Interestingly, the device uses a Broadcom USB Wi-Fi adapter that's soldered internally, instead of the more typical MediaTek combo chips.
The GPU is also functional, thanks to Panfrost. We're currently using simpledrm for display, as we haven't managed to get the DSI interface working properly yet.
You can follow the full progress on the PMOS wiki page we recently created:
https://wiki.postmarketos.org/wiki/Amazon_Echo_Spot_2017_(amazon-rook)
All credit goes to Ben, who did the heavy lifting by porting everything to MT8163. I just helped by testing and providing UART logs.
Overall, the kernel is surprisingly solid, and a lot of hardware is already working , including Wi-Fi.
Interestingly, the device uses a Broadcom USB Wi-Fi adapter that's soldered internally, instead of the more typical MediaTek combo chips.
The GPU is also functional, thanks to Panfrost. We're currently using simpledrm for display, as we haven't managed to get the DSI interface working properly yet.
You can follow the full progress on the PMOS wiki page we recently created:
https://wiki.postmarketos.org/wiki/Amazon_Echo_Spot_2017_(amazon-rook)