Forwarded from vx-underground
Nerds angry at ProtonMail today (yesterday?) due to internet drama (as is tradition). People are big mad. Is it a big deal? Are people overreacting? Why did normie accounts comment on the issue like they know what's going on?
Phrack did some silly things on the internet. They were able to get access to North Korean state-sponsored machines, or something, which were being used to attack South Korean government stuff. Specifically, the DPRK was targeting:
- South Korea Defense Counterintelligence Command
- South Korea Ministry of Foreign Affairs
- ???
Phrack was able to do some internet nerd stuff and dump DPRK password sheets (domain, username, password) which were stored in various files unencrypted (literally a .docx). They also dumped screenshots of user stuff, more credentials, tooling, documentation, and 20,000 browser history entries.
Following this, Phrack decided to be nice and notify the South Korean government regarding the DPRK.
I'm not a government nerd, but I'd guess that the South Korean government would like to be notified of any intelligence regarding the DPRK and their offensive cybersecurity actions toward them.
Here is the drama:
Phrack was speaking to South Korean nerds in proxy. Some nerd made a Proton e-mail and contacted the South Korean government from Proton e-mail. On August 15th, proxy nerd had their Proton e-mail magically nuked. Additionally, Phrack nerd had their Proton e-mail magically nuked August 16th.
It doesn't take a rocket scientist to put 2 and 2 together here and determine that Proton, for reasons not explained, took action against them (in some capacity) and terminated their accounts.
Phrack then contacted Proton e-mail requesting an unban, or something. Proton replied with, "your account will cause further damage to our service, therefore we will keep the account suspended."
Phrack then decided to contact Proton legal department. Phrack contacted Proton's legal department on 8 separate occasions and was ignored.
Did Proton violate their privacy stuff by terminating the Phrack accounts? Why was Phrack stuff terminated? Did the South Korean government get big mad and decide to send legal stuff to Phrack? Is Proton illegal and for nerds?
Find out next time on Dragon Ball Z
Phrack did some silly things on the internet. They were able to get access to North Korean state-sponsored machines, or something, which were being used to attack South Korean government stuff. Specifically, the DPRK was targeting:
- South Korea Defense Counterintelligence Command
- South Korea Ministry of Foreign Affairs
- ???
Phrack was able to do some internet nerd stuff and dump DPRK password sheets (domain, username, password) which were stored in various files unencrypted (literally a .docx). They also dumped screenshots of user stuff, more credentials, tooling, documentation, and 20,000 browser history entries.
Following this, Phrack decided to be nice and notify the South Korean government regarding the DPRK.
I'm not a government nerd, but I'd guess that the South Korean government would like to be notified of any intelligence regarding the DPRK and their offensive cybersecurity actions toward them.
Here is the drama:
Phrack was speaking to South Korean nerds in proxy. Some nerd made a Proton e-mail and contacted the South Korean government from Proton e-mail. On August 15th, proxy nerd had their Proton e-mail magically nuked. Additionally, Phrack nerd had their Proton e-mail magically nuked August 16th.
It doesn't take a rocket scientist to put 2 and 2 together here and determine that Proton, for reasons not explained, took action against them (in some capacity) and terminated their accounts.
Phrack then contacted Proton e-mail requesting an unban, or something. Proton replied with, "your account will cause further damage to our service, therefore we will keep the account suspended."
Phrack then decided to contact Proton legal department. Phrack contacted Proton's legal department on 8 separate occasions and was ignored.
Did Proton violate their privacy stuff by terminating the Phrack accounts? Why was Phrack stuff terminated? Did the South Korean government get big mad and decide to send legal stuff to Phrack? Is Proton illegal and for nerds?
Find out next time on Dragon Ball Z
Forwarded from R0rt1z2’s Dumpster
This is likely the first Amazon Alexa device running Linux with a mainline kernel and postmarketOS.
All credit goes to Ben, who did the heavy lifting by porting everything to MT8163. I just helped by testing and providing UART logs.
Overall, the kernel is surprisingly solid, and a lot of hardware is already working , including Wi-Fi.
Interestingly, the device uses a Broadcom USB Wi-Fi adapter that's soldered internally, instead of the more typical MediaTek combo chips.
The GPU is also functional, thanks to Panfrost. We're currently using simpledrm for display, as we haven't managed to get the DSI interface working properly yet.
You can follow the full progress on the PMOS wiki page we recently created:
https://wiki.postmarketos.org/wiki/Amazon_Echo_Spot_2017_(amazon-rook)
All credit goes to Ben, who did the heavy lifting by porting everything to MT8163. I just helped by testing and providing UART logs.
Overall, the kernel is surprisingly solid, and a lot of hardware is already working , including Wi-Fi.
Interestingly, the device uses a Broadcom USB Wi-Fi adapter that's soldered internally, instead of the more typical MediaTek combo chips.
The GPU is also functional, thanks to Panfrost. We're currently using simpledrm for display, as we haven't managed to get the DSI interface working properly yet.
You can follow the full progress on the PMOS wiki page we recently created:
https://wiki.postmarketos.org/wiki/Amazon_Echo_Spot_2017_(amazon-rook)
Forwarded from vx-underground
Chat, who would have thought?
A study on the United Kingdom Online Safety Act shows that websites that complied with the United Kingdom government, and performed ID verification, lost 90% of it's web traffic.
Users went to unregulated sites.
https://www.techdirt.com/2025/09/08/uk-age-verification-data-confirms-what-critics-always-predicted-mass-migration-to-sketchier-sites/
A study on the United Kingdom Online Safety Act shows that websites that complied with the United Kingdom government, and performed ID verification, lost 90% of it's web traffic.
Users went to unregulated sites.
https://www.techdirt.com/2025/09/08/uk-age-verification-data-confirms-what-critics-always-predicted-mass-migration-to-sketchier-sites/
Techdirt
UK Age Verification Data Confirms What Critics Always Predicted: Mass Migration To Sketchier Sites
New data from the UK’s age verification rollout provides hard evidence of what internet governance experts have been warning about for years: these laws don’t protect children—they syst…
Forwarded from Tech & Leaks Zone
BREAKING: Spotify Issues DMCA Notice to Revanced over Unlock Premium Patch
Spotify claims that the patch is a derivative of their copyrighted works & it circumvents Spotify’s technological protection measures under DMCA 1201(a) as the patch enables access to copyrighted content by bypassing encryption, transfer key protocols & premium feature restrictions (eg. skipping).
But, acc. to Revanced, the patch does not copy Spotify’s code. The app requires attestation to prevent it from becoming unusable if modified. Also, the patch neither enable downloads nor give access to unavailable songs on free spotify.
However, if attestation bypass alone constitutes a DMCA 1201 violation, then not only premium but also the “make the app work when patched” functionality could be affected.
Thus, Revanced is seeking legal expertise to understand their position & risks until their deadline of 1 business day. You may also help them if you have copyright/DMCA knowledge. The DMCA Notice is attached here.
Follow @TechLeaksZone
Spotify claims that the patch is a derivative of their copyrighted works & it circumvents Spotify’s technological protection measures under DMCA 1201(a) as the patch enables access to copyrighted content by bypassing encryption, transfer key protocols & premium feature restrictions (eg. skipping).
But, acc. to Revanced, the patch does not copy Spotify’s code. The app requires attestation to prevent it from becoming unusable if modified. Also, the patch neither enable downloads nor give access to unavailable songs on free spotify.
However, if attestation bypass alone constitutes a DMCA 1201 violation, then not only premium but also the “make the app work when patched” functionality could be affected.
Thus, Revanced is seeking legal expertise to understand their position & risks until their deadline of 1 business day. You may also help them if you have copyright/DMCA knowledge. The DMCA Notice is attached here.
Follow @TechLeaksZone
Forwarded from Tech & Leaks Zone
Now 8 countries are opposing chat control in the EU. Previously it was only 3 countries.
Germany joining chat control opposition is an unexpected move!
Germany joining chat control opposition is an unexpected move!
Forwarded from Tech & Leaks Zone
Xiaomi, Vivo and Oppo under investigation for alleged $700 Million fund diversion
The Ministry of Corporate Affairs (MCA) in India has tasked the Serious Fraud Investigation Office (SFIO) with investigating Chinese smartphone makers Vivo, Oppo, and Xiaomi after a Registrar of Companies (RoC) report alleged fund diversion to the tune of Rs 6,000 crore (~ $700 Million), two government sources have told Moneycontrol.
"SFIO is probing Vivo. Xiaomi and Oppo have also given to SFIO. Fund diversions have been alleged in the RoC report. Once the SFIO report is finalised, they will submit it to the MCA"
“The SFIO process will take about a year and began earlier this year in March"
Once finalised, the SFIO’s findings will be submitted to the ministry, which has the authority to initiate legal proceedings against the companies, their directors and related entities in a special court.
Follow @TechLeaksZone
The Ministry of Corporate Affairs (MCA) in India has tasked the Serious Fraud Investigation Office (SFIO) with investigating Chinese smartphone makers Vivo, Oppo, and Xiaomi after a Registrar of Companies (RoC) report alleged fund diversion to the tune of Rs 6,000 crore (~ $700 Million), two government sources have told Moneycontrol.
"SFIO is probing Vivo. Xiaomi and Oppo have also given to SFIO. Fund diversions have been alleged in the RoC report. Once the SFIO report is finalised, they will submit it to the MCA"
“The SFIO process will take about a year and began earlier this year in March"
Once finalised, the SFIO’s findings will be submitted to the ministry, which has the authority to initiate legal proceedings against the companies, their directors and related entities in a special court.
Follow @TechLeaksZone
Forwarded from Tech & Leaks Zone
Xiaomi No Longer Cares About India, Shifts Focus to Europe
Xiaomi HQ (China) has decided that India market is not their focus anymore & they will instead focus on European & other South Asian markets.
In 2018, India was Xiaomi’s 2nd largest market, contributing 45% of its total global sales. But now, India no longer ranks among Xiaomi’s top 5 markets across the 100+ countries it operates in, with its contribution to total sales falling to a single-digit percentage in 2025.
"India-specific product development has ceased (Xiaomi 15 Civi is cancelled for India), with a focus only on global products. Xiaomi India's plans to launch its expensive foldable phones, are delayed by the group. Xiaomi global stopped plans to launch new categories like washing machines and ACs in India. Testing for these products, including refrigerators, had already been completed, and the company was in talks for their introduction,” the executive said.
Follow @TechLeaksZone
Xiaomi HQ (China) has decided that India market is not their focus anymore & they will instead focus on European & other South Asian markets.
In 2018, India was Xiaomi’s 2nd largest market, contributing 45% of its total global sales. But now, India no longer ranks among Xiaomi’s top 5 markets across the 100+ countries it operates in, with its contribution to total sales falling to a single-digit percentage in 2025.
"India-specific product development has ceased (Xiaomi 15 Civi is cancelled for India), with a focus only on global products. Xiaomi India's plans to launch its expensive foldable phones, are delayed by the group. Xiaomi global stopped plans to launch new categories like washing machines and ACs in India. Testing for these products, including refrigerators, had already been completed, and the company was in talks for their introduction,” the executive said.
Follow @TechLeaksZone
Forwarded from Tech & Leaks Zone
Nothing Phone 2a Bootloader Exploit Working
A new exploit called Fenrir targets the Nothing Phone 2a, CMF Phone 1 & other MediaTek-powered devices. It takes advantage of a flaw in how the phone starts up, allowing full control over the device before Android even loads. Even after waiting for 1 month, Nothing ignored the developer's bootloader vulnerability report affecting CMF Phone 1 and Phone 2a and thus developer made it exploit public.
When you power on your phone, it goes through several steps to make sure everything is secure and untampered. This is called the secure boot chain. Each of these steps is trusted only if the previous one verifies it.
1. BootROM – The first code built into the chip. It loads the next part.
2. Preloader – Loads the next component, called bl2_ext, and normally checks it.
3. bl2_ext – This runs at the highest privilege level (EL3) and is supposed to check everything else.
4. TEE (Trusted Execution Environment) – Handles secure operations like fingerprint data and encryption.
5. GenieZone – A MediaTek component that manages access to the secure system.
6. LK / AEE – Boots the Android operating system and handles crash logging.
7. Linux Kernel – This is Android. The phone is now fully booted.
This exploit abuses a flaw in the MediaTek boot chain. When the bootloader is unlocked (
Additionally, the included PoC also spoofs the device’s lock state as locked so you can pass strong integrity checks anywhere while being unlocked. Someone even managed to pass Basic, Device and Strong integrity on LineageOS for Phone 2a without rooting, spoofing, using pixel fingerprint or leaked keybox.
Vivo X80 Pro is also vulnerable & it has a more severe version of the flaw, as it fails to verify bl2_ext even with a locked bootloader. You can read more about the usage of exploit here:
https://github.com/R0rt1z2/fenrir
Follow @TechLeaksZone
A new exploit called Fenrir targets the Nothing Phone 2a, CMF Phone 1 & other MediaTek-powered devices. It takes advantage of a flaw in how the phone starts up, allowing full control over the device before Android even loads. Even after waiting for 1 month, Nothing ignored the developer's bootloader vulnerability report affecting CMF Phone 1 and Phone 2a and thus developer made it exploit public.
When you power on your phone, it goes through several steps to make sure everything is secure and untampered. This is called the secure boot chain. Each of these steps is trusted only if the previous one verifies it.
1. BootROM – The first code built into the chip. It loads the next part.
2. Preloader – Loads the next component, called bl2_ext, and normally checks it.
3. bl2_ext – This runs at the highest privilege level (EL3) and is supposed to check everything else.
4. TEE (Trusted Execution Environment) – Handles secure operations like fingerprint data and encryption.
5. GenieZone – A MediaTek component that manages access to the secure system.
6. LK / AEE – Boots the Android operating system and handles crash logging.
7. Linux Kernel – This is Android. The phone is now fully booted.
This exploit abuses a flaw in the MediaTek boot chain. When the bootloader is unlocked (
seccfg), the Preloader skips verification of the bl2_ext partition, even though bl2_ext is responsible for verifying everything that comes after it. So if bl2_ext it's not verified and can be modified, it compromises the entire secure boot process. The exploit modifies a function called sec_get_vfy_policy() inside bl2_ext, making it always return "0", so an unverified bl2_ext running at EL3 now happily loads unverified images for the rest of the boot chain.Additionally, the included PoC also spoofs the device’s lock state as locked so you can pass strong integrity checks anywhere while being unlocked. Someone even managed to pass Basic, Device and Strong integrity on LineageOS for Phone 2a without rooting, spoofing, using pixel fingerprint or leaked keybox.
Vivo X80 Pro is also vulnerable & it has a more severe version of the flaw, as it fails to verify bl2_ext even with a locked bootloader. You can read more about the usage of exploit here:
https://github.com/R0rt1z2/fenrir
Follow @TechLeaksZone
Forwarded from vx-underground
tl;dr chinas firewall censorship thingy has massive leak. shows code and political ambitions and stuff
idk the significance because i dont study chinese network firewall sciency stuff. maybe one of you nerds is interested. its all available for download online now
https://gfw.report/blog/geedge_and_mesa_leak/en/
idk the significance because i dont study chinese network firewall sciency stuff. maybe one of you nerds is interested. its all available for download online now
https://gfw.report/blog/geedge_and_mesa_leak/en/
Forwarded from GApps Leaks (Shiv (AssembleDebug))
Sideloading Restrictions, some updates from Google.
If you are a hobbyist/student - Free and Straightforward process but comes with limits on number of apps and installation.
As a developer, you will be able install apps with ADB without restrictions for testing purposes
@GappsLeaks
If you are a hobbyist/student - Free and Straightforward process but comes with limits on number of apps and installation.
As a developer, you will be able install apps with ADB without restrictions for testing purposes
@GappsLeaks
Forwarded from Nothing Fuckups
Nothing Phone 3 will be available for Rs. 35,000 (~400$) in India after exchange of Phone 1 or Phone 2
Including exchange, Nothing phone 3 lost more than 50% value in just 2½ months after the launch. My condolences to everyone who bought it at launch as you guys have been scammed in under 3 months
Follow @NothingFuckups
Including exchange, Nothing phone 3 lost more than 50% value in just 2½ months after the launch. My condolences to everyone who bought it at launch as you guys have been scammed in under 3 months
Follow @NothingFuckups
Forwarded from GApps Leaks (Shiv (AssembleDebug))
Pixel 7 and 7 Pro users report battery swelling as issue spreads beyond 7a
✅ Details - https://piunikaweb.com/2025/09/15/pixel-7-and-7-pro-battery-swelling/
@GappsLeaks
✅ Details - https://piunikaweb.com/2025/09/15/pixel-7-and-7-pro-battery-swelling/
@GappsLeaks
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Network Switch
A modern Android application that enables users to toggle between 4G and 5G network modes with dual control methods: Root access for rooted devices and Shizuku for non-rooted devices. Built using Jetpack Compose and Material Design 3.
🔗 Links:
- Download
- Screenshot
- Features
- Source code
Developer: Ameya Vijay Unchagaonkar
🏷 Tags: #Android #Utilities #Network
A modern Android application that enables users to toggle between 4G and 5G network modes with dual control methods: Root access for rooted devices and Shizuku for non-rooted devices. Built using Jetpack Compose and Material Design 3.
🔗 Links:
- Download
- Screenshot
- Features
- Source code
Developer: Ameya Vijay Unchagaonkar
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #Utilities #Network