Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
579 videos
505 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Tech & Leaks Zone
Nothing Phone 2a Bootloader Exploit Working

A new exploit called Fenrir targets the Nothing Phone 2a, CMF Phone 1 & other MediaTek-powered devices. It takes advantage of a flaw in how the phone starts up, allowing full control over the device before Android even loads. Even after waiting for 1 month, Nothing ignored the developer's bootloader vulnerability report affecting CMF Phone 1 and Phone 2a and thus developer made it exploit public.

When you power on your phone, it goes through several steps to make sure everything is secure and untampered. This is called the secure boot chain. Each of these steps is trusted only if the previous one verifies it.

1. BootROM – The first code built into the chip. It loads the next part.
2. Preloader – Loads the next component, called bl2_ext, and normally checks it.
3. bl2_ext – This runs at the highest privilege level (EL3) and is supposed to check everything else.
4. TEE (Trusted Execution Environment) – Handles secure operations like fingerprint data and encryption.
5. GenieZone – A MediaTek component that manages access to the secure system.
6. LK / AEE – Boots the Android operating system and handles crash logging.
7. Linux Kernel – This is Android. The phone is now fully booted.

This exploit abuses a flaw in the MediaTek boot chain. When the bootloader is unlocked (seccfg), the Preloader skips verification of the bl2_ext partition, even though bl2_ext is responsible for verifying everything that comes after it. So if bl2_ext it's not verified and can be modified, it compromises the entire secure boot process. The exploit modifies a function called sec_get_vfy_policy() inside bl2_ext, making it always return "0", so an unverified bl2_ext running at EL3 now happily loads unverified images for the rest of the boot chain.

Additionally, the included PoC also spoofs the device’s lock state as locked so you can pass strong integrity checks anywhere while being unlocked. Someone even managed to pass Basic, Device and Strong integrity on LineageOS for Phone 2a without rooting, spoofing, using pixel fingerprint or leaked keybox.

Vivo X80 Pro is also vulnerable & it has a more severe version of the flaw, as it fails to verify bl2_ext even with a locked bootloader. You can read more about the usage of exploit here:
https://github.com/R0rt1z2/fenrir

Follow
@TechLeaksZone
Forwarded from vx-underground
tl;dr chinas firewall censorship thingy has massive leak. shows code and political ambitions and stuff

idk the significance because i dont study chinese network firewall sciency stuff. maybe one of you nerds is interested. its all available for download online now

https://gfw.report/blog/geedge_and_mesa_leak/en/
Forwarded from GApps Leaks (Shiv (AssembleDebug))
Sideloading Restrictions, some updates from Google.

If you are a hobbyist/student - Free and Straightforward process but comes with limits on number of apps and installation.

As a developer, you will be able install apps with ADB without restrictions for testing purposes

@GappsLeaks
Forwarded from Nothing Fuckups
Nothing Phone 3 will be available for Rs. 35,000 (~400$) in India after exchange of Phone 1 or Phone 2

Including exchange, Nothing phone 3 lost more than 50% value in just 2½ months after the launch. My condolences to everyone who bought it at launch as you guys have been scammed in under 3 months

Follow @NothingFuckups
Forwarded from GApps Leaks (Shiv (AssembleDebug))
Pixel 7 and 7 Pro users report battery swelling as issue spreads beyond 7a

Details - https://piunikaweb.com/2025/09/15/pixel-7-and-7-pro-battery-swelling/

@GappsLeaks
Network Switch

A modern Android application that enables users to toggle between 4G and 5G network modes with dual control methods: Root access for rooted devices and Shizuku for non-rooted devices. Built using Jetpack Compose and Material Design 3.

🔗 Links:
- Download
- Screenshot
- Features
- Source code
Developer: Ameya Vijay Unchagaonkar

❤️ Support the Project

If this project makes your life easier, here are a few quick ways to show some love:

Star the repo/app
Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests

🏷 Tags:  #Android #Utilities #Network
Forwarded from The Hacker News
⚠️ Major npm supply-chain attack just dropped!

40+ popular packages were secretly booby-trapped to steal developer secrets—GitHub tokens, npm keys, even AWS creds—on both Windows & Linux.

🕵️‍♂️ Audit & rotate your credentials now.

Full story → https://thehackernews.com/2025/09/40-npm-packages-compromised-in-supply.html
Forwarded from The Hacker News
Apple backports a critical fix for CVE-2025-43300—already used in a sophisticated spyware attack.

🕵️‍♂️ Hackers chained it with a WhatsApp flaw to target fewer than 200 people.

📱 Older iPhones & Macs are now patched—don’t skip this update.

Details → https://thehackernews.com/2025/09/apple-backports-fix-for-cve-2025-43300.html
Forwarded from The Hacker News
This media is not supported in your browser
VIEW IN TELEGRAM
🚨Lazarus escalated activities in 2025 with companies already suffering billions in losses.

This APT’s attacks are evolving and getting harder to detect.

Read actionable report on its current campaigns to be ready for the next attack ⬇️ https://thn.news/lazarus-attacks-2025
Forwarded from Beechat Network
After weeks of focused work, we now have MAVLink running over Reticulum in Rust.

What that means:
- A flight controller connected over serial can talk to QGroundControl
- The traffic is encrypted, meshed, and carried over whatever medium Reticulum supports
- The transport is flexible over WiFi, sub-GHz, and 2.4 GHz

With MAVLink secured and meshed across a trustless network stack, we believe it is a big step toward making drones truly mesh-native. The ground and flight sides run as simple binaries, configurable with TOML, and it is ready for others to build on.

If you are working on drones, autonomy, or resilient comms, we would love to connect.
Check out the GitHub and get involved:
https://github.com/BeechatNetworkSystemsLtd/rns-mavlink-rs
Forwarded from NoGoolag
Whitney Webb breaks down the coordinated global push for a new, dystopian system of control, marrying digital ID with CBDCs. This isn't conspiracy; it's all in their own documentation.

They are building a full-spectrum digital cage, and its two locked doors are Digital Identity and Central Bank Digital Currencies (CBDCs). You cannot have one without the other.

The plan is to replace your government-issued ID with a Digital ID, but it's not just a card in your phone. It is fundamentally built upon your immutable biometrics: your fingerprints, the precise structure of your face, the unique pattern of your iris.

This biometric data is the key. It is the hard link that ties your physical body directly to your digital identity credential. Your very body becomes your password.

The reason this is so critical for them is the financial system. UN & Bank for International Settlements docs overtly state that Digital ID and CBDCs are designed to be integrated. The system cannot exist without this biometric digital ID.

Why? Know Your Customer (KYC) protocols. For this new digital financial system to function, they must absolutely "know" every single participant. Your digital wallet will be tied to your digital ID, which is mapped to your biometrics. Total financial-biological linkage.

We see the prototypes being rolled out now:
• Sam Altman's WorldCoin lures people to scan their irises for a "unique identifier" and a digital wallet. This is the exact model.

• The UN's "Building Blocks" program forces refugees to scan their iris at checkout to receive food rations. The value is deducted from a wallet tied to that biometric ID.

They justify this total surveillance under the guise of closing the "identity gap," claiming the world's poor need digital IDs to access essential services like banking and healthcare.

The reality? This is the ultimate onboarding mechanism into a system of programmable control, where your access to society and your own money is permissioned and revocable based on your compliance.

This is the bedrock of the new global financial system. It is not about convenience. It is about control. Your body is the new currency, and they are forcing you to hand over the keys.

https://odysee.com/@YoDat:d/Whitney-Webb-breaks-down-the-coordinated-global-push-for-a-new-dystopian-system:4?r=61UDjxMT3dZfBaS5W8ZPN3fEqCpnBhW1
Forwarded from The_Void
The dystopian nightmare etched repeatedly into our collective consciousness through science fiction is not merely entertainment. It is a calculated exercise in social engineering—conditioning the masses to endure a looming era of moral and societal collapse while diverting attention from the parasitic psychopathy that thrives on control, deception, and the suppression of human awakening.

The Story Machine’s objective is clear: to preserve the illusion system by programming us to accept a dystopian future without resistance.

READ MORE:
https://www.thevoid.uk/void-post/the-sum-of-all-psyops-quick-guide/

ARCHIVE:
Predictive Programming:
https://www.thevoid.uk/tag/predictive-programming/