Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Network Switch
A modern Android application that enables users to toggle between 4G and 5G network modes with dual control methods: Root access for rooted devices and Shizuku for non-rooted devices. Built using Jetpack Compose and Material Design 3.
🔗 Links:
- Download
- Screenshot
- Features
- Source code
Developer: Ameya Vijay Unchagaonkar
🏷 Tags: #Android #Utilities #Network
A modern Android application that enables users to toggle between 4G and 5G network modes with dual control methods: Root access for rooted devices and Shizuku for non-rooted devices. Built using Jetpack Compose and Material Design 3.
🔗 Links:
- Download
- Screenshot
- Features
- Source code
Developer: Ameya Vijay Unchagaonkar
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #Utilities #Network
Forwarded from The Hacker News
⚠️ Major npm supply-chain attack just dropped!
40+ popular packages were secretly booby-trapped to steal developer secrets—GitHub tokens, npm keys, even AWS creds—on both Windows & Linux.
🕵️♂️ Audit & rotate your credentials now.
Full story → https://thehackernews.com/2025/09/40-npm-packages-compromised-in-supply.html
40+ popular packages were secretly booby-trapped to steal developer secrets—GitHub tokens, npm keys, even AWS creds—on both Windows & Linux.
🕵️♂️ Audit & rotate your credentials now.
Full story → https://thehackernews.com/2025/09/40-npm-packages-compromised-in-supply.html
Forwarded from vx-underground
Update: it's real lmfao y'all are COOKED bro
https://www.aikido.dev/blog/npm-debug-and-chalk-packages-compromised
https://www.aikido.dev/blog/npm-debug-and-chalk-packages-compromised
www.aikido.dev
npm debug and chalk packages compromised
The popular packages debug and chalk on npm have been compromised with malicious code
Forwarded from The Hacker News
Apple backports a critical fix for CVE-2025-43300—already used in a sophisticated spyware attack.
🕵️♂️ Hackers chained it with a WhatsApp flaw to target fewer than 200 people.
📱 Older iPhones & Macs are now patched—don’t skip this update.
Details → https://thehackernews.com/2025/09/apple-backports-fix-for-cve-2025-43300.html
🕵️♂️ Hackers chained it with a WhatsApp flaw to target fewer than 200 people.
📱 Older iPhones & Macs are now patched—don’t skip this update.
Details → https://thehackernews.com/2025/09/apple-backports-fix-for-cve-2025-43300.html
Forwarded from The Hacker News
This media is not supported in your browser
VIEW IN TELEGRAM
🚨Lazarus escalated activities in 2025 with companies already suffering billions in losses.
This APT’s attacks are evolving and getting harder to detect.
Read actionable report on its current campaigns to be ready for the next attack ⬇️ https://thn.news/lazarus-attacks-2025
This APT’s attacks are evolving and getting harder to detect.
Read actionable report on its current campaigns to be ready for the next attack ⬇️ https://thn.news/lazarus-attacks-2025
Forwarded from Android Security & Malware
Strategies for Analyzing Native Code in Android Applications: Combining Ghidra and Symbolic Execution for Code Decryption and Deobfuscation
https://revflash.medium.com/strategies-for-analyzing-native-code-in-android-applications-combining-ghidra-and-symbolic-aaef4c9555df
https://revflash.medium.com/strategies-for-analyzing-native-code-in-android-applications-combining-ghidra-and-symbolic-aaef4c9555df
Medium
Strategies for Analyzing Native Code in Android Applications: Combining Ghidra and Symbolic…
In my work analyzing native code in Android applications, I often try different techniques. Some work, others not so much. I’ve realized I…
Forwarded from NoGoolag
Google Ordered to Pay $425 Million for Tracking Users Who Disabled Web & App Activity Setting
https://ift.tt/zAT5uvO - FOLLOW: @reclaimthenet
https://ift.tt/zAT5uvO - FOLLOW: @reclaimthenet
Reclaim The Net
Google Ordered to Pay $425 Million for Tracking Users Who Disabled Web & App Activity Setting
Privacy settings were more like polite suggestions than actual boundaries.
Forwarded from NoGoolag
Macron’s Global Censorship Push Exposed: Leaked Files Reveal France’s Covert Speech Control Campaign
https://ift.tt/c3G4RgD - FOLLOW: @reclaimthenet
https://ift.tt/c3G4RgD - FOLLOW: @reclaimthenet
Reclaim The Net
Macron's Global Censorship Push Exposed: Leaked Files Reveal France's Covert Speech Control Campaign
France used lawsuits, NGOs, and private outreach to pressure Twitter into global censorship beyond French law.
Forwarded from NoGoolag
#Nepal Blocks Facebook, YouTube, WhatsApp, and Other Major CIA and mossad spywares
https://ift.tt/2zIpUKY - FOLLOW: @reclaimthenet
https://ift.tt/2zIpUKY - FOLLOW: @reclaimthenet
Reclaim The Net
Nepal Blocks Facebook, YouTube, WhatsApp, and Other Major Platforms
A country of 30 million just pulled the plug on the internet’s biggest names in under a week.
Forwarded from Beechat Network
After weeks of focused work, we now have MAVLink running over Reticulum in Rust.
What that means:
- A flight controller connected over serial can talk to QGroundControl
- The traffic is encrypted, meshed, and carried over whatever medium Reticulum supports
- The transport is flexible over WiFi, sub-GHz, and 2.4 GHz
With MAVLink secured and meshed across a trustless network stack, we believe it is a big step toward making drones truly mesh-native. The ground and flight sides run as simple binaries, configurable with TOML, and it is ready for others to build on.
If you are working on drones, autonomy, or resilient comms, we would love to connect.
Check out the GitHub and get involved:
https://github.com/BeechatNetworkSystemsLtd/rns-mavlink-rs
What that means:
- A flight controller connected over serial can talk to QGroundControl
- The traffic is encrypted, meshed, and carried over whatever medium Reticulum supports
- The transport is flexible over WiFi, sub-GHz, and 2.4 GHz
With MAVLink secured and meshed across a trustless network stack, we believe it is a big step toward making drones truly mesh-native. The ground and flight sides run as simple binaries, configurable with TOML, and it is ready for others to build on.
If you are working on drones, autonomy, or resilient comms, we would love to connect.
Check out the GitHub and get involved:
https://github.com/BeechatNetworkSystemsLtd/rns-mavlink-rs
Forwarded from NoGoolag
Whitney Webb breaks down the coordinated global push for a new, dystopian system of control, marrying digital ID with CBDCs. This isn't conspiracy; it's all in their own documentation.
They are building a full-spectrum digital cage, and its two locked doors are Digital Identity and Central Bank Digital Currencies (CBDCs). You cannot have one without the other.
The plan is to replace your government-issued ID with a Digital ID, but it's not just a card in your phone. It is fundamentally built upon your immutable biometrics: your fingerprints, the precise structure of your face, the unique pattern of your iris.
This biometric data is the key. It is the hard link that ties your physical body directly to your digital identity credential. Your very body becomes your password.
The reason this is so critical for them is the financial system. UN & Bank for International Settlements docs overtly state that Digital ID and CBDCs are designed to be integrated. The system cannot exist without this biometric digital ID.
Why? Know Your Customer (KYC) protocols. For this new digital financial system to function, they must absolutely "know" every single participant. Your digital wallet will be tied to your digital ID, which is mapped to your biometrics. Total financial-biological linkage.
We see the prototypes being rolled out now:
• Sam Altman's WorldCoin lures people to scan their irises for a "unique identifier" and a digital wallet. This is the exact model.
• The UN's "Building Blocks" program forces refugees to scan their iris at checkout to receive food rations. The value is deducted from a wallet tied to that biometric ID.
They justify this total surveillance under the guise of closing the "identity gap," claiming the world's poor need digital IDs to access essential services like banking and healthcare.
The reality? This is the ultimate onboarding mechanism into a system of programmable control, where your access to society and your own money is permissioned and revocable based on your compliance.
This is the bedrock of the new global financial system. It is not about convenience. It is about control. Your body is the new currency, and they are forcing you to hand over the keys.
https://odysee.com/@YoDat:d/Whitney-Webb-breaks-down-the-coordinated-global-push-for-a-new-dystopian-system:4?r=61UDjxMT3dZfBaS5W8ZPN3fEqCpnBhW1
They are building a full-spectrum digital cage, and its two locked doors are Digital Identity and Central Bank Digital Currencies (CBDCs). You cannot have one without the other.
The plan is to replace your government-issued ID with a Digital ID, but it's not just a card in your phone. It is fundamentally built upon your immutable biometrics: your fingerprints, the precise structure of your face, the unique pattern of your iris.
This biometric data is the key. It is the hard link that ties your physical body directly to your digital identity credential. Your very body becomes your password.
The reason this is so critical for them is the financial system. UN & Bank for International Settlements docs overtly state that Digital ID and CBDCs are designed to be integrated. The system cannot exist without this biometric digital ID.
Why? Know Your Customer (KYC) protocols. For this new digital financial system to function, they must absolutely "know" every single participant. Your digital wallet will be tied to your digital ID, which is mapped to your biometrics. Total financial-biological linkage.
We see the prototypes being rolled out now:
• Sam Altman's WorldCoin lures people to scan their irises for a "unique identifier" and a digital wallet. This is the exact model.
• The UN's "Building Blocks" program forces refugees to scan their iris at checkout to receive food rations. The value is deducted from a wallet tied to that biometric ID.
They justify this total surveillance under the guise of closing the "identity gap," claiming the world's poor need digital IDs to access essential services like banking and healthcare.
The reality? This is the ultimate onboarding mechanism into a system of programmable control, where your access to society and your own money is permissioned and revocable based on your compliance.
This is the bedrock of the new global financial system. It is not about convenience. It is about control. Your body is the new currency, and they are forcing you to hand over the keys.
https://odysee.com/@YoDat:d/Whitney-Webb-breaks-down-the-coordinated-global-push-for-a-new-dystopian-system:4?r=61UDjxMT3dZfBaS5W8ZPN3fEqCpnBhW1
Odysee
Whitney Webb breaks down the coordinated global push for a new, dystopian system of control.
Whitney Webb breaks down the coordinated global push for a new, dystopian system of control, marrying digital ID with CBDCs. This isn't conspiracy; it's all in their own documentation.
Forwarded from The_Void
The dystopian nightmare etched repeatedly into our collective consciousness through science fiction is not merely entertainment. It is a calculated exercise in social engineering—conditioning the masses to endure a looming era of moral and societal collapse while diverting attention from the parasitic psychopathy that thrives on control, deception, and the suppression of human awakening.
The Story Machine’s objective is clear: to preserve the illusion system by programming us to accept a dystopian future without resistance.
READ MORE:
https://www.thevoid.uk/void-post/the-sum-of-all-psyops-quick-guide/
ARCHIVE:
Predictive Programming:
https://www.thevoid.uk/tag/predictive-programming/
The Story Machine’s objective is clear: to preserve the illusion system by programming us to accept a dystopian future without resistance.
READ MORE:
https://www.thevoid.uk/void-post/the-sum-of-all-psyops-quick-guide/
ARCHIVE:
Predictive Programming:
https://www.thevoid.uk/tag/predictive-programming/
Forwarded from NoGoolag
Media is too big
VIEW IN TELEGRAM
Forwarded from NoGoolag
Samsung fixes #Android #0day that may have been used to spy on #WhatsApp messages
A similar vuln on Apple devices was used against 'specific targeted users' Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow remote code execution on affected devices.…
https://www.theregister.com/2025/09/12/samsung_fixes_android_0day/
A similar vuln on Apple devices was used against 'specific targeted users' Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow remote code execution on affected devices.…
https://www.theregister.com/2025/09/12/samsung_fixes_android_0day/
The Register
Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages
: A similar vuln on Apple devices was used against 'specific targeted users'
Forwarded from NoGoolag
Tor Project Releases Experimental #Tor #VPN Beta for #Android with Per-App Routing and Privacy Tools
https://ift.tt/boRFLGe
@reclaimthenet
The Tor Project has launched its own VPN – but it's not the finished product yet
https://www.tomsguide.com/computing/vpns/the-tor-project-has-launched-its-own-vpn-but-its-not-the-finished-product-yet
https://gitlab.torproject.org/tpo/applications/vpn
https://ift.tt/boRFLGe
@reclaimthenet
The Tor Project has launched its own VPN – but it's not the finished product yet
https://www.tomsguide.com/computing/vpns/the-tor-project-has-launched-its-own-vpn-but-its-not-the-finished-product-yet
https://gitlab.torproject.org/tpo/applications/vpn
Reclaim The Net
Tor Project Releases Experimental Tor VPN Beta for Android with Per-App Routing and Privacy Tools
It’s a major step for Tor on mobile, even if the software is still rough around the edges.
Forwarded from NoGoolag
YouTube
For 9 Years Tor Ignored Princeton's Proof: BGP Attacks Can Unmask Millions of Users
Counter-RAPTOR: Safeguarding tor against active routing attacks:
https://arxiv.org/pdf/1704.00843
Credit: /u/Yugong on Dread
Also see:
Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, and
P. Mittal, “Raptor: routing attacks on privacy in…
https://arxiv.org/pdf/1704.00843
Credit: /u/Yugong on Dread
Also see:
Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, and
P. Mittal, “Raptor: routing attacks on privacy in…
Forwarded from NoGoolag
YouTube
The Tor Project is Ignoring These Issues
In this video I discuss how the Tor project has been ignoring and or slow to fix major issues in both the Tor browser and network including the weakness to BGP hijacking attacks with the current route selection algorithm, the slow fix of the security slider…
Forwarded from NoGoolag
Mullvad Introduces QUIC-Based WireGuard Obfuscation to Bypass Censorship and VPN Blocks
https://ift.tt/gekf0Wm - FOLLOW: @reclaimthenet
https://ift.tt/gekf0Wm - FOLLOW: @reclaimthenet
Reclaim The Net
Mullvad Hides WireGuard in QUIC to Bypass Censorship
Mullvad wraps WireGuard in QUIC to make VPN traffic blend in with normal internet traffic.
Forwarded from NoGoolag
tl;dr #china's firewall #censorship thingy has massive leak. shows code and political ambitions and stuff
idk the significance because i dont study chinese network firewall sciency stuff. maybe one of you nerds is interested. its all available for download online now
https://gfw.report/blog/geedge_and_mesa_leak/en/
#gfw
idk the significance because i dont study chinese network firewall sciency stuff. maybe one of you nerds is interested. its all available for download online now
https://gfw.report/blog/geedge_and_mesa_leak/en/
#gfw
Forwarded from vx-underground
> 500GB leak of Chinese firewall
> Leaked source code
> Leaked chat logs
> Shows political ambitions and stuff
> Look inside
> Not made out of fire
> Leaked source code
> Leaked chat logs
> Shows political ambitions and stuff
> Look inside
> Not made out of fire