Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
578 videos
497 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Hello GKI peeps! New 1.5.10 is out... Give it a try! If differences are found let me know!

You may get new detections, wait for 1.5.11/12 or go back to 1.5.9, or.... if your apps dont notice anything just stay on 1.5.10 :D

Next, I previously added a fix that may have broke some device booting, but allowed other to not boot! This is not a susfs problem. If you can boot latest 1.5.9 but cant boot 1.5.10 or vise versa please let me know! if needed i cant start making different fixes!

Thanks Everyone!

If you like my work and would like to support me!
Donations:
https://t.me/WildKernels/90170/90171
Forwarded from KernelSU Next Bot
KernelSU_Next_v1.1.1-26-g478394a6-spoofed_12877-release.apk
16.9 MB
CI Manager (SPOOFED BUILD)
#ci_2677

kernel: align prctl harden commit from backslashxx/KernelSU
SQUASHED:
* kernel: harden barriers for arm/arm64
* kernel: core_hook: harden prctl handler

Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
Signed-off-by: rsuntk <rsuntk@yukiprjkt.my.id>

Commit
Workflow run
KernelSU_Next_v1.1.1-26-g478394a6_12877-release.apk
16.9 MB
CI Manager (TEST BUILD)
#ci_2677

kernel: align prctl harden commit from backslashxx/KernelSU
SQUASHED:
* kernel: harden barriers for arm/arm64
* kernel: core_hook: harden prctl handler

Signed-off-by: backslashxx <118538522+backslashxx@users.noreply.github.com>
Signed-off-by: rsuntk <rsuntk@yukiprjkt.my.id>

Commit
Workflow run
Forwarded from Nagram X CI
NagramX-v12.0.1(1220)-arm64-v8a.apk
48.4 MB
Release version.

Commit Message:
Version Bump


See commit details 7def502

What's new?

• feat: hide stories from header
• feat: disable profile avatar blur
• feat: add search button in N-Settings
• feat: disable in-app browser gestures
• feat: translate voice transcription
• feat: open document from link preview
• feat: add Details option to story viewer
• feat: add Save to Downloads button in SearchViewPager
• feat: allow translate with AI during auto translation
• feat: option to exclude API keys when exporting settings

• Bug fixes and improvements
No deleted account found from 86 scanned users from this group 🚫👻
Trigger for the integer underflow bug in the HID core subsystem (CVE-2025-38494 and CVE-2025-38495) that leaks 64 KB of OOB memory over USB
Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels)
https://github.com/xairy/kernel-exploits/tree/master/CVE-2025-38494
CVE-2025-10184 is permission bypass that affects multiple OnePlus devices running OxygenOS 12–15 (NOT FIXED) with PoC
This vulnerability allows any application installed on the device to read SMS/MMS without permission, user interaction, or consent.
https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/
This media is not supported in your browser
VIEW IN TELEGRAM
Triggered WhatsApp 0-click on iOS/macOS/iPadOS
CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300.
Analysis of Samsung CVE-2025-21043 is also ongoing
Source: https://x.com/DarkNavyOrg/status/1972260639101034950
Security Evaluation Of Android Apps In Budget African Mobile Devices
The study examined 1,544 APKs collected from seven African smartphones. The analysis revealed that 145 applications (9%) disclose sensitive data, 249 (16%) expose critical components, and many present additional risks: 226 execute privileged or dangerous commands, 79 interact with SMS messages (read, send, or delete), and 33 perform silent installation operations
https://arxiv.org/pdf/2509.18800
Phones auto-connecting to "FreeWiFi_Secure" Wi-Fi network leak full IMSI in cleartext during EAP-SIM exchange
Anyone nearby with sniffer could capture it → track users, or correlate identities.
Fixed pushed disabling FreeWiFi_Secure on legacy boxes starting Oct 1, 2025.
https://7h30th3r0n3.fr/the-vulnerability-that-killed-freewifi_secure/