Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
580 videos
542 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Google Pixel Hub
Pixel 10a leak renders & specs
- Plastic back with no camera bump
- Similar looks to Pixel 9a (color might not be real)
- Expected to launch in early 2026
- Display: 6.2-inch
- Dimensions: 153.9 x 72.9 x 9mm
- Chip: Tensor G4 (higher clocked)
- Price: $499 (128GB)
- Note: Above information should be taken with a grain of salt, as these are currently just speculations

More info: Android Headlines
#Pixel #Pixel10a @PixelHubUpdates
Forwarded from The Hacker News
AI-driven attacks move faster than humans can react.

The real risk? Teams flying blind.

ANYRUN flips the script — predicting attacks before they strike. 99% unique IOCs. Zero lag. Full context.

Early detection turns panic into power → https://thehackernews.com/2025/10/why-early-threat-detection-is-must-for.html
Forwarded from The Hacker News
🚨 North Korea–linked BlueNoroff is running two active campaigns — GhostCall & GhostHire — into 2025.

GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK “updates.”

GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.

Full report ↓ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
Forwarded from The Hacker News
🚨 New Android Trojan ‘Herodotus’ is on the move.

It’s hitting phones in 🇮🇹 Italy & 🇧🇷 Brazil — stealing 2FA codes, logins, even lock PINs — and typing like a human to slip past fraud detection.

🔗 Read full report → https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
No deleted account found from 85 scanned users from this group 🚫👻

💬 Send /lang to change language of the bot
https://github.com/dorumrr/de1984/releases/tag/v1.1.0

De1984
Privacy isn’t default. Take it back with De1984 Firewall and Package control.

Features
🛡️ Firewall
VPN-based firewall (no root required)
Block apps from accessing WiFi, Mobile Data, or Roaming
Per-app network control with granular permissions
📦 Package Management (with Shizuku or root)
Enable/disable users of system apps
Force stop running apps
Uninstall system and user apps
Works with Shizuku (no root required) or traditional root access
🔒 Privacy First
Zero tracking or analytics
No telemetry
Local-only data storage
100% open source (MIT License)
📋 Requirements
Android 8.0 (API 26) or higher
Shizuku or root access optional (required for package management features)
VPN permission (for firewall functionality)
🔐 Permissions
INTERNET: For firewall functionality (VPN-based)
ACCESS_NETWORK_STATE: Monitor network connectivity
BIND_VPN_SERVICE: Create local VPN for firewall
QUERY_ALL_PACKAGES: View installed apps (optional)
Shizuku or root access: For advanced package management (optional)
https://github.com/dorumrr/privacyFlip/releases/tag/v1.4.1

PrivacyFlip
Automatic lock/unlock privacy control for Android devices 🔐📱

PrivacyFlip automatically manages your device's privacy features based on lock/unlock state. When you lock your device, it can disable Wi-Fi, Bluetooth, mobile data, location services, NFC, and even camera/microphone sensors (experimental). When you unlock, it intelligently restores the features you want back on.

Works with Root or Shizuku - Choose your preferred privilege method!

Stop leaking data and being tracked when your phone is locked. Automatic lock/unlock privacy control for rooted Android devices 🔐📱

🔒 Features
Automatic Privacy Control
Lock Detection: Instantly disables privacy features when screen locks
Unlock Detection: Waits for proper authentication (not just screen-on)
Smart Restoration: Configurable feature re-enabling on unlock
Privacy Features Controlled
📶 Wi-Fi - Disable/enable wireless connectivity
📱 Bluetooth - Control Bluetooth radio
📡 Mobile data - Manage cellular data connection
📍 Location services - Control GPS and location tracking
📳 NFC - Control Near Field Communication sensor
Experimental Features (Android 12+)
📷 Camera - Disable/enable camera sensor privacy
🎤 Microphone - Disable/enable microphone sensor privacy

Note: Camera and microphone controls require a timing window between screen lock and device lock. The app will warn you if your device is configured for instant locking.

Customizable Timing
Lock Delay: 0-60 seconds before privacy actions trigger
Unlock Delay: 0-60 seconds before features are restored
Instant Mode: Set delays to 0 for immediate action

📱 Requirements
Minimum: Android 7.0+ (API level 24) Camera/Microphone Features: Android 12+ (API level 31)

Choose ONE of the following privilege methods:

Option 1: Root Access (Recommended for rooted devices)
Root access via Magisk, SuperSU, or similar
Best performance with UID 0 privileges

Option 2: Shizuku (For non-rooted devices)
Shizuku app installed and running
ADB privileges via USB debugging or wireless ADB
No root required - works with ADB-level permissions

Option 3: Sui (Best of both worlds)
Rooted device with Magisk installed
Sui Magisk module installed
Best user experience - no permission prompts, automatic startup

🏗️ Architecture & Dependencies
Zero Google Dependencies - Complete F-Droid compliance
Pure AndroidX - Modern Android development without Google services
Traditional Android Views - Efficient UI with ViewBinding
Navigation Component - Fragment-based navigation
MVVM Pattern - Reactive architecture with LiveData
Dual Privilege Support - Abstraction layer for Root and Shizuku
Key Dependencies
libsu - Reliable root access management
Shizuku API - ADB privilege management
Sui - Magisk module for Shizuku API
AndroidX Core Libraries - Modern Android framework components
Work Manager - Background task scheduling
Navigation Component - Fragment navigation (Google Material excluded)
ViewBinding - Type-safe view references
Privilege Detection Priority
Sui - Magisk module providing Shizuku API with root (best UX)
Root - Traditional root access via Magisk/SuperSU
Shizuku - ADB privileges via Shizuku app (no root required)