Forwarded from AndroidSage.com
ChatGPT's Advanced Voice Mode gets a major upgrade! Search the web with voice commands, video chat with the AI, and more.
https://www.androidsage.com/2024/12/14/chatgpt-video-chat-share-screen-and-searchgpt/
https://www.androidsage.com/2024/12/14/chatgpt-video-chat-share-screen-and-searchgpt/
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
No Login
This extension let's you to access social media websites without logging in, by removing login popups, bypassing other banners, etc.
π Links:
- Add it to your Firefox
- Demo video
- Supported websites
- Source code
Developer: Martin Braquet
π·οΈ Tags: #Extension #Productivity
This extension let's you to access social media websites without logging in, by removing login popups, bypassing other banners, etc.
π Links:
- Add it to your Firefox
- Demo video
- Supported websites
- Source code
Developer: Martin Braquet
π·οΈ Tags: #Extension #Productivity
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Unf*ck Google
This extension forces 'Verbatim' search on Google - removing all bs personalization and localization and letting you find results for what you type, not what Google thinks is in your head. It also forces "Sort by Date" on Google News search.
π Link:
- Add it to your Firefox
π·οΈ Tags: #Extension #Productivity
This extension forces 'Verbatim' search on Google - removing all bs personalization and localization and letting you find results for what you type, not what Google thinks is in your head. It also forces "Sort by Date" on Google News search.
π Link:
- Add it to your Firefox
π·οΈ Tags: #Extension #Productivity
Forwarded from The Hacker News
"United States Department of Justice.pdf" β Legit? Think Again!
New Backdoor Targeting Thai Officials. Hackers are deploying a stealthy backdoor, Yokai, by disguising malware as trusted documents.
π― What happened? DLL side-loading enables attackers to bypass defenses.
π‘ Backdoor connects to attacker-controlled servers for total system control. Without proactive measures, businesses risk breaches that cost millions.
Hereβs what you can do NOW:
1οΈβ£ Train teams on spotting spear-phishing lures.
2οΈβ£ Audit systems for DLL side-loading vulnerabilities.
3οΈβ£ Strengthen your endpoint defenses.
Find details here: https://thehackernews.com/2024/12/thai-officials-targeted-in-yokai.html
New Backdoor Targeting Thai Officials. Hackers are deploying a stealthy backdoor, Yokai, by disguising malware as trusted documents.
π― What happened? DLL side-loading enables attackers to bypass defenses.
π‘ Backdoor connects to attacker-controlled servers for total system control. Without proactive measures, businesses risk breaches that cost millions.
Hereβs what you can do NOW:
1οΈβ£ Train teams on spotting spear-phishing lures.
2οΈβ£ Audit systems for DLL side-loading vulnerabilities.
3οΈβ£ Strengthen your endpoint defenses.
Find details here: https://thehackernews.com/2024/12/thai-officials-targeted-in-yokai.html
Forwarded from The Hacker News
π¨ Could Your Device Be a Secret Cybercriminal Tool?
The Federal Office of Information Security (BSI) just disrupted BADBOX, a malware preloaded on common devices like picture frames and cheap android phones.
π‘ Whatβs the risk?
β’ Devices turned into ad fraud machines, routing hackers' internet traffic.
β’ Stolen authentication codes, fake Gmail & WhatsApp accounts created.
β οΈ Why it matters:
This isnβt just a malware problemβit's a supply chain crisis. If a device seems "too cheap," it might come with hidden costs.
π Learn more: https://thehackernews.com/2024/12/germany-disrupts-badbox-malware-on.html
The Federal Office of Information Security (BSI) just disrupted BADBOX, a malware preloaded on common devices like picture frames and cheap android phones.
π‘ Whatβs the risk?
β’ Devices turned into ad fraud machines, routing hackers' internet traffic.
β’ Stolen authentication codes, fake Gmail & WhatsApp accounts created.
β οΈ Why it matters:
This isnβt just a malware problemβit's a supply chain crisis. If a device seems "too cheap," it might come with hidden costs.
π Learn more: https://thehackernews.com/2024/12/germany-disrupts-badbox-malware-on.html
Forwarded from Gizchina.com
POCO X7 Series Gears Up for India Launch β Detailed Renders Appear Online
https://www.gizchina.com/2024/12/13/poco-x7-series-gears-up-for-india-launch-detailed-renders-appear-online/
https://www.gizchina.com/2024/12/13/poco-x7-series-gears-up-for-india-launch-detailed-renders-appear-online/
Forwarded from Gizchina.com
Linkind ET6 Smart TV Backlights from AiDot: Perfect Sync for Movies, Games, and Music
https://www.gizchina.com/2024/12/14/linkind-et6-smart-tv-backlights-from-aidot-perfect-sync-for-movies-games-and-music/
https://www.gizchina.com/2024/12/14/linkind-et6-smart-tv-backlights-from-aidot-perfect-sync-for-movies-games-and-music/
Forwarded from Gizchina.com
Xiaomiβs affordable phone : POCO F7 Pro Details Revealed
https://www.gizchina.com/2024/12/14/xiaomis-affordable-phone-poco-f7-pro-details-revealed/
https://www.gizchina.com/2024/12/14/xiaomis-affordable-phone-poco-f7-pro-details-revealed/
Forwarded from Gizchina.com
Nintendo Switch 2 Design Details Revealed: What We Know So Far
https://www.gizchina.com/2024/12/14/nintendo-switch-2-design-details-revealed-what-we-know-so-far/
https://www.gizchina.com/2024/12/14/nintendo-switch-2-design-details-revealed-what-we-know-so-far/
Forwarded from Gizchina.com
Chuwi Hi10 X1 Review: Small Tablet, Big Potential!
https://www.gizchina.com/2024/12/14/chuwi-hi10-x1-review-small-tablet-big-potential/
https://www.gizchina.com/2024/12/14/chuwi-hi10-x1-review-small-tablet-big-potential/
Forwarded from cKure
β β β β β‘ New stealthy Pumakit Linux rootkit malware spotted in the wild.
https://www.bleepingcomputer.com/news/security/new-stealthy-pumakit-linux-rootkit-malware-spotted-in-the-wild/
https://www.bleepingcomputer.com/news/security/new-stealthy-pumakit-linux-rootkit-malware-spotted-in-the-wild/
BleepingComputer
New stealthy Pumakit Linux rootkit malware spotted in the wild
A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems.
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
FetchIt
FetchIt is an Android application for easy downloading of media files from popular platforms like YouTube, Facebook, Instagram, TikTok, and more. It provides a user-friendly interface with URL input and file location selection, making media saving a seamless experience across devices.
π Links:
- Download
- Screenshots
- Supported platforms
- Source code
Developer: Tharun Birla
π·οΈ Tags: #Android #Media #Tools
FetchIt is an Android application for easy downloading of media files from popular platforms like YouTube, Facebook, Instagram, TikTok, and more. It provides a user-friendly interface with URL input and file location selection, making media saving a seamless experience across devices.
π Links:
- Download
- Screenshots
- Supported platforms
- Source code
Developer: Tharun Birla
π·οΈ Tags: #Android #Media #Tools
Signature Permission Allowlist:
Android 15 introduces an explicit allowlist for platform signature permissions that are requested by nonsystem apps or newly requested by updates to system apps.
What It Is:
- Platform Signed Apps: These are apps that have the same signing certificate as the Android system. They can be system apps (built into the device) or non-system apps (installed later).
- Signature Permissions: These are special permissions defined by the Android system that can only be granted to apps with the right signing certificate.
Key Points:
1. Manufacturers' Control: Since Android 15, device manufacturers can control which permissions platform signed non-system apps can use by adding them to a specific list (allowlist).
2. Allowlist Function: If a non-system app is not on the allowlist, it can't use certain permissions on standard (non-debuggable) builds. This means the app will act like itβs not platform signed and won't get those special permissions.
3. Debuggable Builds: In builds meant for testing (debuggable), the system doesn't enforce the allowlist. This makes it easier for developers to test their apps.
4. System Apps: The permissions of system apps arenβt affected by this change, but any new permissions that a system app wants after an update must still be added to the allowlist.
Adding and Customizing an Allowlist:
- Allowlists can be stored in one or more XML files in a specific directory on the device. Manufacturers can organize these files however they want.
Overall, The signature permission allowlist is a way for device manufacturers to control app permissions based on their signing certificates, ensuring only approved apps can access certain features while making testing easier during development.
For more information, see Signature permission allowlist.
#Android #Android15 #A15
- @AbhiTheM0dder
Android 15 introduces an explicit allowlist for platform signature permissions that are requested by nonsystem apps or newly requested by updates to system apps.
What It Is:
- Platform Signed Apps: These are apps that have the same signing certificate as the Android system. They can be system apps (built into the device) or non-system apps (installed later).
- Signature Permissions: These are special permissions defined by the Android system that can only be granted to apps with the right signing certificate.
Key Points:
1. Manufacturers' Control: Since Android 15, device manufacturers can control which permissions platform signed non-system apps can use by adding them to a specific list (allowlist).
2. Allowlist Function: If a non-system app is not on the allowlist, it can't use certain permissions on standard (non-debuggable) builds. This means the app will act like itβs not platform signed and won't get those special permissions.
3. Debuggable Builds: In builds meant for testing (debuggable), the system doesn't enforce the allowlist. This makes it easier for developers to test their apps.
4. System Apps: The permissions of system apps arenβt affected by this change, but any new permissions that a system app wants after an update must still be added to the allowlist.
Adding and Customizing an Allowlist:
- Allowlists can be stored in one or more XML files in a specific directory on the device. Manufacturers can organize these files however they want.
Overall, The signature permission allowlist is a way for device manufacturers to control app permissions based on their signing certificates, ensuring only approved apps can access certain features while making testing easier during development.
For more information, see Signature permission allowlist.
#Android #Android15 #A15
- @AbhiTheM0dder
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (οΌΊοΌ§οΌοΌοΌ #DepressionArc)
Astroluma βοΈ
A feature-rich, user-friendly dashboard designed to help you manage multiple aspects of your daily tasks and services. Built with flexibility in mind, it allows you to control various features like task management, device monitoring, app integration, and real-time weather updates, all from a single platform. With its responsive design and dynamic configuration options.
π Links
- Build & Install
- Screenshots
- Website
- Source code
Developer: Sanjeet990
π· Tags: #Linux #Productivity
A feature-rich, user-friendly dashboard designed to help you manage multiple aspects of your daily tasks and services. Built with flexibility in mind, it allows you to control various features like task management, device monitoring, app integration, and real-time weather updates, all from a single platform. With its responsive design and dynamic configuration options.
π Links
- Build & Install
- Screenshots
- Website
- Source code
Developer: Sanjeet990
π· Tags: #Linux #Productivity