Privacy + Secure Tech Corner Channel 🛡️
92 subscribers
6.67K photos
587 videos
557 files
16.3K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Gizchina.com
Samsung Galaxy S26 Ultra to feature brighter and more efficient display
https://www.gizchina.com/2025/01/09/samsung-galaxy-s26-ultra-display-tech-reveal/
Forwarded from The Hacker News
🔥 Critical Ivanti Flaw Under Attack!

Hackers are actively targeting CVE-2025-0282—a buffer overflow flaw (CVSS 9.0)—in Ivanti Connect Secure, Policy Secure, and ZTA Gateways.

Mandiant links this to China-linked actors (UNC5337) using novel tools like DRYHOOK for credential theft.

⤷ Federal agencies must patch by January 15, 2025.
⤷ Organizations worldwide are at risk of breaches.

👉 Learn more here: https://thehackernews.com/2025/01/ivanti-flaw-cve-2025-0282-actively.html
Forwarded from The Hacker News
😄😄 For the first time ever, the European Commission has been fined (Just €400) for violating its own data privacy laws.

The breach involved sending an EU citizen's data—including IP address and browser metadata—to Meta's servers in the U.S. via "Sign in with Facebook."

Learn more: https://thehackernews.com/2025/01/eu-commission-fined-for-transferring.html
Forwarded from The Hacker News
⚠️ Warning: Over 23,800 GFI KerioControl firewalls are vulnerable to a 1-click RCE flaw (CVE-2024-52875) that gives attackers root access.

🛡️ Update to v9.4.5 Patch 1 and audit your firewall access points immediately.

👉 Full details here: https://thehackernews.com/2025/01/critical-rce-flaw-in-gfi-keriocontrol.html
Forwarded from The Hacker News
🛑 China-linked MirrorFace has targeted Japan’s security and tech sectors in over 4 years of persistent attacks, says NPA & NCSC.

These attackers use spear-phishing, exploit device vulnerabilities, and evade antivirus detection by operating in Windows Sandbox—leaving no trace behind.

🔗 Learn the tactics attackers use and how to counter them: https://thehackernews.com/2025/01/mirrorface-leverages-anel-and-noopdoor.html
Forwarded from Hacker News
Who would buy a Raspberry Pi for $120?
Article, Comments
For devices running kernel 5.4 or later, just use a custom recovery to backup these partitions:
boot: boot.img
dtbo: dtbo.img
vendor_boot: vendor_boot.img
Forwarded from Omni Technovič
=============


Google Apps update


If you're having problems with various Google Apps not working properly starting within the last 2 weeks or so, check this out:



Google recently changed the method used to create app signatures on all Google Apps, and will be rolling these changes out to ALL apps distributed via Google Play starting next year.

This requires all app signature spoofing methods (either embedded within your ROM or used as an external patch) to be updated to continue to support apps distributed via Google Play on a device running microG.


The Github comment linked below contains a list of which ROMs and signature spoofing patches have imported the changes necessary to support the new Google Play app signing mechanism.

We advise you to NOT do any updates of apps sourced from Google Play - especially paid apps or any app that does license-checking - until you have these fixes applied on your devices or those apps may stop working!



(I do not know if the linked post will be continuously updated to reflect news about other ROMs etc but it is correct as of the time of posting. Most ROMs based on LOS should get these patches eventually. Please check with your ROM maintainer.)



https://github.com/microg/GmsCore/issues/2680#issuecomment-2548579352



===========
Forwarded from Omni Technovič
In short:

This is a ROM issue that has to be addressed, and IT DOES NOT AFFECT CURRENT USAGE OR CURRENTLY INSTALLED APPS.

UNLESS you JUST UPDATED a GOOGLE app like Gmail, YouTube, etc. Those are the ONLY APPS impacted by this so far.

Downgrading microG does NOTHING to solve that.

It MUST BE SOLVED IN YOUR ROM.
Forwarded from Omni Technovič
HEADS UP: Version 0.3.6 signature spoofing is NOT broken. Read below.



If you installed microG v0.3.6 recently, you may have noticed that the Self-Check page in the microG utility shows that your ROM does not support application signature spoofing.

That is simply because 0.3.6 is now testing for a BRAND NEW Google change in how applications are signed that currently only affects Google’s own apps.


FOR NOW: This does not have ANY impact on ANY apps other than the very latest GOOGLE apps: (Google Chrome, Google Maps, Gmail app, etc)

Later in 2025, Google will roll out this change to 3rd-party apps/games. To the best of our knowledge, this has NOT started yet as of the date of this post.

In order to prepare for this, you will have to update your signature spoofing solution.

This must be done by either your ROM developer, or your signature spoofing add-on. microG itself cannot solve this problem.

As of the time of this post, the latest LineageOS builds now include this update. Many ROMs based on LineageOS will eventually include this patch as well.

As for standalone spoofing solutions, the most popular one - “FakeGapps” Xposed module - has also been updated for this Google change.

If the check-mark for app signature spoofing is missing on the 0.3.6 microG Utility’s Self-Check page, please check with your ROM developer or signature spoofing solution developer for an update.

If you are using recent versions of Google’s own apps that have stopped working, please see our previous post linked below:


https://t.me/microG/152060