For devices running kernel 5.4 or later, just use a custom recovery to backup these partitions:
boot: boot.img
dtbo: dtbo.img
vendor_boot: vendor_boot.img
Forwarded from Omni Technovič
=============
Google Apps update
If you're having problems with various Google Apps not working properly starting within the last 2 weeks or so, check this out:
Google recently changed the method used to create app signatures on all Google Apps, and will be rolling these changes out to ALL apps distributed via Google Play starting next year.
This requires all app signature spoofing methods (either embedded within your ROM or used as an external patch) to be updated to continue to support apps distributed via Google Play on a device running microG.
The Github comment linked below contains a list of which ROMs and signature spoofing patches have imported the changes necessary to support the new Google Play app signing mechanism.
We advise you to NOT do any updates of apps sourced from Google Play - especially paid apps or any app that does license-checking - until you have these fixes applied on your devices or those apps may stop working!
(I do not know if the linked post will be continuously updated to reflect news about other ROMs etc but it is correct as of the time of posting. Most ROMs based on LOS should get these patches eventually. Please check with your ROM maintainer.)
https://github.com/microg/GmsCore/issues/2680#issuecomment-2548579352
===========
Google Apps update
If you're having problems with various Google Apps not working properly starting within the last 2 weeks or so, check this out:
Google recently changed the method used to create app signatures on all Google Apps, and will be rolling these changes out to ALL apps distributed via Google Play starting next year.
This requires all app signature spoofing methods (either embedded within your ROM or used as an external patch) to be updated to continue to support apps distributed via Google Play on a device running microG.
The Github comment linked below contains a list of which ROMs and signature spoofing patches have imported the changes necessary to support the new Google Play app signing mechanism.
We advise you to NOT do any updates of apps sourced from Google Play - especially paid apps or any app that does license-checking - until you have these fixes applied on your devices or those apps may stop working!
(I do not know if the linked post will be continuously updated to reflect news about other ROMs etc but it is correct as of the time of posting. Most ROMs based on LOS should get these patches eventually. Please check with your ROM maintainer.)
https://github.com/microg/GmsCore/issues/2680#issuecomment-2548579352
===========
Forwarded from Omni Technovič
In short:
This is a ROM issue that has to be addressed, and IT DOES NOT AFFECT CURRENT USAGE OR CURRENTLY INSTALLED APPS.
UNLESS you JUST UPDATED a GOOGLE app like Gmail, YouTube, etc. Those are the ONLY APPS impacted by this so far.
Downgrading microG does NOTHING to solve that.
It MUST BE SOLVED IN YOUR ROM.
This is a ROM issue that has to be addressed, and IT DOES NOT AFFECT CURRENT USAGE OR CURRENTLY INSTALLED APPS.
UNLESS you JUST UPDATED a GOOGLE app like Gmail, YouTube, etc. Those are the ONLY APPS impacted by this so far.
Downgrading microG does NOTHING to solve that.
It MUST BE SOLVED IN YOUR ROM.
Forwarded from Omni Technovič
HEADS UP: Version 0.3.6 signature spoofing is NOT broken. Read below.
If you installed microG v0.3.6 recently, you may have noticed that the Self-Check page in the microG utility shows that your ROM does not support application signature spoofing.
That is simply because 0.3.6 is now testing for a BRAND NEW Google change in how applications are signed that currently only affects Google’s own apps.
FOR NOW: This does not have ANY impact on ANY apps other than the very latest GOOGLE apps: (Google Chrome, Google Maps, Gmail app, etc)
Later in 2025, Google will roll out this change to 3rd-party apps/games. To the best of our knowledge, this has NOT started yet as of the date of this post.
In order to prepare for this, you will have to update your signature spoofing solution.
This must be done by either your ROM developer, or your signature spoofing add-on. microG itself cannot solve this problem.
As of the time of this post, the latest LineageOS builds now include this update. Many ROMs based on LineageOS will eventually include this patch as well.
As for standalone spoofing solutions, the most popular one - “FakeGapps” Xposed module - has also been updated for this Google change.
If the check-mark for app signature spoofing is missing on the 0.3.6 microG Utility’s Self-Check page, please check with your ROM developer or signature spoofing solution developer for an update.
If you are using recent versions of Google’s own apps that have stopped working, please see our previous post linked below:
https://t.me/microG/152060
If you installed microG v0.3.6 recently, you may have noticed that the Self-Check page in the microG utility shows that your ROM does not support application signature spoofing.
That is simply because 0.3.6 is now testing for a BRAND NEW Google change in how applications are signed that currently only affects Google’s own apps.
FOR NOW: This does not have ANY impact on ANY apps other than the very latest GOOGLE apps: (Google Chrome, Google Maps, Gmail app, etc)
Later in 2025, Google will roll out this change to 3rd-party apps/games. To the best of our knowledge, this has NOT started yet as of the date of this post.
In order to prepare for this, you will have to update your signature spoofing solution.
This must be done by either your ROM developer, or your signature spoofing add-on. microG itself cannot solve this problem.
As of the time of this post, the latest LineageOS builds now include this update. Many ROMs based on LineageOS will eventually include this patch as well.
As for standalone spoofing solutions, the most popular one - “FakeGapps” Xposed module - has also been updated for this Google change.
If the check-mark for app signature spoofing is missing on the 0.3.6 microG Utility’s Self-Check page, please check with your ROM developer or signature spoofing solution developer for an update.
If you are using recent versions of Google’s own apps that have stopped working, please see our previous post linked below:
https://t.me/microG/152060
Forwarded from The Hacker News
Advance your skills in strategic security design with Georgetown’s Online Certificate in Cybersecurity Strategy.
Learn more: https://thn.news/cybersecurity-strategy-ig
Learn more: https://thn.news/cybersecurity-strategy-ig
#A15 #Unofficial #GSI #LineageOS #Light
Build Date: 2025 01 09
December Security Patch
Lineage0S 22.1 2025.01.09
Note
Changelog
Features
Maintainer: MisterZtr
Download
@treblegsis_privacysecure_chat
@treblegsis_privacysecure_channel
Build Date: 2025 01 09
December Security Patch
Lineage0S 22.1 2025.01.09
Note
From main thing to know, I'm primarily building a GSI for myself. I need exactly LineageOS base + EROFS. And I can't fix bugs on all kinds of devices
Changelog
Switch to LineageOS 22.1 Android 15 QPR1
Sync with latest sources of Treble Droid
In qpr1 there will be no nice face unlock animations
Added vanilla ext4 version
Features
LineageOS
Android 15
For a/b devices only
No inbuilt root
Fixes that will never be in aosp
Face unlock
Forced LTE_CA
EROFS(Requires kernel 5.4+, and the corresponding fstab entries)
All ext4 builds are fully rw
No fixes from me for specific devices
Maintainer: MisterZtr
Download
@treblegsis_privacysecure_chat
@treblegsis_privacysecure_channel
Forwarded from The Hacker News
🚨 New Threat Alert: Banshee Stealer!
The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.
💻 Targets victims via phishing websites disguised as Google Chrome & Telegram
💸 Offered to hackers for $3,000/month under a Malware-as-a-Service model
🔗 Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.
💻 Targets victims via phishing websites disguised as Google Chrome & Telegram
💸 Offered to hackers for $3,000/month under a Malware-as-a-Service model
🔗 Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Rajarshi Khatua)
HeartRate
An Android application to measure your heart rate using your phone's camera. Perfect for fitness tracking, general wellness, or simply monitoring your pulse.
🔗Links
-Download
-Screenshots
-Features
-Source Code
-Developer: Vadym Tantsiura
🏷 Tags: #Android #Health #Fitness #OpenSource
An Android application to measure your heart rate using your phone's camera. Perfect for fitness tracking, general wellness, or simply monitoring your pulse.
🔗Links
-Download
-Screenshots
-Features
-Source Code
-Developer: Vadym Tantsiura
🏷 Tags: #Android #Health #Fitness #OpenSource
Forwarded from It's FOSS
YouTube
What is a Media Server Software and Do You Need One? #explainervideo
Sign up for ANY.RUN for free by providing your business email:
https://app.any.run/?utm_source=youtube&utm_medium=video&utm_campaign=its_foss&utm_content=register&utm_term=070125#register
Integrate ANY.RUN solutions into your company:
https://any.run/dem…
https://app.any.run/?utm_source=youtube&utm_medium=video&utm_campaign=its_foss&utm_content=register&utm_term=070125#register
Integrate ANY.RUN solutions into your company:
https://any.run/dem…
Forwarded from The Great Imperial Interdimensional Multiversal Holy DAO of NoGoolag (NoGoolag)
GitHub
Releases · TGX-Android/Telegram-X
The main repository of Telegram X — official alternative Telegram client for Android. - TGX-Android/Telegram-X
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️The Most Common Exploits Found In Apple, iPhone
@takebackourtech
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, we look at the special links the infamous Pegasus spyware used to control itself and how you might be able to tell if your phone is infected.
Also we’ll talk about how iMessage had a security hole abused by Pegasus from 2019 to 2023.
Sign up FREE to watch more webinar clips here.
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
@takebackourtech
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, we look at the special links the infamous Pegasus spyware used to control itself and how you might be able to tell if your phone is infected.
Also we’ll talk about how iMessage had a security hole abused by Pegasus from 2019 to 2023.
Sign up FREE to watch more webinar clips here.
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
Forwarded from The Hacker News
🚨 Critical flaws found in major platforms:
⤷ SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
⤷ Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
⤷ Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.
👉 Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html
Patch systems to secure your organization.
⤷ SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
⤷ Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
⤷ Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.
👉 Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html
Patch systems to secure your organization.