Privacy + Secure Tech Corner Channel ๐Ÿ›ก๏ธ
90 subscribers
6.66K photos
579 videos
530 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from ๐— ๐—˜๐—ข๐—ช ๐——๐—จ๐— ๐—ฃ (๐— ๐—˜๐—ข๐—ช๐—ป๐—ฎ ๐Ÿ’…)
Important Update: Changes to Play Integrity Verdicts
[SOURCE: Android Developers]

Google has introduced some important changes to the Play Integrity API, which helps determine the safety of apps and devices. If you use apps on rooted devices or custom ROMs, these changes could impact you. Here's a breakdown of what these changes mean for you:

1. Integrity Verdicts

We are already aware of these changes, so let's not waste time on it. If you don't know, you can read this post

2. App Integrity Verdicts

LICENSED: The app was installed from Google Play.

UNLICENSED: The app was sideloaded or not from Google Play.

PLAY_RECOGNIZED: The app matches the version on Google Play.

UNRECOGNIZED_VERSION: The appโ€™s version doesnโ€™t match whatโ€™s available on Google Play.
How it affects you: If you install apps from other sources, not from playstore, the integrity checks will label the app as UNLICENSED or UNRECOGNIZED_VERSION.


3. Recent Device Activity

This new feature helps goolag to determine suspicious activity on your device based on the number of requests made.

LEVEL_1: Low activity (10 or fewer requests in the last hour).

LEVEL_4: High activity (more than 50 requests).
How it affects you: Devices showing high activity levels might be flagged for suspicious behavior, such as attempts to generate tokens for untrusted devices.


4. Play Protect and App Access Risk

Google now checks if other apps on your device could compromise its security. These apps include screen recorders, remote controllers, and malware.

KNOWN_INSTALLED: Safe apps installed from Google Play.

KNOWN_CAPTURING: Apps that could record or capture data from your device.

KNOWN_CONTROLLING: Apps that could control your device.
How it affects you: If your device has apps like ksu, apatch, magisk etc, it may be flagged for higher app access risk, indicating potential security issues.


Why This Matters?

These changes mean that apps may now be more strict about the devices and accounts they allow. If your device is rooted, using a custom ROM, or if you sideload apps, install apps from unknown source, it may not pass the new Play Integrity checks, and you could face issues with app access or updates.

๐Ÿ“ฑ ๐— ๐—˜๐—ข๐—ช ๐——๐—จ๐— ๐—ฃ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘1
Forwarded from The Hacker News
๐Ÿ›‘ Alert : TikTok, SHEIN, AliExpress, and others accused of violating EU data laws by sending user data to China.

Privacy Group noyb demands suspension of data flows.

Find out more: https://thehackernews.com/2025/01/european-privacy-group-sues-tiktok-and.html
Forwarded from The Hacker News
๐Ÿ›ก๏ธ The U.S. Treasury just sanctioned 2 individuals and 4 entities tied to North Koreaโ€™s illicit IT worker networkโ€”a major blow to funding its WMD and missile programs.

๐Ÿ‘‰ Read More: https://thehackernews.com/2025/01/us-sanctions-north-korean-it-worker.html
Forwarded from The Hacker News
๐Ÿ›‘ New Adversary-in-the-Middle Phishing Kit Alert!

A powerful new phishing kit called Sneaky 2FA has been discovered, designed to steal your credentials and bypass 2FA.

โคท Sold as a service via Telegram, offering an easy path for cybercriminals
โคท Built to outsmart anti-bot systems and Cloudflare challenges

๐Ÿ‘‰ Learn how: https://thehackernews.com/2025/01/new-sneaky-2fa-phishing-kit-targets.html
Forwarded from The Hacker News
๐Ÿšจ Most companies are still relying on outdated security models for guest Wi-Fi.

Itโ€™s time to move beyond traditional security models and adopt Zero Trust for tighter control and constant verification.

โคท Prevent lateral movement
โคท Continuous verification
โคท Granular access control

๐Ÿ‘‰ Explore how: https://thehackernews.com/2025/01/how-to-bring-zero-trust-to-wi-fi.html
Forwarded from The Hacker News
๐Ÿšจ Researchers discovered 3 vulnerabilities in WGS-804HPT switches used in automation systemsโ€”exploitable to execute remote code.

โคท CVE-2024-52320 & CVE-2024-48871: Critical 9.8 scores!
โคท Attackers can execute remote code with just a malicious HTTP request.

Read the full report: https://thehackernews.com/2025/01/critical-flaws-in-wgs-804hpt-switches.html