Privacy + Secure Tech Corner Channel ๐Ÿ›ก๏ธ
90 subscribers
6.65K photos
579 videos
510 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from It's FOSS
This media is not supported in your browser
VIEW IN TELEGRAM
Boost your terminal productivity with Dooit! ๐Ÿš€

๐Ÿ’ป Interactive, beautiful UI.
๐ŸŽจ Fully customizable: color, layout, and more.
๐Ÿ Python-configurable for full control.
๐Ÿ•น๏ธ Vim-like keybindings for power users.
๐ŸŒณ Topic-based, branching to-do lists.

Project link โžก๏ธ github.com/dooit-org/dooit
Forwarded from It's FOSS
I wonder who will win. ๐ŸฅŠ ๐Ÿค–
Forwarded from ๐— ๐—˜๐—ข๐—ช ๐——๐—จ๐— ๐—ฃ (๐— ๐—˜๐—ข๐—ช๐—ป๐—ฎ ๐Ÿ’…)
Rooting and Security: Busting the Myth

Thereโ€™s a common myth floating around that rooting your Android device automatically makes it insecure. This is simply not true. Rooting doesnโ€™t magically give others access to your device; itโ€™s only you, the device owner, who has control. When done right, rooting can even enhance security. ๐ŸŽญ๐ŸŽญ๐Ÿซšโญ๐Ÿซš
Hereโ€™s why:
Root Permissions:

When you root your device, youโ€™re essentially unlocking a level of control over the system. This means you can deny or grant specific apps permissions to access deeper system files. You manage what apps can or canโ€™t do, which provides more control over what runs on your phone.
SELinux Support:

You can root your device while keeping SELinux (Security-Enhanced Linux) enforcement on, which is a security feature designed to prevent unauthorized access.
Attestation & Integrity:

Using (cRom) inbuilt PIF / module & some close source modues like shamiko, zygisk next & trickystore modules allows your device to pass Googleโ€™s SafetyNet (the security feature designed to detect root) & PI. you can use apps like Netflix or Payment apps, which normally refuse to work compromised devices.
Improved Privacy:

Rooting can also let you take control of your privacy. For example, you can block intrusive ads, nuke bloatwares, limit what information apps can access, or even block trackers that collect data on your behavior. The list goes on & on....

In short, if you know what you're doing, rooting your device doesn't necessarily weaken its security and can be just as secure, if not more, than a stock device. Itโ€™s all about how you manage root access and use the proper tools.

However, while this optimistic view is valid for users who take care, it's also essential to recognize some downsides (like potential risks, voided warranties, or the possibility of bricking your device) that come with rooting, as discussed earlier. Rooting doesn't automatically make your device less secure, but it does open up more potential for misuse, so itโ€™s important to have a solid understanding

๐— ๐—˜๐—ข๐—ช ๐——๐—จ๐— ๐—ฃ
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from [๐•ฎ๐–๐–Š๐–’๐–Ž๐–“๐–†๐–‘] ๐•ฒ๐–—๐–Š๐–Š๐–“๐•ธ๐–ž๐–˜๐–™๐–Ž๐–ˆ
Forwarded from The Hacker News
๐Ÿšจ Warning to Developers: Malicious Solana-related npm and PyPI packages are designed to steal #Solana private keys, drain wallets, and even delete your files.

Learn more: https://thehackernews.com/2025/01/hackers-deploy-malicious-npm-packages.html
Forwarded from The Hacker News
๐Ÿ” Data Securityโ€”Not Just About Visibility, But About CONTROL!

Satori secures ALL dataโ€”not just analytical. From production data to AI models, every data type is covered.

๐Ÿ’ก Key Benefits:
โคท Continuous discovery and classification of data across your organization
โคท Automated security policies that adapt to new data and users
โคท Instant alerts for misconfigurations or risky access

๐Ÿ‘‰ Discover how Satori can automate and secure your data: https://thehackernews.com/2025/01/product-walkthrough-how-satori.html
Forwarded from The Hacker News
๐ŸŒ This week in cybersecurity: From nation-state attacks to cutting-edge malware, insider threats, and groundbreaking policies, the digital landscape is shifting fast.

Get the insights you need to stay secure and ahead of the curve.

Read: https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_20.html
Forwarded from The Hacker News
๐Ÿšจ Urgent: Notorious DoNot Team (APT-C-35) is behind a new Android malware campaign using a fake chat app, Tanzeem, to steal sensitive information.

๐Ÿ“ฑ Malware functionality: The app steals contacts, call logs, SMS, location, and more.
โšก New tactic: Push notifications deliver additional malware, ensuring persistence on the device.

๐Ÿ‘‰ Explore how this attack works: https://thehackernews.com/2025/01/donot-team-linked-to-new-tanzeem.html
Forwarded from The Hacker News
๐Ÿ”ด Multiple tunneling protocols, including GRE and IP6IP6, have vulnerabilities that could expose 4.2 million hosts to cyberattacks.

โš ๏ธ What attackers can do:
โคท Hijack your network
โคท Launch anonymous DoS/DDoS attacks
โคท Bypass security filters using trusted IPs

Find out more: https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html