Forwarded from Hacker News
Amazon
Migrating from AWS App Mesh to Amazon ECS Service Connect | Amazon Web Services
After careful consideration, we have made the decision to discontinue AWS App Mesh, effective September 30th, 2026. Until this date, existing AWS App Mesh customers will be able to use the service as normal, including creating new resources and onboarding…
Forwarded from Hacker News
Krebs on Security
MasterCard DNS Error Went Unnoticed for Years
The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration persisted for…
Forwarded from Hacker News
GitHub
GitHub - slu4coder/Minimal-64x4-Home-Computer: My DIY home computer with VGA and PS/2 and 4x(!) the processing power of a Commodore…
My DIY home computer with VGA and PS/2 and 4x(!) the processing power of a Commodore C64 or Apple II. - slu4coder/Minimal-64x4-Home-Computer
Forwarded from Hacker News
IEEE Spectrum
A Spy Satellite You’ve Never Heard of Helped Win the Cold War
Engineers at the Naval Research Lab launched a spy satellite program called Parcae and revolutionized signals intelligence at the height of the Cold War. The program relied on computers to sift through intelligence data, providing a technological edge at…
Forwarded from Hacker News
f-droid.org
A Look Back at 2024: F-Droid's Progress and What’s Coming in 2025 | F-Droid - Free and Open Source Android App Repository
With 2024 now behind us, we wanted to take a moment to reflect on the growth and achievements we accomplished as a community last year, and celebrate the inc...
Forwarded from Hacker News
GitHub
GitHub - rany2/edge-tts: Use Microsoft Edge's online text-to-speech service from Python WITHOUT needing Microsoft Edge or Windows…
Use Microsoft Edge's online text-to-speech service from Python WITHOUT needing Microsoft Edge or Windows or an API key - rany2/edge-tts
Forwarded from Hacker News
Bert Hubert's writings
Shifting Cyber Norms: Microsoft security POST-ing to you - Bert Hubert's writings
tl;dr: Microsoft and other email security scanners will visit the links in email you transmit, and run the JavaScript in those links, including calls that lead to POSTs going out. This used to be unacceptable, since POSTs have side effects. Yet here we are.…
Forwarded from Libreware
Warning for #Android gapps traitors:
Uninstall the application:
https://play.google.com/store/apps/details?id=com.google.android.safetycore
Be careful on GrapheneOS too if you have Google services installed.
While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.
https://grapheneos.org/releases
https://discuss.grapheneos.org/d/19193-android-system-safety-core
If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.
Locating the App
Go to Settings → Apps (or Apps & Notifications) → Show system apps. Look for “Android System SafetyCore.”
Check whether the app has any special permissions (e.g., internet access).
Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.
This is client side scanning. It's a way to spy on your device before it's encrypted.
Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/
Uninstall the application:
Android System SafetyCore, which has been automatically installed on most devices. It is used by Google to scan your data, just like Apple has been doing on iOS, but you have the choice to uninstall it. If you don't have it yet, watch out for it being installed silently over the next few days!https://play.google.com/store/apps/details?id=com.google.android.safetycore
Be careful on GrapheneOS too if you have Google services installed.
While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.
Sandboxed Google Play compatibility layer: stop Play Store from attempting to auto-install some system component packages, such as "Android System SafetyCore" (com.google.android.safetycore) and "Android System Key Verifier" (com.google.android.contactkeys)
https://grapheneos.org/releases
The phone is asking me to install this app, anyone knows information about if its truly need it or not? Im with the Google Play Services sandbox install
https://discuss.grapheneos.org/d/19193-android-system-safety-core
If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.
Locating the App
Go to Settings → Apps (or Apps & Notifications) → Show system apps. Look for “Android System SafetyCore.”
Check whether the app has any special permissions (e.g., internet access).
Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.
This is client side scanning. It's a way to spy on your device before it's encrypted.
Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/