Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
577 videos
497 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from NoGoolag
Evil Crow RF: A Portable Radio Frequency Device | Mobile Hacker

As mobile hackers, we often find that our smartphones, while powerful in many ways, lack the essential radio frequency (RF) features needed for wireless security testing. These limitations can be frustrating when trying to explore wireless signals directly from our mobile devices. However, with the Evil Crow RF V2, these limitations can be easily overcome. This tool expands your smartphone’s capabilities, allowing you to dive into RF analysis, penetration testing, and signal manipulation—bringing mobile hacking to a whole new level.

The #EvilCrow RF V2 allows users to perform a variety of tasks and attacks, including:

Receive signal
Transmit signal
Replay attacks
Bruteforce
Jamming
Scanner
Mousejacking
Rolljam attack
Rollback attack
Kaiju analyzer (online rolling code analyzer and generator)

#RF #Mobile #Hacking
Forwarded from NoGoolag
Krita

Free and open source digital painting application. It is for artists who want to create professional work from start to end. Krita is used by comic book artists, illustrators, concept artists, matte and texture painters and in the digital VFX industry.

https://krita.org

https://invent.kde.org/graphics/krita

Download
https://cdn.kde.org/ci-builds/graphics/krita/

#AI plugin
https://kritaaidiffusion.com

#image #editor #paint
Forwarded from NoGoolag
🇺🇸🇨🇳 Chinese GPUs outdo Nvidia chips nearly tenfold in supercomputer simulation

“In search of a breakthrough, Professor Nan Tongchao with the State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering at Hohai University in Nanjing, began exploring a “multi-node, multi-GPU” parallel computing approach based on domestic CPUs and GPUs.

The results of their research were published in the Chinese Journal of Hydraulic Engineering”


➡️ Join us! | @MyLordBebo
Forwarded from NoGoolag
kitty

The fast, feature-rich, GPU based #terminal emulator

Uses GPU and SIMD vector CPU instructions for best in class
Uses threaded rendering for absolutely minimal latency
Performance tradeoffs can be tuned
Capable Scriptable Composable Cross-platform Innovative
To get started see Quickstart.

https://sw.kovidgoyal.net/kitty/
Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts.

The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app's legitimate 'linked devices' feature that enables Signal to be used on multiple devices concurrently," the Google Threat Intelligence Group (GTIG) said in a report.

In the attacks spotted by the tech giant's threat intelligence teams, the threat actors, including one it's tracking as UNC5792, have resorted to malicious QR codes that, when scanned, will link a victim's account to an actor-controlled Signal instance
.

Once compromised, threat actors gain real-time access to victim messages, enabling persistent surveillance.

#Signal #QRCode
Ransacked - Cellular Security | Florida Institute for Cybersecurity Research –

We discover 119 vulnerabilities in LTE/5G core infrastructure, each of which can result in persistent denial of cell service to an entire metropolitan area or city and some of which can be used to remotely compromise and access the cellular core. Our research covers seven LTE implementations (Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC, srsRAN) and three 5G implementations (Open5GS, Magma, OpenAirInterface); we find vulnerabilities in every single LTE/5G implementation tested.

Our research finds these vulnerabilities are present in both well-maintained open-source LTE/5G cores and in proprietary software, both of which have active deployments in commercial settings
.

#Cellular #LTE #5G #Vulnerabilities
Forwarded from NoGoolag
Media is too big
VIEW IN TELEGRAM
https://youtu.be/gSW3YJ8uyBI

Modular alternative. (s6 supervision suite)

--- In summary, the speaker presents sixos, a nixpkgs-based OS that replaces systemd with s6, instituting a more modular approach to service management while addressing concerns about systemd's complexity and control dynamics. The project aims for a user-centric design, maintaining features from NixOS while functioning independently.
Forwarded from Big Brother Watch
🚨BREAKING🚨

Apple is removing its most robust data protection tool from UK users.

This decision by Apple is the regrettable consequence of the Home Office’s outrageous order attempting to force Apple to breach encryption. As a result, from today Apple’s UK customers are less safe and secure than they were yesterday – and this will quickly prove to have much wider implications for internet users in the UK.

No matter how this is framed, there is simply no such thing as a “back door” that can be limited only to criminals or that can be kept safe from hackers or foreign adversaries. Once encryption is broken for anyone, it’s broken for everyone, and as we have cautioned: this will not stop with Apple.

We once again call on the Home Office to immediately rescind this draconian order and cease attempts to break encryption before the privacy rights of millions are eroded and the UK further ostracises itself from other democracies around the world.

Subscribe | @BigBrotherWatchHQ