Forwarded from Privacy & Security Goys
As federal employees, Elon is really focused on cutting funding to our department. Not only do I have to figure out what I can say I've accomplished over the past week, but they've taken down our primary channel too (I bet you didn't know "ban waves" are really just FBI budget cuts). They seem to have missed this one for now. Typical government incompetency.
Durov has made it clear that we aren't welcome. Those who take personal and operational security seriously should not use Telegram to communicate. We knew our time here was finite, and so we tried alternatives like SimpleX. It didn't take long for the tens of thousands of you fine dissidents to break the app; in fact, I still can't open SimpleX without it crashing. For small groups, it's fine, but for a big community like ours, syncing messages between every observer in the chat becomes taxing on your device.
That said, it is still the best censorship-proof option we have, so if you haven't joined our chat and channel, you may wish to do so. [If these links don't work for you, copy and paste the addresses into SimpleX to open them, don't mindlessly tap on the links here like a retard and wonder why you can't connect. Thank you.]
Some mods have offered to run a third iteration of the channel here, where they have agreed to self-police and only post news and FCC-compliant content. We've toyed with the idea of a Dread clone on TOR, or something Iron March-adjacent. Maybe we will. What I don't think is appropriate is to keep buying e-SIMs to churn out Telegram accounts/channels, which in turn, get blacklisted for posting "illegal content."
Of course, Telegram never specifies what the illegal content was. If it wasn't about calling Hasidic-Americans schizophrenic, it could have been because the Biden administration designated the so-called "Terrorgram Collective" as terrorists, but to that I say, "how can it be a hate crime when we loved doing it?" We've been good goys and hardly ever fedpost anymore! 😇
If this is the end, it's been a hell of a run. We've been here for six years(!) We identified a niche that was sorely unaddressed for /our guys/, and contributed what we could. I'd like to think that we helped some of you avoid the pinch of Johnny Law. The number one rule is "don't get caught," and I think it's time we take our own advice.And to be frank, we don't think our Top Secret security clearance is worth jeopardizing for the .46 TON we didn't get a chance to claim on the other channel.
Thanks to all of the cool cats who shared our content through the years. And a personal shout out to our tireless mods and jannies, who, just like us, did it for free.
Durov has made it clear that we aren't welcome. Those who take personal and operational security seriously should not use Telegram to communicate. We knew our time here was finite, and so we tried alternatives like SimpleX. It didn't take long for the tens of thousands of you fine dissidents to break the app; in fact, I still can't open SimpleX without it crashing. For small groups, it's fine, but for a big community like ours, syncing messages between every observer in the chat becomes taxing on your device.
That said, it is still the best censorship-proof option we have, so if you haven't joined our chat and channel, you may wish to do so. [If these links don't work for you, copy and paste the addresses into SimpleX to open them, don't mindlessly tap on the links here like a retard and wonder why you can't connect. Thank you.]
Some mods have offered to run a third iteration of the channel here, where they have agreed to self-police and only post news and FCC-compliant content. We've toyed with the idea of a Dread clone on TOR, or something Iron March-adjacent. Maybe we will. What I don't think is appropriate is to keep buying e-SIMs to churn out Telegram accounts/channels, which in turn, get blacklisted for posting "illegal content."
Of course, Telegram never specifies what the illegal content was. If it wasn't about calling Hasidic-Americans schizophrenic, it could have been because the Biden administration designated the so-called "Terrorgram Collective" as terrorists, but to that I say, "how can it be a hate crime when we loved doing it?" We've been good goys and hardly ever fedpost anymore! 😇
If this is the end, it's been a hell of a run. We've been here for six years(!) We identified a niche that was sorely unaddressed for /our guys/, and contributed what we could. I'd like to think that we helped some of you avoid the pinch of Johnny Law. The number one rule is "don't get caught," and I think it's time we take our own advice.
Thanks to all of the cool cats who shared our content through the years. And a personal shout out to our tireless mods and jannies, who, just like us, did it for free.
Forwarded from NoGoolag
➡️ Remove your credentials from breached data providers:
➡️ Agency International
Channel: https://t.me/+POdMf0guHLw4MTA0
Chat: https://t.me/+56gWedkBo-05ZDg8
➡️ Have I Been Pwned
• Conduct a search of your email address or username at https://haveibeenpwned.com/OptOut.
• Click the link in the email confirmation.
• Choose the "Remove email address completely" option.
➡️ Dehashed
• Create a free burner account at https://dehashed.com.
• Conduct a search of your email address or username.
• Click "Request entry removal" link below each result.
• Click the confirmation link within each email.
➡️ Leakcheck
• Register for a free burner account at https://leakcheck.net.
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to removal@leakcheck.net.
• Click the link within the confirmation email.
➡️ PSBDMP
• Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
• Search your email address at the first "PSBDMP" option.
• If any results are present, send an email to admin@psbdmp.ws requesting removal.
➡️ IntelX
• Conduct a search of your email address at https://intelx.io.
• Navigate to https://intelx.io/abuse.
• Paste any URLs associated with the found content "Full Data" links.
• Submit request.
➡️ HudsonRock
• Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
• Search your email address at the first "HudsonRock" option.
• If any results are present, send an email to hello@hudsonrock.com requesting removal. If that fails, use the contact page at https://www.hudsonrock.com/contact.
➡️ Leak-Lookup
• Register for a free burner account at https://leak-lookup.com.
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to info@leak-lookup.com.
➡️ HackCheck
• Register for a free burner account at https://hackcheck.io.
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to support@hackcheck.io.
➡️ Breach Directory
• Navigate to https://breachdirectory.org.
• Search your email address.
• If any results are present, begin the removal process at https://breachdirectory.org/deletemydata.
➡️ LeakPeek
• Navigate to https://leakpeek.com.
• Search your email address.
• If any results are present, send an email to support@LeakPeek.com requesting removal.
➡️ Agency International
Channel: https://t.me/+POdMf0guHLw4MTA0
Chat: https://t.me/+56gWedkBo-05ZDg8
Telegram
Agency International
Channel: https://t.me/+POdMf0guHLw4MTA0
Chat: https://t.me/+amK5sn4x6osxOTYy
Chat: https://t.me/+amK5sn4x6osxOTYy
Forwarded from NoGoolag
workbook.pdf
677.4 KB
Use the IntelTechniques.com Work Book to opt out of reverse searches and data collection sites.
⚠️ DO NOT HIRE DATA REMOVAL COMPANIES — They are not thorough. Remove the data yourself, be sure of the work you do. Check back every 6 months - 1 year to ensure nothing has changed.
➡️ The "MOST BANG FOR YOUR BUCK" removals:
• Spokeo
• Mylife
• Radaris
• Whitepages
• Intelius
• BeenVerified
• Acxiom
• Infotracer
• Lexis Nexis
• TruePeopleSearch
⚠️ DO NOT HIRE DATA REMOVAL COMPANIES — They are not thorough. Remove the data yourself, be sure of the work you do. Check back every 6 months - 1 year to ensure nothing has changed.
➡️ The "MOST BANG FOR YOUR BUCK" removals:
• Spokeo
• Mylife
• Radaris
• Whitepages
• Intelius
• BeenVerified
• Acxiom
• Infotracer
• Lexis Nexis
• TruePeopleSearch
Forwarded from NoGoolag
Jolla Releases Sailfish OS 5.0 With WireGuard VPN, Updated Android Compatibility - Phoronix
https://www.phoronix.com/news/Jolla-Sailfish-OS-5.0
https://www.phoronix.com/news/Jolla-Sailfish-OS-5.0
Phoronix
Jolla Releases Sailfish OS 5.0 With WireGuard VPN, Updated Android Compatibility
For those intrigued by Jolla's Linux-based Sailfish OS mobile phone operating system, Sailfish OS 5.0 is officially out today as the latest iteration of this software stack.
Forwarded from NoGoolag
Deep dive into the #Signal arbitrary deletion #vulnerability I discovered in Signal Desktop:
In Signal Desktop, attachments are stored in a designated folder (typically “attachments.noindex”). The deletion logic resolves this folder’s absolute path using fs.realpathSync, which inherently follows symbolic links.
https://nitter.poast.org/jipisback/status/1894682205500088793
https://x.com/jipisback/status/1894682205500088793
https://fixupx.com/jipisback/status/1894682205500088793
In Signal Desktop, attachments are stored in a designated folder (typically “attachments.noindex”). The deletion logic resolves this folder’s absolute path using fs.realpathSync, which inherently follows symbolic links.
https://nitter.poast.org/jipisback/status/1894682205500088793
https://x.com/jipisback/status/1894682205500088793
https://fixupx.com/jipisback/status/1894682205500088793
Forwarded from Gizchina.com
Oppo Pad 4 Pro Will Launch with Snapdragon 8 Elite in April
https://www.gizchina.com/2025/02/28/oppo-pad-4-pro-will-launch-with-snapdragon-8-elite-in-april/
https://www.gizchina.com/2025/02/28/oppo-pad-4-pro-will-launch-with-snapdragon-8-elite-in-april/
Forwarded from The Hacker News
A Serbian activist’s Android phone was unlocked using a zero-day exploit developed by Cellebrite.
This attack leveraged a vulnerability in Android USB drivers, enabling attackers to bypass lock screens.
Read the full article to uncover how this exploit was used: https://thehackernews.com/2025/02/amnesty-finds-cellebrites-zero-day.html
This attack leveraged a vulnerability in Android USB drivers, enabling attackers to bypass lock screens.
Read the full article to uncover how this exploit was used: https://thehackernews.com/2025/02/amnesty-finds-cellebrites-zero-day.html
Forwarded from 𝙎𝘿𝙒 | 𝘚𝘶𝘱𝘦𝘳𝘋𝘳𝘰𝘪𝘥 𝘞𝘰𝘳𝘭𝘥📱🧑💻 | (Ported Android Apps).
✨ Blur + Zoom Effect – Bring Smooth Transitions to Your Android!🔥
📱 This app enables a stylish Blur & Zoom effect on your wallpaper when closing apps, just like premium UI animations! Now experience smoother transitions on any device.
🔹 Original App by: Remember Studios
🔹 Translation by: SDW
📥 Download Now: From Here
👀 Preview : Watch here
📢 Stay Updated:
📍 🚀 @SuperDroidWorld
💬 Join the Discussion:
📍 💬 @SuperDroidChats
📱 This app enables a stylish Blur & Zoom effect on your wallpaper when closing apps, just like premium UI animations! Now experience smoother transitions on any device.
🔹 Original App by: Remember Studios
🔹 Translation by: SDW
📥 Download Now: From Here
👀 Preview : Watch here
📝 Note: This app was originally made in Chinese, and while I translated most of it, some text couldn’t be translated. Hope you still enjoy it! 😅🎭
📢 Stay Updated:
📍 🚀 @SuperDroidWorld
💬 Join the Discussion:
📍 💬 @SuperDroidChats
Forwarded from Bones' Tech Garage
https://www.omgubuntu.co.uk/2025/02/mozilla-introducing-terms-of-use-to-firefox
https://www.mozilla.org/en-US/about/legal/terms/firefox/
https://www.mozilla.org/en-US/about/legal/terms/firefox/
OMG! Ubuntu
Updated: Mozilla is Introducing ‘Terms of Use’ to Firefox
Hot off the back of its recent leadership rejig, Mozilla has announced users of Firefox will soon be subject to a 'Terms of Use' policy — a first for the
Forwarded from #TBOT: Take Back Our Tech
👊 Firefox Deletes Promise To Not Sell Personal Data
@takebackourtech
Firefox removed the following section from their FAQ:
The updated version:
What do you think? Do you trust them?
You can learn about the web browsers I recommend in my latest webinar.
ORIGINAL ARTICLE
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
@takebackourtech
Firefox removed the following section from their FAQ:
Does Firefox sell your personal data?
Nope. Never have, never will. And we protect you from many of the advertisers who do. Firefox products are designed to protect your privacy. That's a promise.
The updated version:
Mozilla doesn't sell data about you (in the way that most people think about "selling data"), and we don't buy data about you. Since we strive for transparency, and the LEGAL definition of "sale of data" is extremely broad in some places, we've had to step back from making the definitive statements you know and love. We still put a lot of work into making sure that the data that we share with our partners (which we need to do to make Firefox commercially viable) is stripped of any identifying information, or shared only in the aggregate, or is put through our privacy preserving technologies (like OHTTP).
What do you think? Do you trust them?
You can learn about the web browsers I recommend in my latest webinar.
ORIGINAL ARTICLE
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
Telegram
#TBOT: Take Back Our Tech
Let's use technology that doesn't use us.
Official Blog:
https://takebackourtech.org
TBOT Show:
https://tbot.substack.com
Official Blog:
https://takebackourtech.org
TBOT Show:
https://tbot.substack.com
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Forwarded from The Hacker News
Mozilla updates Firefox’s Terms of Use after user concerns over data rights.
The new revisions clarify that Mozilla doesn’t own your data—but the language change follows a wave of community criticism.
Read the full breakdown here: https://thehackernews.com/2025/03/mozilla-updates-firefox-terms-again.html
The new revisions clarify that Mozilla doesn’t own your data—but the language change follows a wave of community criticism.
Read the full breakdown here: https://thehackernews.com/2025/03/mozilla-updates-firefox-terms-again.html
Forwarded from NoGoolag
Microsoft is finally shutting down Skype in May
https://www.xda-developers.com/microsoft-killing-skype/
https://www.xda-developers.com/microsoft-killing-skype/
XDA
Microsoft is finally shutting down Skype in May [Update]
Feel free to use Teams
Forwarded from NoGoolag
‘You Can’t Hide’: #Elon #Musk & #SpaceX Are Helping US Intelligence Build the World’s Largest Spy Satellite Network
Why are so many freedom loving, privacy aware people using a military contractor’s satellite service, and turning a blind eye to the surveillance grid he is co-creating with the U.S. military and intelligence?
https://www.thelastamericanvagabond.com/musk-space-x-satellite-network/
Why are so many freedom loving, privacy aware people using a military contractor’s satellite service, and turning a blind eye to the surveillance grid he is co-creating with the U.S. military and intelligence?
https://www.thelastamericanvagabond.com/musk-space-x-satellite-network/
The Last American Vagabond
'You Can't Hide': Elon Musk & SpaceX Are Helping US Intelligence Build the World's Largest Spy Satellite Network
Why are so many freedom loving, privacy aware people using a military contractors satellite service, and turning a blind eye to the surveillance grid he is co-creating with the U.S. military and intelligence?
Forwarded from Pegasus NSO & other spyware
"Haunted by Legacy: Discovering and Exploiting Vulnerable #Tunnelling Hosts", 2025.
#Hosts #Vulnerability
This paper is the first to systematically analyse the securityof tunnelling hosts on the IPv4 and IPv6 Internet. Our large-scale Internet-wide scans identified over 4 million hosts that
accept unencrypted tunnelling packets from any source.
This is concerning because vulnerable hosts can be abused asone-way proxies, and many of these hosts also allow an ad-versary to spoof a packet’s source address, enabling variouskinds of known and novel attacks.
Moreover, we also demon-strated that these vulnerable hosts enable novel DoS attacks,such as our TuTL and Ping-Pong attacks. The TuTL attack
is especially concerning since it can be abused to perform DoS attacks against any third-party host on the Internet.
Our measurements also show that many Autonomous Systems,more than four thousand in total, do not (properly) imple-ment source address filtering, thereby allowing the spoofing
of source IP addresses.#Hosts #Vulnerability
Forwarded from Pegasus NSO & other spyware
tunnels.pdf
1.6 MB
Forwarded from NoGoolag
This media is not supported in your browser
VIEW IN TELEGRAM
📱 Scam by Apple as it created a plain-text protocol and said it protects user privacy.
Forwarded from Pegasus NSO & other spyware
The nature of SORM as a surveillance system built directly into telecommunications and internet infrastructure facilitates potential interception of a vast range of data and significantly reduces visibility into digital surveillance operations, almost certainly raising the risk of abuse for countries that have
historically conducted intrusive domestic surveillance with limited oversight.
As SORM provider VAS Experts notes, “the person who is being monitored cannot in any way determine that this is happening, just as the [service] provider does not know who the special service is following”.
In this, identifying deployments of SORM becomes more difficult compared to commercial off-the-shelf spyware tools,
such as Predator, which can be identified and traced via changes in infrastructure.#SORM
Forwarded from Pegasus NSO & other spyware
SORM ta-ru-2025-0107.pdf
2.2 MB
Forwarded from NoGoolag
Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025
https://www.bleepingcomputer.com/news/security/hackers-exploit-16-zero-days-on-first-day-of-pwn2own-automotive-2025/
https://www.bleepingcomputer.com/news/security/hackers-exploit-16-zero-days-on-first-day-of-pwn2own-automotive-2025/
BleepingComputer
Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025
On the first day of Pwn2Own Automotive 2025, security researchers exploited 16 unique zero-days and collected $382,750 in cash awards.