Privacy + Secure Tech Corner Channel ๐Ÿ›ก๏ธ
90 subscribers
6.65K photos
579 videos
505 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Media is too big
VIEW IN TELEGRAM
https://tg.sneed.cc/share/downloaded/youtu_be_XkCUFp5EA0I.mp4

https://youtu.be/XkCUFp5EA0I

It's Time to Ditch VPNs
Stop paying for out-dated technology that was never intended to protect your privacy. Get peace of mind with SPN . Built from scratch and designed to truly protect your privacy from mass surveillance.

Safing.io
Forwarded from NoGoolag
Cherry Studio

Cherry Studio is a desktop client for Windows, Mac and Linux, which supports many LLM providers, including large cloud services and local models.

Among its main functions is the ability to work with more than 300 pre -designed #AI assistants, the creation of custom assistants, as well as support for various formats of documents, including text, images and office files.

The application offers tools for global search, top management and translating, which significantly improves interaction with the user thanks to the cross -platform and many settings options.

https://github.com/cherryhq/cherry-studio
Forwarded from The Cradle
An official from Meta's WhatsApp chat service has told Reuters that the company detected an attempt by Israeli spyware company Paragon Solutions to hack 90 users on its platform.

The official added that WhatsApp had sent Paragon a cease-and-desist letter following the hack.

The official said that the hack had targeted civil society and media figures, but declined to provide further information.
https://madaidans-insecurities.github.io/

Security & Privacy Evaluations
Below lies a list of analyses regarding security and privacy-focused topics. The security assessments make no attempt at evaluating security based on the number of former vulnerabilities in a particular program. Instead, criteria involve the software's overall security posture and ease of exploitation. Primarily, the assessments include an analysis of the software's attack surface exposure, as well as the adoption of modern defensive techniques. In particular, they study the deployed exploit mitigations and the extent to which different parts of the software are compartmentalised, as is necessary to reduce the potential harm a successful exploit could produce. Note that these analyses are purely objective and do not account for threat models or other user-dependent factors.

Likewise, the privacy evaluations are focused on meaningful approaches to achieving privacy, rather than incomplete and misguided approaches, as is common elsewhere. It is important to create a clear distinction between privacy and security to avoid conflating the subjects of any particular article.
Security
Android
Firefox and Chromium
Linux
Linux Phones
Privacy
Browser Tracking
Encrypted DNS
Messengers
VPNs
Guides
The articles below are guides dedicated to improving security and privacy.
Security and Privacy Advice
Linux Hardening Guide
About
My name is "madaidan". I'm a security researcher who works on various open source projects, mainly Whonix. My website provides information on security and privacy-related topics โ€” it aims to highlight security issues within popular technology, debunk misinformation and provide free security guidance for everyone.
Forwarded from NoGoolag
DisableGoogleAnalytics

https://gitlab.com/adrian.m.miller/disablegoogleanalytics

Attempts To Disable Common Google Analytics And Ads Receivers In All Affected Packages

What it does/How it works:
On 1st run after rebooting after install the module is assuming you want it to disable the listed analytics and ad receivers, so it will:
Wait till boot is completed
Then sleep for 2 minutes
Then test that cpu usage is under 30% before running
It will then disable the analytics and ad receivers as listed below, and log its progress to /sdcard/fixgoogleanalytics.log

Common Analytics And Ad Recievers:
com.google.android.gms.analytics.AnalyticsJobService com.google.android.gms.analytics.CampaignTrackingService com.google.android.gms.measurement.AppMeasurementService com.google.android.gms.measurement.AppMeasurementJobService com.google.android.gms.analytics.AnalyticsReceiver com.google.android.gms.analytics.CampaignTrackingReceiver com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver com.google.android.gms.measurement.AppMeasurementReceiver com.google.android.gms.measurement.AppMeasurementContentProvider com.crashlytics.android.CrashlyticsInitProvider com.google.android.gms.ads.AdActivity com.google.firebase.iid.FirebaseInstanceIdService

Once complete the service.sh script will delete itself
Once that happens any further interaction is purely via the included dga script as a binary in /system/(x)bin

dga takes 2 arguments, disable or enable, though i doubt too many will be looking to enable analytics and ad receivers, unless the disabling has unwanted effects on their system, which is high time to include the usual disclaimer that you run this at your own risk and not even dga enable is garaunteed to undo the changes

Module Installation:
Download from Releases
Install the module via #Magisk app/Fox Magisk Module Manager/MRepo
Reboot

Usage:

After first run optmization has completed, any further interaction is purely via the included dga script as a binary
in /system/(x)bin:

dga takes 2 arguments, disable or enable, though i doubt too many will be looking to enable
analytics and ad receivers, unless the disabling has unwanted effects on their system, which
is high time to include the usual disclaimer that you run this at your own risk and not even
dga enable is garaunteed to undo the changes
Uninstall Note: Uninstalling the module will not reverse the changes, if your intention is to uninstall the module and re-enable the
analytics and ad receivers, please run dga enable first
Forwarded from NoGoolag
Tiling Shell
Advanced Window Management for #Linux #gnome desktops

https://extensions.gnome.org/extension/7065/tiling-shell

A GNOME extension for advanced window management. It's highly configurable and offers different ways of tiling and managing your windows. The focus is on delivering the best user experience, highest stability, and full customization.

It also works with multiple monitors (even if they use different scaling), comes with a number of tiling layouts built-in but there is a layout editor to allow you to create and save customs layouts.

Tiling Shell also features the Snap Assistant, borrowed from Windows 11: just move a window to the top with your mouse and the Snap Assistant slides in and you can place the window where you want and how you want.

* Automatic tiling
* Fully customizable keyboard shortcuts to tile, move windows, change focus and more
* You can also move the window to the edge of the screen to tile it
* Right click on the window title to place the window where you want and how you want it
* Coming soon this week, Windows Suggestions: after tiling a window you get suggestions for other windows to fill the remaining tiles
...
There are other features https://github.com/domferr/tilingshell

Tiling Shell supports GNOME Shell 40 to 47 on X11 and Wayland.
๐Ÿ”— PSU Comparison Tool (Sabung PSU)

โ„น๏ธ PSU Comparison Tool A.K.A Sabung PSU is a web-based tool designed to compare power supply units (PSUs) based on efficiency, power factor, certification, and other metrics. It provides detailed data sourced from CLEAResult certifications, helping users make informed decisions by evaluating models side by side. The tool highlights key differences and advantages between PSUs, making it valuable for enthusiasts seeking reliable and efficient components for their computer systems.

๐Ÿ”— Tool / Webpage:
โ€ข https://ayra.eu.org/project/sabungpsu
Media is too big
VIEW IN TELEGRAM
Google Pixel 9 - A Long Term User Review

https://tg.sneed.cc/share/downloaded/youtu_be_a8Xr1hB5SBA.mp4

Anyone try it with GrapheneOS? Seems like it would be better on GOS. But too expensive. Hopefully prices drop like a rock, check Swappa if your in the US.
Forwarded from The Great Imperial Interdimensional Multiversal Holy DAO of NoGoolag (NoGoolag)
Are VPNs even safe now Hacker Explains
Duration : 30:20
A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by Russian hackers as a zero-day since September 2024.

According to Trend Micro researchers, the flaw was used in SmokeLoader malware campaigns targeting the Ukrainian government and private organizations in the country.

The Mark of the Web is a Windows security feature designed to warn users that the file they're about to execute comes from untrusted sources, requesting a confirmation step via an additional prompt. Bypassing MoTW allows malicious files to run on the victim's machine without a warning.

When downloading documents and executables from the web or received as an email attachment, Windows adds a special 'Zone.Id' alternate data stream called the Mark-of-the-Web (MoTW) to the file.

When attempting to open a downloaded file, Windows will check if a MoTW exists and, if so, display additional warnings to the user, asking if they are sure they wish to run the file. Similarly, when opening a document in Word or Excel with a MoTW flag, Microsoft Office will generate additional warnings and turn off macros.

MoTW warnings in Windows
Source: BleepingComputer
As the Mark of the Web security features prevent dangerous files from automatically running, threat actors commonly attempt to find MoTW bypasses so their files automatically run and execute.

For years, cybersecurity researchers requested 7-Zip add support for the Mark of the Web, but it was only in 2022 that support for the feature was finally added.....

https://www.bleepingcomputer.com/news/security/7-zip-motw-bypass-exploited-in-zero-day-attacks-against-ukraine/