Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
579 videos
510 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from NoGoolag
DisableGoogleAnalytics

https://gitlab.com/adrian.m.miller/disablegoogleanalytics

Attempts To Disable Common Google Analytics And Ads Receivers In All Affected Packages

What it does/How it works:
On 1st run after rebooting after install the module is assuming you want it to disable the listed analytics and ad receivers, so it will:
Wait till boot is completed
Then sleep for 2 minutes
Then test that cpu usage is under 30% before running
It will then disable the analytics and ad receivers as listed below, and log its progress to /sdcard/fixgoogleanalytics.log

Common Analytics And Ad Recievers:
com.google.android.gms.analytics.AnalyticsJobService com.google.android.gms.analytics.CampaignTrackingService com.google.android.gms.measurement.AppMeasurementService com.google.android.gms.measurement.AppMeasurementJobService com.google.android.gms.analytics.AnalyticsReceiver com.google.android.gms.analytics.CampaignTrackingReceiver com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver com.google.android.gms.measurement.AppMeasurementReceiver com.google.android.gms.measurement.AppMeasurementContentProvider com.crashlytics.android.CrashlyticsInitProvider com.google.android.gms.ads.AdActivity com.google.firebase.iid.FirebaseInstanceIdService

Once complete the service.sh script will delete itself
Once that happens any further interaction is purely via the included dga script as a binary in /system/(x)bin

dga takes 2 arguments, disable or enable, though i doubt too many will be looking to enable analytics and ad receivers, unless the disabling has unwanted effects on their system, which is high time to include the usual disclaimer that you run this at your own risk and not even dga enable is garaunteed to undo the changes

Module Installation:
Download from Releases
Install the module via #Magisk app/Fox Magisk Module Manager/MRepo
Reboot

Usage:

After first run optmization has completed, any further interaction is purely via the included dga script as a binary
in /system/(x)bin:

dga takes 2 arguments, disable or enable, though i doubt too many will be looking to enable
analytics and ad receivers, unless the disabling has unwanted effects on their system, which
is high time to include the usual disclaimer that you run this at your own risk and not even
dga enable is garaunteed to undo the changes
Uninstall Note: Uninstalling the module will not reverse the changes, if your intention is to uninstall the module and re-enable the
analytics and ad receivers, please run dga enable first
Forwarded from NoGoolag
Tiling Shell
Advanced Window Management for #Linux #gnome desktops

https://extensions.gnome.org/extension/7065/tiling-shell

A GNOME extension for advanced window management. It's highly configurable and offers different ways of tiling and managing your windows. The focus is on delivering the best user experience, highest stability, and full customization.

It also works with multiple monitors (even if they use different scaling), comes with a number of tiling layouts built-in but there is a layout editor to allow you to create and save customs layouts.

Tiling Shell also features the Snap Assistant, borrowed from Windows 11: just move a window to the top with your mouse and the Snap Assistant slides in and you can place the window where you want and how you want.

* Automatic tiling
* Fully customizable keyboard shortcuts to tile, move windows, change focus and more
* You can also move the window to the edge of the screen to tile it
* Right click on the window title to place the window where you want and how you want it
* Coming soon this week, Windows Suggestions: after tiling a window you get suggestions for other windows to fill the remaining tiles
...
There are other features https://github.com/domferr/tilingshell

Tiling Shell supports GNOME Shell 40 to 47 on X11 and Wayland.
🔗 PSU Comparison Tool (Sabung PSU)

ℹ️ PSU Comparison Tool A.K.A Sabung PSU is a web-based tool designed to compare power supply units (PSUs) based on efficiency, power factor, certification, and other metrics. It provides detailed data sourced from CLEAResult certifications, helping users make informed decisions by evaluating models side by side. The tool highlights key differences and advantages between PSUs, making it valuable for enthusiasts seeking reliable and efficient components for their computer systems.

🔗 Tool / Webpage:
https://ayra.eu.org/project/sabungpsu
Media is too big
VIEW IN TELEGRAM
Google Pixel 9 - A Long Term User Review

https://tg.sneed.cc/share/downloaded/youtu_be_a8Xr1hB5SBA.mp4

Anyone try it with GrapheneOS? Seems like it would be better on GOS. But too expensive. Hopefully prices drop like a rock, check Swappa if your in the US.
Forwarded from The Great Imperial Interdimensional Multiversal Holy DAO of NoGoolag (NoGoolag)
Are VPNs even safe now Hacker Explains
Duration : 30:20
A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by Russian hackers as a zero-day since September 2024.

According to Trend Micro researchers, the flaw was used in SmokeLoader malware campaigns targeting the Ukrainian government and private organizations in the country.

The Mark of the Web is a Windows security feature designed to warn users that the file they're about to execute comes from untrusted sources, requesting a confirmation step via an additional prompt. Bypassing MoTW allows malicious files to run on the victim's machine without a warning.

When downloading documents and executables from the web or received as an email attachment, Windows adds a special 'Zone.Id' alternate data stream called the Mark-of-the-Web (MoTW) to the file.

When attempting to open a downloaded file, Windows will check if a MoTW exists and, if so, display additional warnings to the user, asking if they are sure they wish to run the file. Similarly, when opening a document in Word or Excel with a MoTW flag, Microsoft Office will generate additional warnings and turn off macros.

MoTW warnings in Windows
Source: BleepingComputer
As the Mark of the Web security features prevent dangerous files from automatically running, threat actors commonly attempt to find MoTW bypasses so their files automatically run and execute.

For years, cybersecurity researchers requested 7-Zip add support for the Mark of the Web, but it was only in 2022 that support for the feature was finally added.....

https://www.bleepingcomputer.com/news/security/7-zip-motw-bypass-exploited-in-zero-day-attacks-against-ukraine/
Used a PDF in a private group to lure people into...

Tehran, IRNA - An official with Meta Platforms' (META.O) said the Israeli spyware company Paragon Solutions has hacked the popular WhatsApp targeting scores of its users, including journalists and members of civil society.

The official said on Friday "WhatsApp had sent Paragon a cease-and-desist letter following the hack," the official told Reuters on Friday.
In a statement, WhatsApp said the company "will continue to protect people's ability to communicate privately".

The WhatsApp official further told Reuters it had detected an effort to hack approximately 90 users.

The official declined to say who, specifically, was targeted, but he said those targeted were based in more than two dozen countries, including several people in Europe.

He said WhatsApp users were sent malicious electronic documents that required no user interaction to compromise their targets, a so-called zero-click hack that is considered particularly stealthy.

https://en.irna.ir/news/85735967/WhatsApp-hacked-by-Israel-s-spyware-company-Paragon-Meta-says
Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data

Gravy Analytics has been one of the most important companies in the location data industry for years, collating smartphone location data from around the world selling some to the U.S. government. Hackers say they stole a mountain of data.

Hackers claim to have compromised Gravy Analytics, the parent company of Venntel which has sold masses of smartphone location data to the U.S. government.  The hackers said they have stolen a massive amount of data, including customer lists, information on the broader industry, and even location data harvested from smartphones which show peoples’ precise movements, and they are threatening to publish the data publicly.

The news is a crystalizing moment for the location data industry. For years, companies have harvested location information from smartphones, either through ordinary apps or the advertising ecosystem, and then built products based on that data or sold it to others.

In many cases, those customers include the U.S. government, with arms of the military, DHS, the IRS, and FBI using it for various purposes. But collecting that data presents an attractive target to hackers....

https://www.404media.co/hackers-claim-massive-breach-of-location-data-giant-threaten-to-leak-data/

https://www.wired.com/story/gravy-location-data-app-leak-rtb/
Forwarded from NoGoolag
Net Switch: Isolate Apps from Internet Access

Net Switch is a Magisk module to isolate apps from accessing the internet on your Android device. This tool gives you complete control over which apps can send or receive data, improving security, privacy, and saving bandwidth.
Fully standalone, Operates fully on iptables.

More info :https://github.com/Rem01Gaming/net-switch

#magisk #firewall #privacy #afwallalterernative
Cloudflare Is Blocking Pale Moon and other non-mainstream browsers (🔥 Score: 159+ in 2 hours)

Link: https://readhacker.news/c/6nAUW

Hello.
Cloudflare's Browser Intergrity Check/Verification/Challenge feature used by many websites, is denying access to users of non-mainstream browsers like Pale Moon.
Users reports began on January 31:
https://forum.palemoon.org/viewtopic.php?f=3&t=32045
This situation occurs at least once a year, and there is no easy way to contact Cloudflare. Their "Submit feedback" tool yields no results. A Cloudflare Community topic was flagged as "spam" by members of that community and was promptly locked with no real solution, and no official response from Cloudflare:
https://community.cloudflare.com/t/access-denied-to-pale-moon-desktop-browser/764330
Partial list of other browsers that are being denied access:
Falkon, SeaMonkey, IceCat, Basilisk.
Hacker News 2022 post about the same issue, which brought attention and had Cloudflare quickly patching the issue:
https://news.ycombinator.com/item?id=31317886
A Cloudflare product manager declared back then: "...we do not want to be in the business of saying one browser is more legitimate than another."
As of now, there is no official response from Cloudflare. Internet access is still denied by their tool.