https://github.com/Patch4Code/Logline
Logline is an open-source Android app that provides a seamless movie browsing experience with an emphasis on user privacy and transparency. The app offers core functionality to discover, organize, and rate movies while ensuring that user data remains under their control.
Downnload: https://f-droid.org/packages/com.patch4code.logline/
Logline is an open-source Android app that provides a seamless movie browsing experience with an emphasis on user privacy and transparency. The app offers core functionality to discover, organize, and rate movies while ensuring that user data remains under their control.
Downnload: https://f-droid.org/packages/com.patch4code.logline/
Forwarded from Pegasus NSO & other spyware
Israeli 'unicorn' co Dream Security raises $100m at $1.1b valuation
Company #DreamSecurity, which was founded by former spyware company #NSO Group CEO Shalev Hulio, former Austrian Chancellor, Sebastian Kurz, and Gil Dolev, has raised $100 million at a company valuation of $1.1 billion.The startup sells cyber protection systems to companies with complex or old physical infrastructures, such as gas rigs, electricity companies and nuclear reactors.The company is also popular with state cybersecurity systems, which strive to protect national infrastructures.
Before the current financing round, the company's valuation was $54 million, according to PitchBook.The current financing round was led by Bain Capital Ventures, the venture capital fund founded by former US presidential candidate Mitt Romney.
The company's existing investors, Dovi Frances's Group 11, Aleph Fund, through founding partner Michael Eisenberg, James Rothschild's Tru Arrow Fund and Tau Capital, are also participating in the financing round."https://github.com/gorhill/uBlock/releases
https://github.com/gorhill
You are allowed to start panicking
https://github.com/gorhill
You are allowed to start panicking
■■■■□ China Launches Its Own Quantum-Resistant Encryption Standards, Bypassing US Efforts.
https://thequantuminsider.com/2025/02/18/china-launches-its-own-quantum-resistant-encryption-standard-bypassing-us-efforts/
https://thequantuminsider.com/2025/02/18/china-launches-its-own-quantum-resistant-encryption-standard-bypassing-us-efforts/
Quantum Insider
China Launches Its Own Quantum-Resistant Encryption Standards, Bypassing US Efforts
China has launched a global initiative to develop post-quantum cryptographic algorithms, diverging from US-led efforts.
For Braxman's insecure devices, he's partnered with the founder of "Secure Group", a company closely resembling Encrochat, SkyECC, ANOM, etc. which then transitioned into closely partnering with Braxman via "The Good Phone Foundation" and "LUNR". They're also partnered with iodéOS, yet another insecure OS based on forking LineageOSFor Braxman's insecure devices, he's partnered with the founder of "Secure Group", a company closely resembling Encrochat, SkyECC, ANOM, etc. which then transitioned into closely partnering with Braxman via "The Good Phone Foundation" and "LUNR". They're also partnered with iodéOS, yet another insecure OS based on forking LineageOS which is presenting itself as a highly private and secure OS. which is presenting itself as a highly private and secure OS.
Forwarded from Libreware
🚨 Your Android is watching you!
Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it won’t stop it because it reinstalls automatically.
The only way to stop it is to disable it, preventing Google Play from reinstalling or updating it without your consent.
In October 2024, Google introduced "Sensitive Content Warnings" in Google Messages, which scan images on-device to detect nudity. Since SafetyCore is linked to Google’s content moderation systems, it’s likely scanning files to classify content without your knowledge.
Even if you remove it, Google Play reinstalls it automatically.
There’s no clear explanation on what else it does or why it reinstalls itself.
Honorable mention: it requires 2GB RAM 😳
1️⃣ Enable USB Debugging
(Settings > Developer options).
2️⃣ Download & install ADB on your PC.
3️⃣ Connect your phone to a PC.
4️⃣ Open a terminal and run:
1️⃣ Download & install Termux on your phone.
2️⃣ Open Termux and run:
Take control of your device. Disable it now.
📱𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it won’t stop it because it reinstalls automatically.
The only way to stop it is to disable it, preventing Google Play from reinstalling or updating it without your consent.
🔍 Why Does This Matter?It may be scanning all your media files.
In October 2024, Google introduced "Sensitive Content Warnings" in Google Messages, which scan images on-device to detect nudity. Since SafetyCore is linked to Google’s content moderation systems, it’s likely scanning files to classify content without your knowledge.
Uninstalling is useless.
Even if you remove it, Google Play reinstalls it automatically.
No transparency from Google.
There’s no clear explanation on what else it does or why it reinstalls itself.
Honorable mention: it requires 2GB RAM 😳
🔒 How to disable it?ㅤㅤㅤㅤㅤㅤ⭐ Non-Root
1️⃣ Enable USB Debugging
(Settings > Developer options).
2️⃣ Download & install ADB on your PC.
3️⃣ Connect your phone to a PC.
4️⃣ Open a terminal and run:
🌌 Windows Command Prompt:adb shell pm disable-user --user 0 com.google.android.safetycore
🔟 Windows PowerShell:.\adb shell pm disable-user --user 0 com.google.android.safetycore
🐧 Mac/Linux Terminal:./adb shell pm disable-user --user 0 com.google.android.safetycore
ㅤㅤㅤㅤㅤㅤㅤㅤ🎭 Root
1️⃣ Download & install Termux on your phone.
2️⃣ Open Termux and run:
su -c pm disable com.google.android.safetycoreTake control of your device. Disable it now.
📱𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Google Play
Android System SafetyCore - Apps on Google Play
Provides safety features for Android devices.
Tools for encryption and anonymity - Germany and Europe need to step up to their responsibility
Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe to step into the breach and provide adequate and sustainable funding for the development ecosystem. A commentary.
The continuing erosion of the political and legal protection of civil liberties has led to a situation where freedom of information and communication and the right to privacy and anonymity become increasingly dependent on technology. Digital self-defence has many facets: anonymisation tools such as Tor, end-to-end encryption such as WireGuard or Signal, securing website access with LetsEncrypt or the tools for reproducible builds, which ensure that the software you install has actually been created from source code that someone has checked for security holes. This ecosystem of software and infrastructure has grown exponentially since the Snowden revelations.
Many of these projects have one thing in common: Their development is funded by the US government, often with money from the Open Technology Fund (OTF). Some projects like Tor also receive money from the US State Department and other US government agencies. But why would the US government fund technology development that makes life difficult for the NSA intelligence agency?
💡
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
👉🏼 Read more:
https://netzpolitik.org/2020/germany-and-europe-need-to-step-up-to-their-responsibility/
👉🏼 Read more 🇩🇪:
https://netzpolitik.org/2020/jetzt-sind-deutschland-und-europa-in-der-verantwortung/
#germany #eu #usa #NSA #OTF #encryption #anonymity
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe to step into the breach and provide adequate and sustainable funding for the development ecosystem. A commentary.
The continuing erosion of the political and legal protection of civil liberties has led to a situation where freedom of information and communication and the right to privacy and anonymity become increasingly dependent on technology. Digital self-defence has many facets: anonymisation tools such as Tor, end-to-end encryption such as WireGuard or Signal, securing website access with LetsEncrypt or the tools for reproducible builds, which ensure that the software you install has actually been created from source code that someone has checked for security holes. This ecosystem of software and infrastructure has grown exponentially since the Snowden revelations.
Many of these projects have one thing in common: Their development is funded by the US government, often with money from the Open Technology Fund (OTF). Some projects like Tor also receive money from the US State Department and other US government agencies. But why would the US government fund technology development that makes life difficult for the NSA intelligence agency?
💡
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
👉🏼 Read more:
https://netzpolitik.org/2020/germany-and-europe-need-to-step-up-to-their-responsibility/
👉🏼 Read more 🇩🇪:
https://netzpolitik.org/2020/jetzt-sind-deutschland-und-europa-in-der-verantwortung/
#germany #eu #usa #NSA #OTF #encryption #anonymity
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
the Guardian
NSA files decoded: Edward Snowden's surveillance revelations explained
In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together – and what does it mean for you?