Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
581 videos
543 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from cKure
■□□□□ United Kingdom 🇬🇧 Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution
Individuals in the United Kingdom who report cybersecurity vulnerabilities to the Home Office are at risk of facing prosecution for the simple act of discovering those vulnerabilities — even if they comply with new guidance the government department published on Monday.

https://www.gov.uk/guidance/report-a-vulnerability-on-a-home-office-system

https://therecord.media/uk-home-office-vulnerability-disclosure-ethical-hackers
Tracking You from a Thousand Miles Away!

Apple’s Find My network, leveraging over a billion active Apple devices, is the world’s largest device-locating network. We investigate the potential misuse of this network to maliciously track Bluetooth devices. We present nRootTag, a novel attack method that transforms computers into trackable “AirTags” without requiring root privileges.

The attack achieves a success rate of over 90% within minutes at a cost of only a few US dollars. Or, a rainbow table can be built to search keys instantly. Subsequently, it can locate a computer in minutes, posing a substantial risk to user privacy and safety.

The attack is effective on Linux, Windows, and Android systems, and can be employed to track desktops, laptops, smartphones, and IoT devices. Our comprehensive evaluation demonstrates nRootTag’s effectiveness and efficiency across various scenarios.

#NrootTag
The site can see if you downloaded or not a script if they want and that will already put you in a smaller pool of users.

Also they can find HW properties with some hidden benchmarks in the page. Like how long it takes to render some contents after downloaded or other nasty things hard to defeat.

Thus is an example (not perfect because uses JS, but is not the only one)
https://cispa.de/en/research/publications/52335-browser-based-cpu-fingerprinting
version 135.0.1
org.ironfoxoss.ironfox


... newest build messed up some about:config setting where uBlock (extension) pages are malfunctioning, lagging... not sure if I'm bothered to pinpoint it and correct it
Because they're advertising Accresent as THE installer on their GitHub page, https://github.com/ironfox-oss/IronFox and it's crap; and they're making rookie mistakes with the user.js constantly just like DivestOS used to do as well...
*using the arkenfox user.js but it must be crafted to Android, as that's a desktop release
You can use whatever you prefer to install, Accrescent makes sense on GOS but since has only few apps and still in beta is not yet to be considered as the only source for apps. And so you can have almost same results with obtanium+appverifier.