Privacy + Secure Tech Corner Channel πŸ›‘οΈ
90 subscribers
6.65K photos
578 videos
497 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
FamiStudio NES Music Editor

FamiStudio is a simple music editor for the Nintendo Entertainment System or Famicom. It is targeted at both chiptune artists and NES homebrewers.

πŸ”— Links:
- Download
- Demo video
- Source code
Developer: BleuBleu

❀️ Special thanks to @Megamichimichi for recommending!

🏷️ Tags: #Android #Linux #Windows #MacOS #iOS #Audio #Editor
DroidCrypt - A file and text encryption tool for Android

File and text encryption in Android offers crucial benefits in protecting sensitive data. By encrypting files and text, users can prevent unauthorized access, ensuring confidentiality and privacy. This is especially vital in a world where mobile devices often contain personal, financial, and business-related information. Encryption adds an additional layer of security, preventing malicious actors from intercepting or tampering with data, thus mitigating the risk of data breaches and identity theft.

πŸ”— Links:
- Download
- Screenshot
- Features
- Source code
Developer: Umut Γ‡amliyurt

❀️ Special thanks to @felixng198 for recommending!

🏷️ Tags: #Android #Tools
Text Grab

A quick app to grab any on screen text using the Optical Character Recognition (OCR) built into Windows 10. Text Grab does not need to run in the background and does not require the internet to work. This app was built to be quick and get out of the way, making you more productive on Windows. By using the built-in notifications, minimal clicks, and quick startup; Text Grab can easily be used hundreds of times a day!

πŸ”— Links:
- Download
- Screenshots
- Features
- Source code
Developer: Joe Finney

❀️ Special thanks @SC1444 for recommending!

🏷️ Tags: #Windows #Productivity #Tools
Revanced Xposed

An Xposed (Lsposed) module, which integrates Revanced patches into YouTube & YouTube music app.

πŸ”—Links:
- Download
- Source code
Developer: ChsBuffer

❀️ Special thanks to Magisk Root Port for post

🏷️ Tags: #Android #Root #Xposed #Modules
πŸ•΅οΈVanadium Browser for Android

Looking for a secure and private browsing experience? Vanadium Browser works on all Android devices and comes with powerful privacy features like:

πŸ”’ Hybrid post-quantum cryptography
πŸ›‘ Third-party cookies blocked by default
🚫 Payment support and DRM disabled
🌐 Do Not Track enabled
βš™οΈ Configurable content filtering and JS JIT disabling


Browse faster, safer, and more privately with Vanadium on your Android device!

How to install -

First install TrichromeLibrary.apk
Then install TrichromeWebView.apk
Then install TrichromChrome.apk
⚠️ URGENT TELEGRAM USERS: ACCOUNT HIJACKING ALERT! ⚠️

Someone's posing as Telegram support and sending links. DO NOT CLICK! This is a phishing scam. They're trying to steal your entire account!

How it works:

You click the link, and Telegram sends you an OTP. Enter that OTP on the site, and they get full access to your telegram. (Common sense πŸ™ˆ)

Because the website UI is almost identical to Telegram's support page, and the OTP is genuinely sent by Telegram. This creates a dangerous situation where anyone could easily fall victim to the scam.

This allows them to spread malicious content, compromise your channels, and send offensive messages to your contacts using your identity.
Refuse to click links specially from non contacts and report this account!

πŸ“±π— π—˜π—’π—ͺ 𝗗𝗨𝗠𝗣
Forwarded from Gizchina.com
GOLDENMATE 1000VA/800W Lithium UPS Battery Backup Review: A Solid, and Reliable PowerSolution for Home and Office
https://www.gizchina.com/2025/03/10/goldenmate-1000va-800w-lithium-ups-battery-backup-review/
⚑️How Big Tech Plans To Read Your Mind
@takebackourtech

The hunger for data knows no bounds. Your location history, browsing data, and communications aren't enough to satisfy the surveillance economy. Tech companies now seek data from your mind and body.

In our new investigative report, we show how companies like Apple are driving towards the β€œInternet of Bodies” where humans are connected to the cloud with bio-sensors, sharing their health metrics through wearable & implantable devices.

Read the full article here.

β€”
✌️ MORE POSTS | πŸ—― CHAT GROUP | πŸ“© NEWSLETTER | XMPP
Forwarded from NoGoolag
#signal

https://xcancel.com/kaepora/status/1810989285148971162

If you look at leading scientific publications such as those from PETS, you’ll see that:

- Signal’s β€œsealed sender security” is broken and bogus (Martiny et al, 2021: https://cs-people.bu.edu/kaptchuk/publications/ndss21.pdf)

- Signal has regressed in terms of deniability: eprint.iacr.org/2024/741 (+upcoming work) - Signal’s group chat benefits from lesser security guarantees: eprint.iacr.org/2017/713.pdf

- Signal’s tying of usernames to phone numbers is a slap in the face for those expecting real pseudonymity from the Signal service and continues to be unaddressed,

- Signal’s desktop client does not detect when a state has been cloned and allows for two independent devices to masquerade and authenticate as the same device,

- Signal’s use of SGX is more opaque than it could be,

But of course, all of the above and more are not something that can be brought up in polite conversation, because Signal’s own leadership has poisoned the discourse with politics and by encouraging an in-group thinking dynamic with regards to Signal.
Forwarded from NoGoolag
CEO of #CloudFlare once said:
Matthew: Back in 2003, Lee Holloway and I started Project Honey Pot as an open-source project to track online fraud and abuse. The Project allowed anyone with a website to install a piece of code and track hackers and spammers.
We ran it as a hobby and didn't think much about it until, in 2008, the Department of Homeland Security called and said, "Do you have any idea how valuable the data you have is?" That started us thinking about how we could effectively deploy the data from Project Honey Pot, as well as other sources, in order to protect websites online. That turned into the initial impetus for CloudFlare.


(Source)
BBC reporter Zoe Kleinman wrote that Matthew Prince wanted $20,000 for the Honey Pot data. "That check showed up so fast," said Prince. Michelle Zatlyn heard the story from Prince and replied, "If they'll pay for it, other people will pay for it." Soon she and Prince cofounded CloudFlare.
From an article:

Swearing off data collection
But wait, if Cloudflare is directing your website queries, then can't it collect your browsing history for itself? Actually, they're not going to keep that data at all, Prince said.
"At no time will we record the list of where everyone is going online," Prince said. "That's creepy."
Cloudflare is working with third-party auditors at KPMG to examine their systems and guarantee they're not actually collecting your data. That privacy commitment, Prince said, is what separates Cloudflare's 1.1.1.1 from other DNS services that are free and open to the public.
[...]
Cloudflare's promise to keep your data private is impressive, said Heidi Shey, a privacy and security expert at business analyst firm Forrester. "It's a great thing that they're coming out of the gate and being up front about that," Shey said. Still, she added, "You're kind of taking what they're saying at face value."
The company will need to continue to be transparent, showing what the auditors find in their logs, for consumers to continue to trust the service, Shey said.

And more:
https://rl.bloat.cat/r/privacy/comments/d52kop/eli5_why_cloudflare_is_depicted_as_evil_and_whats/f0jrxox/
Forwarded from NoGoolag
The Essential #AI Toolkit for #Journalists

List of Huggingface spaces:

- Transcribe audio or video files
- Scrape websites without coding
- Extract information from PDFs, images and handwritten documents
- Extract information from charts

and more.

https://huggingface.co/spaces/JournalistsonHF/ai-toolkit

@cybdetective
A Study on Malicious Browser Extensions in 2025

Browser extensions are additional tools developed by third parties that integrate with web browsers to extend their functionality beyond standard capabilities. However, the browser extension platform is increasingly being ex-ploited by hackers to launch sophisticated cyber threats.

These threats encompass a wide range of malicious activities, including but not limited to phishing, spying,Distributed Denial of Service (DDoS) attacks, email spamming, affil-iate fraud, malvertising, and payment fraud. This paper examines the evolving threat landscape of malicious browser extensions in 2025, focusing on Mozilla Firefox and Chrome.

Our research successfully bypassed security mechanisms of Firefox and Chrome, demonstrating that malicious exten-sions can still be developed, published, and executed within the Mozilla Add-ons Store and Chrome Web Store. These findings highlight the persisting weaknesses in browser’s vet-ting process and security framework
.

#Browser