Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
FamiStudio NES Music Editor
FamiStudio is a simple music editor for the Nintendo Entertainment System or Famicom. It is targeted at both chiptune artists and NES homebrewers.
π Links:
- Download
- Demo video
- Source code
Developer: BleuBleu
β€οΈ Special thanks to @Megamichimichi for recommending!
π·οΈ Tags: #Android #Linux #Windows #MacOS #iOS #Audio #Editor
FamiStudio is a simple music editor for the Nintendo Entertainment System or Famicom. It is targeted at both chiptune artists and NES homebrewers.
π Links:
- Download
- Demo video
- Source code
Developer: BleuBleu
β€οΈ Special thanks to @Megamichimichi for recommending!
π·οΈ Tags: #Android #Linux #Windows #MacOS #iOS #Audio #Editor
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
DroidCrypt - A file and text encryption tool for Android
File and text encryption in Android offers crucial benefits in protecting sensitive data. By encrypting files and text, users can prevent unauthorized access, ensuring confidentiality and privacy. This is especially vital in a world where mobile devices often contain personal, financial, and business-related information. Encryption adds an additional layer of security, preventing malicious actors from intercepting or tampering with data, thus mitigating the risk of data breaches and identity theft.
π Links:
- Download
- Screenshot
- Features
- Source code
Developer: Umut Γamliyurt
β€οΈ Special thanks to @felixng198 for recommending!
π·οΈ Tags: #Android #Tools
File and text encryption in Android offers crucial benefits in protecting sensitive data. By encrypting files and text, users can prevent unauthorized access, ensuring confidentiality and privacy. This is especially vital in a world where mobile devices often contain personal, financial, and business-related information. Encryption adds an additional layer of security, preventing malicious actors from intercepting or tampering with data, thus mitigating the risk of data breaches and identity theft.
π Links:
- Download
- Screenshot
- Features
- Source code
Developer: Umut Γamliyurt
β€οΈ Special thanks to @felixng198 for recommending!
π·οΈ Tags: #Android #Tools
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Text Grab
A quick app to grab any on screen text using the Optical Character Recognition (OCR) built into Windows 10. Text Grab does not need to run in the background and does not require the internet to work. This app was built to be quick and get out of the way, making you more productive on Windows. By using the built-in notifications, minimal clicks, and quick startup; Text Grab can easily be used hundreds of times a day!
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: Joe Finney
β€οΈ Special thanks @SC1444 for recommending!
π·οΈ Tags: #Windows #Productivity #Tools
A quick app to grab any on screen text using the Optical Character Recognition (OCR) built into Windows 10. Text Grab does not need to run in the background and does not require the internet to work. This app was built to be quick and get out of the way, making you more productive on Windows. By using the built-in notifications, minimal clicks, and quick startup; Text Grab can easily be used hundreds of times a day!
π Links:
- Download
- Screenshots
- Features
- Source code
Developer: Joe Finney
β€οΈ Special thanks @SC1444 for recommending!
π·οΈ Tags: #Windows #Productivity #Tools
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Revanced Xposed
An Xposed (Lsposed) module, which integrates Revanced patches into YouTube & YouTube music app.
πLinks:
- Download
- Source code
Developer: ChsBuffer
β€οΈ Special thanks to Magisk Root Port for post
π·οΈ Tags: #Android #Root #Xposed #Modules
An Xposed (Lsposed) module, which integrates Revanced patches into YouTube & YouTube music app.
πLinks:
- Download
- Source code
Developer: ChsBuffer
β€οΈ Special thanks to Magisk Root Port for post
π·οΈ Tags: #Android #Root #Xposed #Modules
π΅οΈVanadium Browser for Android
Looking for a secure and private browsing experience? Vanadium Browser works on all Android devices and comes with powerful privacy features like:
π Hybrid post-quantum cryptography
π Third-party cookies blocked by default
π« Payment support and DRM disabled
π Do Not Track enabled
βοΈ Configurable content filtering and JS JIT disabling
Browse faster, safer, and more privately with Vanadium on your Android device!
Looking for a secure and private browsing experience? Vanadium Browser works on all Android devices and comes with powerful privacy features like:
π Hybrid post-quantum cryptography
π Third-party cookies blocked by default
π« Payment support and DRM disabled
π Do Not Track enabled
βοΈ Configurable content filtering and JS JIT disabling
Browse faster, safer, and more privately with Vanadium on your Android device!
How to install -
First install TrichromeLibrary.apk
Then install TrichromeWebView.apk
Then install TrichromChrome.apk
β οΈ URGENT TELEGRAM USERS: ACCOUNT HIJACKING ALERT! β οΈ
Someone's posing as Telegram support and sending links. DO NOT CLICK! This is a phishing scam. They're trying to steal your entire account!
You click the link, and Telegram sends you an OTP. Enter that OTP on the site, and they get full access to your telegram. (Common sense π)
Because the website UI is almost identical to Telegram's support page, and the OTP is genuinely sent by Telegram. This creates a dangerous situation where anyone could easily fall victim to the scam.
This allows them to spread malicious content, compromise your channels, and send offensive messages to your contacts using your identity.
Refuse to click links specially from non contacts and report this account!
π±π ππ’πͺ ππ¨π π£
Someone's posing as Telegram support and sending links. DO NOT CLICK! This is a phishing scam. They're trying to steal your entire account!
How it works:
You click the link, and Telegram sends you an OTP. Enter that OTP on the site, and they get full access to your telegram. (Common sense π)
Because the website UI is almost identical to Telegram's support page, and the OTP is genuinely sent by Telegram. This creates a dangerous situation where anyone could easily fall victim to the scam.
This allows them to spread malicious content, compromise your channels, and send offensive messages to your contacts using your identity.
Refuse to click links specially from non contacts and report this account!
π±π ππ’πͺ ππ¨π π£
Forwarded from Gizchina.com
Maximize Your Android Battery Life with These Pro Tips
https://www.gizchina.com/2025/03/10/maximize-your-android-battery-life-with-these-pro-tips-mar/
https://www.gizchina.com/2025/03/10/maximize-your-android-battery-life-with-these-pro-tips-mar/
Forwarded from Gizchina.com
GOLDENMATE 1000VA/800W Lithium UPS Battery Backup Review: A Solid, and Reliable PowerSolution for Home and Office
https://www.gizchina.com/2025/03/10/goldenmate-1000va-800w-lithium-ups-battery-backup-review/
https://www.gizchina.com/2025/03/10/goldenmate-1000va-800w-lithium-ups-battery-backup-review/
Forwarded from #TBOT: Take Back Our Tech
β‘οΈHow Big Tech Plans To Read Your Mind
@takebackourtech
The hunger for data knows no bounds. Your location history, browsing data, and communications aren't enough to satisfy the surveillance economy. Tech companies now seek data from your mind and body.
In our new investigative report, we show how companies like Apple are driving towards the βInternet of Bodiesβ where humans are connected to the cloud with bio-sensors, sharing their health metrics through wearable & implantable devices.
Read the full article here.
β
βοΈ MORE POSTS | π― CHAT GROUP | π© NEWSLETTER | XMPP
@takebackourtech
The hunger for data knows no bounds. Your location history, browsing data, and communications aren't enough to satisfy the surveillance economy. Tech companies now seek data from your mind and body.
In our new investigative report, we show how companies like Apple are driving towards the βInternet of Bodiesβ where humans are connected to the cloud with bio-sensors, sharing their health metrics through wearable & implantable devices.
Read the full article here.
β
βοΈ MORE POSTS | π― CHAT GROUP | π© NEWSLETTER | XMPP
Forwarded from NoGoolag
#signal
https://xcancel.com/kaepora/status/1810989285148971162
If you look at leading scientific publications such as those from PETS, youβll see that:
- Signalβs βsealed sender securityβ is broken and bogus (Martiny et al, 2021: https://cs-people.bu.edu/kaptchuk/publications/ndss21.pdf)
- Signal has regressed in terms of deniability: eprint.iacr.org/2024/741 (+upcoming work) - Signalβs group chat benefits from lesser security guarantees: eprint.iacr.org/2017/713.pdf
- Signalβs tying of usernames to phone numbers is a slap in the face for those expecting real pseudonymity from the Signal service and continues to be unaddressed,
- Signalβs desktop client does not detect when a state has been cloned and allows for two independent devices to masquerade and authenticate as the same device,
- Signalβs use of SGX is more opaque than it could be,
But of course, all of the above and more are not something that can be brought up in polite conversation, because Signalβs own leadership has poisoned the discourse with politics and by encouraging an in-group thinking dynamic with regards to Signal.
https://xcancel.com/kaepora/status/1810989285148971162
If you look at leading scientific publications such as those from PETS, youβll see that:
- Signalβs βsealed sender securityβ is broken and bogus (Martiny et al, 2021: https://cs-people.bu.edu/kaptchuk/publications/ndss21.pdf)
- Signal has regressed in terms of deniability: eprint.iacr.org/2024/741 (+upcoming work) - Signalβs group chat benefits from lesser security guarantees: eprint.iacr.org/2017/713.pdf
- Signalβs tying of usernames to phone numbers is a slap in the face for those expecting real pseudonymity from the Signal service and continues to be unaddressed,
- Signalβs desktop client does not detect when a state has been cloned and allows for two independent devices to masquerade and authenticate as the same device,
- Signalβs use of SGX is more opaque than it could be,
But of course, all of the above and more are not something that can be brought up in polite conversation, because Signalβs own leadership has poisoned the discourse with politics and by encouraging an in-group thinking dynamic with regards to Signal.
IACR Cryptology ePrint Archive
A Deniability Analysis of Signal's Initial Handshake PQXDH
Many use messaging apps such as Signal to exercise their right to private communication. To cope with the advent of quantum computing, Signal employs a new initial handshake protocol called PQXDH for post-quantum confidentiality, yet keeps guarantees of authenticityβ¦
Forwarded from NoGoolag
https://xcancel.com/taviso/status/1897333770644336774
You can now jailbreak your AMD CPU! π₯We've just released a full microcode toolchain, with source code and tutorials.
https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking
The code and tutorials are here if the link doesn't work!
https://github.com/google/security-research/blob/master/pocs/cpus/entrysign/zentool/docs/intro.md
You can now jailbreak your AMD CPU! π₯We've just released a full microcode toolchain, with source code and tutorials.
https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking
The code and tutorials are here if the link doesn't work!
https://github.com/google/security-research/blob/master/pocs/cpus/entrysign/zentool/docs/intro.md
GitHub
security-research/pocs/cpus/entrysign/zentool/docs/intro.md at master Β· google/security-research
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. - google/security-research
Forwarded from NoGoolag
CEO of #CloudFlare once said:
(Source)
BBC reporter Zoe Kleinman wrote that Matthew Prince wanted $20,000 for the Honey Pot data. "That check showed up so fast," said Prince. Michelle Zatlyn heard the story from Prince and replied, "If they'll pay for it, other people will pay for it." Soon she and Prince cofounded CloudFlare.
From an article:
And more:
https://rl.bloat.cat/r/privacy/comments/d52kop/eli5_why_cloudflare_is_depicted_as_evil_and_whats/f0jrxox/
Matthew: Back in 2003, Lee Holloway and I started Project Honey Pot as an open-source project to track online fraud and abuse. The Project allowed anyone with a website to install a piece of code and track hackers and spammers.
We ran it as a hobby and didn't think much about it until, in 2008, the Department of Homeland Security called and said, "Do you have any idea how valuable the data you have is?" That started us thinking about how we could effectively deploy the data from Project Honey Pot, as well as other sources, in order to protect websites online. That turned into the initial impetus for CloudFlare.
(Source)
BBC reporter Zoe Kleinman wrote that Matthew Prince wanted $20,000 for the Honey Pot data. "That check showed up so fast," said Prince. Michelle Zatlyn heard the story from Prince and replied, "If they'll pay for it, other people will pay for it." Soon she and Prince cofounded CloudFlare.
From an article:
Swearing off data collection
But wait, if Cloudflare is directing your website queries, then can't it collect your browsing history for itself? Actually, they're not going to keep that data at all, Prince said.
"At no time will we record the list of where everyone is going online," Prince said. "That's creepy."
Cloudflare is working with third-party auditors at KPMG to examine their systems and guarantee they're not actually collecting your data. That privacy commitment, Prince said, is what separates Cloudflare's 1.1.1.1 from other DNS services that are free and open to the public.
[...]
Cloudflare's promise to keep your data private is impressive, said Heidi Shey, a privacy and security expert at business analyst firm Forrester. "It's a great thing that they're coming out of the gate and being up front about that," Shey said. Still, she added, "You're kind of taking what they're saying at face value."
The company will need to continue to be transparent, showing what the auditors find in their logs, for consumers to continue to trust the service, Shey said.
And more:
https://rl.bloat.cat/r/privacy/comments/d52kop/eli5_why_cloudflare_is_depicted_as_evil_and_whats/f0jrxox/
rl.bloat.cat
86rd9t7ofy8pguh comments on ELI5 why CloudFlare is depicted as evil, and what's wrong with using their DNS (1.1.1.1) - r/privacy
View on Redlib, an alternative private front-end to Reddit.
Forwarded from NoGoolag
The Essential #AI Toolkit for #Journalists
List of Huggingface spaces:
- Transcribe audio or video files
- Scrape websites without coding
- Extract information from PDFs, images and handwritten documents
- Extract information from charts
and more.
https://huggingface.co/spaces/JournalistsonHF/ai-toolkit
@cybdetective
List of Huggingface spaces:
- Transcribe audio or video files
- Scrape websites without coding
- Extract information from PDFs, images and handwritten documents
- Extract information from charts
and more.
https://huggingface.co/spaces/JournalistsonHF/ai-toolkit
@cybdetective
Forwarded from Pegasus NSO & other spyware
A Study on Malicious Browser Extensions in 2025
#Browser
Browser extensions are additional tools developed by third parties that integrate with web browsers to extend their functionality beyond standard capabilities. However, the browser extension platform is increasingly being ex-ploited by hackers to launch sophisticated cyber threats.
These threats encompass a wide range of malicious activities, including but not limited to phishing, spying,Distributed Denial of Service (DDoS) attacks, email spamming, affil-iate fraud, malvertising, and payment fraud. This paper examines the evolving threat landscape of malicious browser extensions in 2025, focusing on Mozilla Firefox and Chrome.
Our research successfully bypassed security mechanisms of Firefox and Chrome, demonstrating that malicious exten-sions can still be developed, published, and executed within the Mozilla Add-ons Store and Chrome Web Store. These findings highlight the persisting weaknesses in browserβs vet-ting process and security framework.#Browser
Forwarded from Pegasus NSO & other spyware
MBE_25.pdf
414.3 KB