Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Revanced Xposed
An Xposed (Lsposed) module, which integrates Revanced patches into YouTube & YouTube music app.
🔗Links:
- Download
- Source code
Developer: ChsBuffer
❤️ Special thanks to Magisk Root Port for post
🏷️ Tags: #Android #Root #Xposed #Modules
An Xposed (Lsposed) module, which integrates Revanced patches into YouTube & YouTube music app.
🔗Links:
- Download
- Source code
Developer: ChsBuffer
❤️ Special thanks to Magisk Root Port for post
🏷️ Tags: #Android #Root #Xposed #Modules
🕵️Vanadium Browser for Android
Looking for a secure and private browsing experience? Vanadium Browser works on all Android devices and comes with powerful privacy features like:
🔒 Hybrid post-quantum cryptography
🛑 Third-party cookies blocked by default
🚫 Payment support and DRM disabled
🌐 Do Not Track enabled
⚙️ Configurable content filtering and JS JIT disabling
Browse faster, safer, and more privately with Vanadium on your Android device!
Looking for a secure and private browsing experience? Vanadium Browser works on all Android devices and comes with powerful privacy features like:
🔒 Hybrid post-quantum cryptography
🛑 Third-party cookies blocked by default
🚫 Payment support and DRM disabled
🌐 Do Not Track enabled
⚙️ Configurable content filtering and JS JIT disabling
Browse faster, safer, and more privately with Vanadium on your Android device!
How to install -
First install TrichromeLibrary.apk
Then install TrichromeWebView.apk
Then install TrichromChrome.apk
⚠️ URGENT TELEGRAM USERS: ACCOUNT HIJACKING ALERT! ⚠️
Someone's posing as Telegram support and sending links. DO NOT CLICK! This is a phishing scam. They're trying to steal your entire account!
You click the link, and Telegram sends you an OTP. Enter that OTP on the site, and they get full access to your telegram. (Common sense 🙈)
Because the website UI is almost identical to Telegram's support page, and the OTP is genuinely sent by Telegram. This creates a dangerous situation where anyone could easily fall victim to the scam.
This allows them to spread malicious content, compromise your channels, and send offensive messages to your contacts using your identity.
Refuse to click links specially from non contacts and report this account!
📱𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Someone's posing as Telegram support and sending links. DO NOT CLICK! This is a phishing scam. They're trying to steal your entire account!
How it works:
You click the link, and Telegram sends you an OTP. Enter that OTP on the site, and they get full access to your telegram. (Common sense 🙈)
Because the website UI is almost identical to Telegram's support page, and the OTP is genuinely sent by Telegram. This creates a dangerous situation where anyone could easily fall victim to the scam.
This allows them to spread malicious content, compromise your channels, and send offensive messages to your contacts using your identity.
Refuse to click links specially from non contacts and report this account!
📱𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Forwarded from Gizchina.com
Maximize Your Android Battery Life with These Pro Tips
https://www.gizchina.com/2025/03/10/maximize-your-android-battery-life-with-these-pro-tips-mar/
https://www.gizchina.com/2025/03/10/maximize-your-android-battery-life-with-these-pro-tips-mar/
Forwarded from Gizchina.com
GOLDENMATE 1000VA/800W Lithium UPS Battery Backup Review: A Solid, and Reliable PowerSolution for Home and Office
https://www.gizchina.com/2025/03/10/goldenmate-1000va-800w-lithium-ups-battery-backup-review/
https://www.gizchina.com/2025/03/10/goldenmate-1000va-800w-lithium-ups-battery-backup-review/
Forwarded from #TBOT: Take Back Our Tech
⚡️How Big Tech Plans To Read Your Mind
@takebackourtech
The hunger for data knows no bounds. Your location history, browsing data, and communications aren't enough to satisfy the surveillance economy. Tech companies now seek data from your mind and body.
In our new investigative report, we show how companies like Apple are driving towards the “Internet of Bodies” where humans are connected to the cloud with bio-sensors, sharing their health metrics through wearable & implantable devices.
Read the full article here.
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
@takebackourtech
The hunger for data knows no bounds. Your location history, browsing data, and communications aren't enough to satisfy the surveillance economy. Tech companies now seek data from your mind and body.
In our new investigative report, we show how companies like Apple are driving towards the “Internet of Bodies” where humans are connected to the cloud with bio-sensors, sharing their health metrics through wearable & implantable devices.
Read the full article here.
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Forwarded from NoGoolag
#signal
https://xcancel.com/kaepora/status/1810989285148971162
If you look at leading scientific publications such as those from PETS, you’ll see that:
- Signal’s “sealed sender security” is broken and bogus (Martiny et al, 2021: https://cs-people.bu.edu/kaptchuk/publications/ndss21.pdf)
- Signal has regressed in terms of deniability: eprint.iacr.org/2024/741 (+upcoming work) - Signal’s group chat benefits from lesser security guarantees: eprint.iacr.org/2017/713.pdf
- Signal’s tying of usernames to phone numbers is a slap in the face for those expecting real pseudonymity from the Signal service and continues to be unaddressed,
- Signal’s desktop client does not detect when a state has been cloned and allows for two independent devices to masquerade and authenticate as the same device,
- Signal’s use of SGX is more opaque than it could be,
But of course, all of the above and more are not something that can be brought up in polite conversation, because Signal’s own leadership has poisoned the discourse with politics and by encouraging an in-group thinking dynamic with regards to Signal.
https://xcancel.com/kaepora/status/1810989285148971162
If you look at leading scientific publications such as those from PETS, you’ll see that:
- Signal’s “sealed sender security” is broken and bogus (Martiny et al, 2021: https://cs-people.bu.edu/kaptchuk/publications/ndss21.pdf)
- Signal has regressed in terms of deniability: eprint.iacr.org/2024/741 (+upcoming work) - Signal’s group chat benefits from lesser security guarantees: eprint.iacr.org/2017/713.pdf
- Signal’s tying of usernames to phone numbers is a slap in the face for those expecting real pseudonymity from the Signal service and continues to be unaddressed,
- Signal’s desktop client does not detect when a state has been cloned and allows for two independent devices to masquerade and authenticate as the same device,
- Signal’s use of SGX is more opaque than it could be,
But of course, all of the above and more are not something that can be brought up in polite conversation, because Signal’s own leadership has poisoned the discourse with politics and by encouraging an in-group thinking dynamic with regards to Signal.
IACR Cryptology ePrint Archive
A Deniability Analysis of Signal's Initial Handshake PQXDH
Many use messaging apps such as Signal to exercise their right to private communication. To cope with the advent of quantum computing, Signal employs a new initial handshake protocol called PQXDH for post-quantum confidentiality, yet keeps guarantees of authenticity…
Forwarded from NoGoolag
https://xcancel.com/taviso/status/1897333770644336774
You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials.
https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking
The code and tutorials are here if the link doesn't work!
https://github.com/google/security-research/blob/master/pocs/cpus/entrysign/zentool/docs/intro.md
You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials.
https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking
The code and tutorials are here if the link doesn't work!
https://github.com/google/security-research/blob/master/pocs/cpus/entrysign/zentool/docs/intro.md
GitHub
security-research/pocs/cpus/entrysign/zentool/docs/intro.md at master · google/security-research
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. - google/security-research
Forwarded from NoGoolag
CEO of #CloudFlare once said:
(Source)
BBC reporter Zoe Kleinman wrote that Matthew Prince wanted $20,000 for the Honey Pot data. "That check showed up so fast," said Prince. Michelle Zatlyn heard the story from Prince and replied, "If they'll pay for it, other people will pay for it." Soon she and Prince cofounded CloudFlare.
From an article:
And more:
https://rl.bloat.cat/r/privacy/comments/d52kop/eli5_why_cloudflare_is_depicted_as_evil_and_whats/f0jrxox/
Matthew: Back in 2003, Lee Holloway and I started Project Honey Pot as an open-source project to track online fraud and abuse. The Project allowed anyone with a website to install a piece of code and track hackers and spammers.
We ran it as a hobby and didn't think much about it until, in 2008, the Department of Homeland Security called and said, "Do you have any idea how valuable the data you have is?" That started us thinking about how we could effectively deploy the data from Project Honey Pot, as well as other sources, in order to protect websites online. That turned into the initial impetus for CloudFlare.
(Source)
BBC reporter Zoe Kleinman wrote that Matthew Prince wanted $20,000 for the Honey Pot data. "That check showed up so fast," said Prince. Michelle Zatlyn heard the story from Prince and replied, "If they'll pay for it, other people will pay for it." Soon she and Prince cofounded CloudFlare.
From an article:
Swearing off data collection
But wait, if Cloudflare is directing your website queries, then can't it collect your browsing history for itself? Actually, they're not going to keep that data at all, Prince said.
"At no time will we record the list of where everyone is going online," Prince said. "That's creepy."
Cloudflare is working with third-party auditors at KPMG to examine their systems and guarantee they're not actually collecting your data. That privacy commitment, Prince said, is what separates Cloudflare's 1.1.1.1 from other DNS services that are free and open to the public.
[...]
Cloudflare's promise to keep your data private is impressive, said Heidi Shey, a privacy and security expert at business analyst firm Forrester. "It's a great thing that they're coming out of the gate and being up front about that," Shey said. Still, she added, "You're kind of taking what they're saying at face value."
The company will need to continue to be transparent, showing what the auditors find in their logs, for consumers to continue to trust the service, Shey said.
And more:
https://rl.bloat.cat/r/privacy/comments/d52kop/eli5_why_cloudflare_is_depicted_as_evil_and_whats/f0jrxox/
rl.bloat.cat
86rd9t7ofy8pguh comments on ELI5 why CloudFlare is depicted as evil, and what's wrong with using their DNS (1.1.1.1) - r/privacy
View on Redlib, an alternative private front-end to Reddit.
Forwarded from NoGoolag
The Essential #AI Toolkit for #Journalists
List of Huggingface spaces:
- Transcribe audio or video files
- Scrape websites without coding
- Extract information from PDFs, images and handwritten documents
- Extract information from charts
and more.
https://huggingface.co/spaces/JournalistsonHF/ai-toolkit
@cybdetective
List of Huggingface spaces:
- Transcribe audio or video files
- Scrape websites without coding
- Extract information from PDFs, images and handwritten documents
- Extract information from charts
and more.
https://huggingface.co/spaces/JournalistsonHF/ai-toolkit
@cybdetective
Forwarded from Pegasus NSO & other spyware
A Study on Malicious Browser Extensions in 2025
#Browser
Browser extensions are additional tools developed by third parties that integrate with web browsers to extend their functionality beyond standard capabilities. However, the browser extension platform is increasingly being ex-ploited by hackers to launch sophisticated cyber threats.
These threats encompass a wide range of malicious activities, including but not limited to phishing, spying,Distributed Denial of Service (DDoS) attacks, email spamming, affil-iate fraud, malvertising, and payment fraud. This paper examines the evolving threat landscape of malicious browser extensions in 2025, focusing on Mozilla Firefox and Chrome.
Our research successfully bypassed security mechanisms of Firefox and Chrome, demonstrating that malicious exten-sions can still be developed, published, and executed within the Mozilla Add-ons Store and Chrome Web Store. These findings highlight the persisting weaknesses in browser’s vet-ting process and security framework.#Browser
Forwarded from Pegasus NSO & other spyware
MBE_25.pdf
414.3 KB
Forwarded from NoGoolag
Orange Pi RV2 is a single-board PC with an 8-core #RISCV processor
https://liliputing.com/orange-pi-rv2-is-a-single-board-pc-with-an-8-core-risc-v-processor/
https://www.cnx-software.com/2025/03/08/orange-pi-rv2-low-cost-risc-v-sbc-ky-x1-octa-core-soc-2-tops-ai-accelerator/
#sbc
https://liliputing.com/orange-pi-rv2-is-a-single-board-pc-with-an-8-core-risc-v-processor/
https://www.cnx-software.com/2025/03/08/orange-pi-rv2-low-cost-risc-v-sbc-ky-x1-octa-core-soc-2-tops-ai-accelerator/
#sbc
Liliputing
Orange Pi RV2 is a single-board PC with an 8-core RISC-V processor
Orange Pi RV2 is a single-board PC with an 8-core RISC-V processor
Forwarded from NoGoolag
WARNING - Etcher Sends private information to third parties
Etcher is recommend by many people for burning image files to USB drives for distro testing, but TAILS just removed their recommendation for Etcher based on sharing information with third parties. We will talk about what's going on.
https://www.youtube.com/watch?v=ufDVKQ4C8-0
https://tails.net/news/rufus/index.en.html
#tails #etcher #linux
Etcher is recommend by many people for burning image files to USB drives for distro testing, but TAILS just removed their recommendation for Etcher based on sharing information with third parties. We will talk about what's going on.
https://www.youtube.com/watch?v=ufDVKQ4C8-0
https://tails.net/news/rufus/index.en.html
#tails #etcher #linux
YouTube
WARNING - Etcher Sends PII To Third Parties
Etcher is recommend by many people for burning image files to USB drives for distro testing, but TAILS just removed their recommendation for Etcher based on sharing information with third parties. We will talk about what's going on.
#tails #etcher #linux…
#tails #etcher #linux…