Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
581 videos
543 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
🚨 A Russian group, Water Gamayun, is abusing a Windows zero-day (CVE-2025-26633) to drop two chilling backdoors: SilentPrism & DarkWisp.

They’re hiding in plain sight—using signed .msi files posing as legit apps like DingTalk & VooV to hijack systems.

👀 Targets? Your data, credentials, and even crypto wallets.

💀 Techniques? Living-off-the-land, PowerShell implants, fake WinRAR sites—pure cyber espionage playbook.

🔗 Learn more: https://thehackernews.com/2025/03/russian-hackers-exploit-cve-2025-26633.html
Forwarded from The Hacker News
🔥 Apple hit with €150M fine for “biased” privacy rules.

France says Apple’s App Tracking Transparency (ATT) gave itself a privacy pass—while forcing rivals through a double-consent maze.

Regulators call it unfair, confusing, and not truly neutral.

https://thehackernews.com/2025/04/apple-fined-150-million-by-french.html
Forwarded from ATT • Tech News (Agam)
France fines Apple €150M for “excessive” pop-ups that let users reject tracking

France has imposed a €150 million fine on Apple because its App Tracking Transparency (ATT) framework requires third-party publishers to get "double consent" for tracking, while Apple's own data collection only needs one pop-up.

This asymmetry is seen as making third-party app use overly complex and harming small publishers who rely on advertising revenue. This fine doesn't mandate immediate changes, leaving room for future adjustments. Also, investigations into ATT are ongoing in Germany, Italy, Poland, and Romania.

🔗 ArsTechnica
🧑‍💻 @agamtechtricks
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
https://github.com/Kirlif/HBC-Tool

A command-line interface for disassembling and assembling the Hermes Bytecode.
Since the React Native team created their own JavaScript engine (named Hermes) for running the React Native application, the JavaScript source code is often compiled to the Hermes bytecode. In the penetration test project, I found that some React Native applications have already been migrated to the Hermes engine. It is really head for me to analyze or patch those applications. Therefore, I created hbctool for helping any pentester to test the Hermes bytecode.
Hermes is an open-source JavaScript engine optimized for running React Native apps on Android. For many apps, enabling Hermes will result in improved start-up time, decreased memory usage, and smaller app size. At this time Hermes is an opt-in React Native feature, and this guide explains how to enable it.


For more information, please visit:
https://suam.wtf/posts/react-native-application-static-analysis-en/
Forwarded from Hacker News
Amazon introduces Nova Chat, entering the arena with ChatGPT, Claude, Grok
Article, Comments