Forwarded from Mishaal's Android News Feed
🥷 Google is working on an "Intrustion Detection" feature for Android 16
This feature collects various device events for off-device investigation of potential device compromise.
More details on what info is collected👇
🔗 https://androidauthority.com/android-16-intrusion-detection-3550583/
(I've been tracking this one for a while (back when it was called "forensic service"), but there wasn't enough info for me to report on it. Fortunately, the latest Play Services update gave AssembleDebug enough details to go ahead.)
This feature collects various device events for off-device investigation of potential device compromise.
More details on what info is collected👇
🔗 https://androidauthority.com/android-16-intrusion-detection-3550583/
(I've been tracking this one for a while (back when it was called "forensic service"), but there wasn't enough info for me to report on it. Fortunately, the latest Play Services update gave AssembleDebug enough details to go ahead.)
Android Authority
Android 16 could introduce an Intrusion Detection feature (APK teardown)
Worried about your phone or Google account being hacked? Well, it looks like Android 16 will have an Intrusion Detection feature.
Forwarded from Mishaal's Android News Feed
🔐 Here's our first look at Android's new Advanced Protection Mode page!
As I've mentioned repeatedly, Android 16 is adding an Advanced Protection Mode feature that turns on several security features (like disabling sideloading and USB data connections when locked) as well as provides an API for third-party apps to turn on their own security measures.
Although the Advanced Protection Mode feature + API are available in the Android 16 betas, there's no user-facing way to turn it on. However, @AssembleDebug managed to get the APM page to show up in Play Services.
This is just a guess, but I think Google will announce APM at I/O and then roll it out with or soon after the Android 16 stable release. This doesn't need an OS update to QPR1 or later to work.
For a full breakdown, check out AssembleDebug's post on Android Authority👇
🔗 https://www.androidauthority.com/android-16-advanced-protection-mode-screenshots-3550119/
As I've mentioned repeatedly, Android 16 is adding an Advanced Protection Mode feature that turns on several security features (like disabling sideloading and USB data connections when locked) as well as provides an API for third-party apps to turn on their own security measures.
Although the Advanced Protection Mode feature + API are available in the Android 16 betas, there's no user-facing way to turn it on. However, @AssembleDebug managed to get the APM page to show up in Play Services.
This is just a guess, but I think Google will announce APM at I/O and then roll it out with or soon after the Android 16 stable release. This doesn't need an OS update to QPR1 or later to work.
For a full breakdown, check out AssembleDebug's post on Android Authority👇
🔗 https://www.androidauthority.com/android-16-advanced-protection-mode-screenshots-3550119/
No deleted account found from
52 scanned users from this group 🚫👻Forwarded from Hacker News
Linkedin
#hackerone #curl | Daniel Stenberg | 255 comments
That's it. I've had it. I'm putting my foot down on this craziness.
1. Every reporter submitting security reports on #Hackerone for #curl now needs to answer this question:
"Did you use an AI to find the problem or generate this submission?"
(and if they…
1. Every reporter submitting security reports on #Hackerone for #curl now needs to answer this question:
"Did you use an AI to find the problem or generate this submission?"
(and if they…
Forwarded from 🌐Journal NEO
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Mishaal's Android News Feed
🔁 Check your Pixel phone: the May 2025 security update is rolling out!
FYI: This is likely the final Android 15-based update for Pixel phones. The next update should bring Android 16!
More details on this update👇
🔗 https://www.androidauthority.com/pixel-may-2025-software-update-3554974/
Also be warned that if you have a Pixel 6 or Pixel 8 series device, this update increments the anti-roll back version for the bootloader.
This means that once you update, you CANNOT downgrade to an older release! Doing so will brick the device!
FYI: This is likely the final Android 15-based update for Pixel phones. The next update should bring Android 16!
More details on this update👇
🔗 https://www.androidauthority.com/pixel-may-2025-software-update-3554974/
Also be warned that if you have a Pixel 6 or Pixel 8 series device, this update increments the anti-roll back version for the bootloader.
This means that once you update, you CANNOT downgrade to an older release! Doing so will brick the device!
Android Authority
Google's May 2025 Pixel update fixes mic recording and Bluetooth pairing
Google is starting to rollout May 2025's Pixel software update. The rollout is happening in phases over the next week.
Forwarded from Hacker News
micahflee
Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs
💡Update May 18, 2025: I described TeleMessage's trivial vulnerability in an article for WIRED: How the knock-off Signal app used by Trump officials got hacked in 20 minutes
Update May 19, 2025: Uh oh: DDoSecrets publishes 410 GB of heap dumps, hacked from…
Update May 19, 2025: Uh oh: DDoSecrets publishes 410 GB of heap dumps, hacked from…
Forwarded from Libreware
PeerTube Mobile App v1 Is Out | Linuxiac
The PeerTube mobile app has reached version 1, allowing users to easily edit playlists, comment on videos, and switch between accounts
Sortie de la v1 de l'application mobile ! | JoinPeerTube
PeerTube | F-Droid - Free and Open Source Android App Repository
Go to the git page to get version 1.0 the F-Droid link is 0.6
https://framagit.org/framasoft/peertube/mobile-application/-/releases
Via @linuxgram
#PeerTube
The PeerTube mobile app has reached version 1, allowing users to easily edit playlists, comment on videos, and switch between accounts
Sortie de la v1 de l'application mobile ! | JoinPeerTube
PeerTube | F-Droid - Free and Open Source Android App Repository
Go to the git page to get version 1.0 the F-Droid link is 0.6
https://framagit.org/framasoft/peertube/mobile-application/-/releases
Via @linuxgram
#PeerTube
Forwarded from Libreware
Snap Safe
The camera that doesn’t rat you out.
Snap Safe is an #Android #camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device.
Key Features:
• Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
• Fully Encrypted – Shots are written to encrypted, app‑private storage.
• Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
• PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
• Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours.
• Granular Location – Add coarse, fine, or zero location data—your call.
• 100% Open Source – Auditable code in plain sight.
• Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
• Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
The camera that doesn’t rat you out.
Snap Safe is an #Android #camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device.
Key Features:
• Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
• Fully Encrypted – Shots are written to encrypted, app‑private storage.
• Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
• PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
• Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours.
• Granular Location – Add coarse, fine, or zero location data—your call.
• 100% Open Source – Auditable code in plain sight.
• Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
• Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
Forwarded from The Hacker News
⚖️ A U.S. jury just hit NSO Group with $168M in damages for using Pegasus spyware to hack WhatsApp users in 51 countries—including 456 in Mexico, 100 in India, and dozens more in Bahrain, Morocco & Pakistan.
Meta proved NSO used a zero-day in WhatsApp calls (CVE-2019-3568) to silently hack phones—no tap needed.
🔗 Details: https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html
Meta proved NSO used a zero-day in WhatsApp calls (CVE-2019-3568) to silently hack phones—no tap needed.
🔗 Details: https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html
Forwarded from The Hacker News
🧪 Looks like a harmless Discord dev tool…
But behind the scenes? Full remote access.
📦 A fake PyPI package has 11,574+ installs
💥 Still live. Still dangerous.
😨 You won’t believe how it bypasses firewalls.
And it’s not the only one.
👀 What else is hiding in your software stack?
Read the full uncovering by researchers: https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html
But behind the scenes? Full remote access.
📦 A fake PyPI package has 11,574+ installs
💥 Still live. Still dangerous.
😨 You won’t believe how it bypasses firewalls.
And it’s not the only one.
👀 What else is hiding in your software stack?
Read the full uncovering by researchers: https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html