No deleted account found from
52 scanned users from this group 🚫👻Forwarded from Hacker News
Linkedin
#hackerone #curl | Daniel Stenberg | 255 comments
That's it. I've had it. I'm putting my foot down on this craziness.
1. Every reporter submitting security reports on #Hackerone for #curl now needs to answer this question:
"Did you use an AI to find the problem or generate this submission?"
(and if they…
1. Every reporter submitting security reports on #Hackerone for #curl now needs to answer this question:
"Did you use an AI to find the problem or generate this submission?"
(and if they…
Forwarded from 🌐Journal NEO
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Mishaal's Android News Feed
🔁 Check your Pixel phone: the May 2025 security update is rolling out!
FYI: This is likely the final Android 15-based update for Pixel phones. The next update should bring Android 16!
More details on this update👇
🔗 https://www.androidauthority.com/pixel-may-2025-software-update-3554974/
Also be warned that if you have a Pixel 6 or Pixel 8 series device, this update increments the anti-roll back version for the bootloader.
This means that once you update, you CANNOT downgrade to an older release! Doing so will brick the device!
FYI: This is likely the final Android 15-based update for Pixel phones. The next update should bring Android 16!
More details on this update👇
🔗 https://www.androidauthority.com/pixel-may-2025-software-update-3554974/
Also be warned that if you have a Pixel 6 or Pixel 8 series device, this update increments the anti-roll back version for the bootloader.
This means that once you update, you CANNOT downgrade to an older release! Doing so will brick the device!
Android Authority
Google's May 2025 Pixel update fixes mic recording and Bluetooth pairing
Google is starting to rollout May 2025's Pixel software update. The rollout is happening in phases over the next week.
Forwarded from Hacker News
micahflee
Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs
💡Update May 18, 2025: I described TeleMessage's trivial vulnerability in an article for WIRED: How the knock-off Signal app used by Trump officials got hacked in 20 minutes
Update May 19, 2025: Uh oh: DDoSecrets publishes 410 GB of heap dumps, hacked from…
Update May 19, 2025: Uh oh: DDoSecrets publishes 410 GB of heap dumps, hacked from…
Forwarded from Libreware
PeerTube Mobile App v1 Is Out | Linuxiac
The PeerTube mobile app has reached version 1, allowing users to easily edit playlists, comment on videos, and switch between accounts
Sortie de la v1 de l'application mobile ! | JoinPeerTube
PeerTube | F-Droid - Free and Open Source Android App Repository
Go to the git page to get version 1.0 the F-Droid link is 0.6
https://framagit.org/framasoft/peertube/mobile-application/-/releases
Via @linuxgram
#PeerTube
The PeerTube mobile app has reached version 1, allowing users to easily edit playlists, comment on videos, and switch between accounts
Sortie de la v1 de l'application mobile ! | JoinPeerTube
PeerTube | F-Droid - Free and Open Source Android App Repository
Go to the git page to get version 1.0 the F-Droid link is 0.6
https://framagit.org/framasoft/peertube/mobile-application/-/releases
Via @linuxgram
#PeerTube
Forwarded from Libreware
Snap Safe
The camera that doesn’t rat you out.
Snap Safe is an #Android #camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device.
Key Features:
• Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
• Fully Encrypted – Shots are written to encrypted, app‑private storage.
• Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
• PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
• Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours.
• Granular Location – Add coarse, fine, or zero location data—your call.
• 100% Open Source – Auditable code in plain sight.
• Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
• Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
The camera that doesn’t rat you out.
Snap Safe is an #Android #camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device.
Key Features:
• Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
• Fully Encrypted – Shots are written to encrypted, app‑private storage.
• Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
• PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
• Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours.
• Granular Location – Add coarse, fine, or zero location data—your call.
• 100% Open Source – Auditable code in plain sight.
• Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
• Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
Forwarded from The Hacker News
⚖️ A U.S. jury just hit NSO Group with $168M in damages for using Pegasus spyware to hack WhatsApp users in 51 countries—including 456 in Mexico, 100 in India, and dozens more in Bahrain, Morocco & Pakistan.
Meta proved NSO used a zero-day in WhatsApp calls (CVE-2019-3568) to silently hack phones—no tap needed.
🔗 Details: https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html
Meta proved NSO used a zero-day in WhatsApp calls (CVE-2019-3568) to silently hack phones—no tap needed.
🔗 Details: https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html
Forwarded from The Hacker News
🧪 Looks like a harmless Discord dev tool…
But behind the scenes? Full remote access.
📦 A fake PyPI package has 11,574+ installs
💥 Still live. Still dangerous.
😨 You won’t believe how it bypasses firewalls.
And it’s not the only one.
👀 What else is hiding in your software stack?
Read the full uncovering by researchers: https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html
But behind the scenes? Full remote access.
📦 A fake PyPI package has 11,574+ installs
💥 Still live. Still dangerous.
😨 You won’t believe how it bypasses firewalls.
And it’s not the only one.
👀 What else is hiding in your software stack?
Read the full uncovering by researchers: https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html