Forwarded from 🌐Journal NEO
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Mishaal's Android News Feed
🔁 Check your Pixel phone: the May 2025 security update is rolling out!
FYI: This is likely the final Android 15-based update for Pixel phones. The next update should bring Android 16!
More details on this update👇
🔗 https://www.androidauthority.com/pixel-may-2025-software-update-3554974/
Also be warned that if you have a Pixel 6 or Pixel 8 series device, this update increments the anti-roll back version for the bootloader.
This means that once you update, you CANNOT downgrade to an older release! Doing so will brick the device!
FYI: This is likely the final Android 15-based update for Pixel phones. The next update should bring Android 16!
More details on this update👇
🔗 https://www.androidauthority.com/pixel-may-2025-software-update-3554974/
Also be warned that if you have a Pixel 6 or Pixel 8 series device, this update increments the anti-roll back version for the bootloader.
This means that once you update, you CANNOT downgrade to an older release! Doing so will brick the device!
Android Authority
Google's May 2025 Pixel update fixes mic recording and Bluetooth pairing
Google is starting to rollout May 2025's Pixel software update. The rollout is happening in phases over the next week.
Forwarded from Hacker News
micahflee
Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs
💡Update May 18, 2025: I described TeleMessage's trivial vulnerability in an article for WIRED: How the knock-off Signal app used by Trump officials got hacked in 20 minutes
Update May 19, 2025: Uh oh: DDoSecrets publishes 410 GB of heap dumps, hacked from…
Update May 19, 2025: Uh oh: DDoSecrets publishes 410 GB of heap dumps, hacked from…
Forwarded from Libreware
PeerTube Mobile App v1 Is Out | Linuxiac
The PeerTube mobile app has reached version 1, allowing users to easily edit playlists, comment on videos, and switch between accounts
Sortie de la v1 de l'application mobile ! | JoinPeerTube
PeerTube | F-Droid - Free and Open Source Android App Repository
Go to the git page to get version 1.0 the F-Droid link is 0.6
https://framagit.org/framasoft/peertube/mobile-application/-/releases
Via @linuxgram
#PeerTube
The PeerTube mobile app has reached version 1, allowing users to easily edit playlists, comment on videos, and switch between accounts
Sortie de la v1 de l'application mobile ! | JoinPeerTube
PeerTube | F-Droid - Free and Open Source Android App Repository
Go to the git page to get version 1.0 the F-Droid link is 0.6
https://framagit.org/framasoft/peertube/mobile-application/-/releases
Via @linuxgram
#PeerTube
Forwarded from Libreware
Snap Safe
The camera that doesn’t rat you out.
Snap Safe is an #Android #camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device.
Key Features:
• Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
• Fully Encrypted – Shots are written to encrypted, app‑private storage.
• Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
• PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
• Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours.
• Granular Location – Add coarse, fine, or zero location data—your call.
• 100% Open Source – Auditable code in plain sight.
• Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
• Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
The camera that doesn’t rat you out.
Snap Safe is an #Android #camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device.
Key Features:
• Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
• Fully Encrypted – Shots are written to encrypted, app‑private storage.
• Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
• PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
• Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours.
• Granular Location – Add coarse, fine, or zero location data—your call.
• 100% Open Source – Auditable code in plain sight.
• Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
• Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
Forwarded from The Hacker News
⚖️ A U.S. jury just hit NSO Group with $168M in damages for using Pegasus spyware to hack WhatsApp users in 51 countries—including 456 in Mexico, 100 in India, and dozens more in Bahrain, Morocco & Pakistan.
Meta proved NSO used a zero-day in WhatsApp calls (CVE-2019-3568) to silently hack phones—no tap needed.
🔗 Details: https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html
Meta proved NSO used a zero-day in WhatsApp calls (CVE-2019-3568) to silently hack phones—no tap needed.
🔗 Details: https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html
Forwarded from The Hacker News
🧪 Looks like a harmless Discord dev tool…
But behind the scenes? Full remote access.
📦 A fake PyPI package has 11,574+ installs
💥 Still live. Still dangerous.
😨 You won’t believe how it bypasses firewalls.
And it’s not the only one.
👀 What else is hiding in your software stack?
Read the full uncovering by researchers: https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html
But behind the scenes? Full remote access.
📦 A fake PyPI package has 11,574+ installs
💥 Still live. Still dangerous.
😨 You won’t believe how it bypasses firewalls.
And it’s not the only one.
👀 What else is hiding in your software stack?
Read the full uncovering by researchers: https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html
Forwarded from Hacker News
Forwarded from Tech & Leaks Zone
BREAKING: Journalists Mishaal Rahman and Kamila exploited a security flaw to leak internal Google Pixel and Android details
Two well-known Android Authority journalists, Kamila Wojciechowska and Mishaal Rahman, are being accused of exploiting a vulnerability to get unauthorized access to dogfood builds (internal Google builds). This access reportedly allowed them to leak unreleased information about upcoming Pixel hardware and Android software features.
Instead of reporting the security flaw to Google, the two allegedly used it to publish "exclusive" stories and leaks based on confidential and unofficial builds. They gave the impression that Google supported their reporting, while hiding the fact that it was based on a serious vulnerability.
This raises serious concerns about how tech outlets get their information, as they are now crossing ethical lines to leak it.
Follow @TechLeaksZone
Two well-known Android Authority journalists, Kamila Wojciechowska and Mishaal Rahman, are being accused of exploiting a vulnerability to get unauthorized access to dogfood builds (internal Google builds). This access reportedly allowed them to leak unreleased information about upcoming Pixel hardware and Android software features.
Instead of reporting the security flaw to Google, the two allegedly used it to publish "exclusive" stories and leaks based on confidential and unofficial builds. They gave the impression that Google supported their reporting, while hiding the fact that it was based on a serious vulnerability.
This raises serious concerns about how tech outlets get their information, as they are now crossing ethical lines to leak it.
Follow @TechLeaksZone