Forwarded from Tech & Leaks Zone
Direct Proof that Mishaal and Kamila Leveraged Security Loophole for Android Leaks
In the chat conversation, Mishaal admitted that he was running dogfood builds on his Pixel 8 Pro. To exploit the vulnerability, he used a tool which even allowed him to set his serial number & thus get access to internal builds.
Later, Mishaal admits he knows "someone" who also found this loophole and it would be a "shame" if Google closes it likely because this is the only way he "exclusively" leaks about upcoming Google Pixel or Android features.
He was worried that Google might investigate & find out he had early access to Pixel 10 firmware alongside Kamila. Kamila and their "friend" even sent dogfood build screenshots in Pebble's discord server likely to "flex" as Pebble is owned by Google.
Mishaal also enlightened another person how to leak information safely. He acknowledged that he knows someone with access to the partner repos despite actually running dogfood. At the end when someone would ask about the source, Mishaal mentions that HE WILL DENY using a "Loophole" for getting information by saying that their sources are someone form google, in short: Plausible deniability.
Follow @TechLeaksZone
In the chat conversation, Mishaal admitted that he was running dogfood builds on his Pixel 8 Pro. To exploit the vulnerability, he used a tool which even allowed him to set his serial number & thus get access to internal builds.
Later, Mishaal admits he knows "someone" who also found this loophole and it would be a "shame" if Google closes it likely because this is the only way he "exclusively" leaks about upcoming Google Pixel or Android features.
He was worried that Google might investigate & find out he had early access to Pixel 10 firmware alongside Kamila. Kamila and their "friend" even sent dogfood build screenshots in Pebble's discord server likely to "flex" as Pebble is owned by Google.
Mishaal also enlightened another person how to leak information safely. He acknowledged that he knows someone with access to the partner repos despite actually running dogfood. At the end when someone would ask about the source, Mishaal mentions that HE WILL DENY using a "Loophole" for getting information by saying that their sources are someone form google, in short: Plausible deniability.
Follow @TechLeaksZone
No deleted account found from
52 scanned users from this group 🚫👻Forwarded from Gizchina.com
Android 16 Beta 3 Now Available on Honor Magic 7 Pro
https://www.gizchina.com/2025/05/07/android-16-beta-3-now-available-on-honor-magic-7-pro/
https://www.gizchina.com/2025/05/07/android-16-beta-3-now-available-on-honor-magic-7-pro/
Forwarded from ATT • Tech News (Agam)
CLion is Now Free for Non-Commercial Use
CLion has now joined RustRover, Rider and WebStorm in being free for non-commercial use only, with the community version of Code with Me.
Non-commercial subscriptions are issued for one year and renew automatically if the license is used at least once in the last 6 months.
Commercial projects still require a paid license. If you’re using a non-commercial license, you cannot opt out of the collection of anonymous usage statistics.
💻 Download: CLion
🔗 JetBrains
🧑💻 @agamtechtricks
CLion has now joined RustRover, Rider and WebStorm in being free for non-commercial use only, with the community version of Code with Me.
Non-commercial subscriptions are issued for one year and renew automatically if the license is used at least once in the last 6 months.
Commercial projects still require a paid license. If you’re using a non-commercial license, you cannot opt out of the collection of anonymous usage statistics.
💻 Download: CLion
🔗 JetBrains
🧑💻 @agamtechtricks
Forwarded from #TBOT: Take Back Our Tech
My last interview with Corbett brought out a few blackpilled people in the comments.
These people believe that:
- most if not all devices are completely compromised with hardware backdoors
- theres no such thing as privacy on the internet
- you can't escape from digital surveillance
I'm always going to keep fighting for our right to privacy and freedom when it comes to our technology, and this topic got me thinking.
For one, I think most people are fine simply by opting out of the consensual surveillance layers like big tech phones, devices, and social media. All software level stuff. These are the lazy ways we give away all of our data in mass.
Hardware backdoors are plausible but theres no evidence on their use in the wild. We don't know how easy it is to deploy, or if its feasible on a mass scale, or what an attack on a single device might cost in equipment and manpower.
It could cost a lot of time and money to backdoor a network of targetd. Even lesser spyware like NSO costs tens of thousands per infection.
I'm going to maintain that opting out of consensual surveillance is enough protection for 99.9% of people.
I also think we shouldnt assume we can be exploited or surveilled without clear evidence, such as primary reporting, information brought up in courts, or verified independently.
Even the PRISM leaks on big tech collusion at the end of the day was just a single PowerPoint slide.
Would they lie to make us believe they see and hear everything? Or is it more likely these companies are working in concert?
What do y'all think? Is it all hopeless with technology? Are you a blackpiller?
Do you think theres a way we can protect ourselves? Is there a reason why theres laws pushing to ban encryption, VPNs, and private crypto?
Can our connection remain sacred?
These people believe that:
- most if not all devices are completely compromised with hardware backdoors
- theres no such thing as privacy on the internet
- you can't escape from digital surveillance
I'm always going to keep fighting for our right to privacy and freedom when it comes to our technology, and this topic got me thinking.
For one, I think most people are fine simply by opting out of the consensual surveillance layers like big tech phones, devices, and social media. All software level stuff. These are the lazy ways we give away all of our data in mass.
Hardware backdoors are plausible but theres no evidence on their use in the wild. We don't know how easy it is to deploy, or if its feasible on a mass scale, or what an attack on a single device might cost in equipment and manpower.
It could cost a lot of time and money to backdoor a network of targetd. Even lesser spyware like NSO costs tens of thousands per infection.
I'm going to maintain that opting out of consensual surveillance is enough protection for 99.9% of people.
I also think we shouldnt assume we can be exploited or surveilled without clear evidence, such as primary reporting, information brought up in courts, or verified independently.
Even the PRISM leaks on big tech collusion at the end of the day was just a single PowerPoint slide.
Would they lie to make us believe they see and hear everything? Or is it more likely these companies are working in concert?
What do y'all think? Is it all hopeless with technology? Are you a blackpiller?
Do you think theres a way we can protect ourselves? Is there a reason why theres laws pushing to ban encryption, VPNs, and private crypto?
Can our connection remain sacred?
Forwarded from Bones' Tech Garage
A good read, and of course do not try this at home.
https://www.xda-developers.com/set-up-ssh-honeypot-internet-scary/
https://www.xda-developers.com/set-up-ssh-honeypot-internet-scary/
XDA
I set up an SSH honeypot, and the internet is a scary place
Don't try this at home.
Forwarded from Hacker News
OpenSearch
OpenSearch 3.0 Enhances Vector Database Performance, Search Infrastructure and Scalability to Meet AI-driven Demand - OpenSearch
The OpenSearch Software Foundation today announced the general availability of OpenSearch 3.0. This major release delivers a 9.5x performance improvement over OpenSearch 1.3, building on benchmarking data that showed earlier iterations of OpenSearch operating…