Privacy + Secure Tech Corner Channel ๐Ÿ›ก๏ธ
90 subscribers
6.65K photos
579 videos
516 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from ATT โ€ข Tech News (sidharth)
India opens 6GHz spectrum for license-free WiFi use

In order to allow unlicensed use of technologies such as Wi-Fi 6E and Wi-Fi 7, the Indian government has released draft regulations to delicense the 5925โ€“6425 MHz segment of the 6 GHz spectrum.

Faster, low-latency Wi-Fi 6E is made possible by India's delicensing of the 6 GHz band, which also lowers internet costs, improves connectivity in rural areas, complies with international standards, and generates โ‚น25,000 crore in economic value. All of these factors promote innovation, competition, and digital inclusion throughout the nation.

Telecom operators are against the plan; arguing that the band should be set aside for 5G in order to comply with IMT-2020 standards, even though tech companies support it.

๐Ÿ”— CommunicationsToday
๐Ÿ‘จโ€๐Ÿ’ป @agamtechtricks
Zed

Zed is a high-performance, multiplayer code editor from the creators of Atom and Tree-sitter.

๐Ÿ”— Links:
- Installation
- Website
- Demo videos
- Source code
- Discord
Developers: Zed Industries

๐Ÿซ‚ Special thanks to @Vedant_s_d for recommending!

โค๏ธ Support the Project

If this project makes your life easier, here are a few quick ways to show some love:

โญ Star the repo/app
โ˜• Buy a coffee for the developer
๐Ÿ›  Contribute code, issues, or pull-requests


๐Ÿท Tags: #Linux #Windows #MacOS #Web #Coding
Forwarded from vx-underground
tl;dr rich crypto guy kidnapped, tortured, almost murdered. kidnapped demands the password, italian guy says fuck you

May 23rd, 2025, the New York Police Department, in the United States, released details on a cryptocurrency holder who was tortured for almost 3 weeks.

The unidentified victim, a 28 year old man from Italy, was kidnapped by John Woeltz (37) and Beatrice Folchi (24). Mr. Woeltz is a self-described cryptocurrency investor who rents a $40,000/month apartment in Manhattan.

For nearly 3 weeks Mr. Woeltz demanded credentials to the unidentified victims crypto assets. The victim refused.

Mr. Woeltz tied the victim with electrical cords, repeatedly used a taser while the victims feet were submerged in water, beat him, pistol whipped him, forced the victim to ingest narcotics, and repeatedly wielded an electric chainsaw to the victim asserting he would dismember him if he did not give Mr. Woeltz the credentials to his crypto assets. The victim received a large wound on one of his arms where Mr. Woeltz used the chainsaw against the victim. Mr. Woeltz also tied an Apple AirTag around the victims neck if the victim tried to escape.

The victim is believed to possess millions in various cryptocurrencies.

During the kidnapping Mr. Woeltz took photos of the victims with a polaroid camera with the intent on sending the photos to the victims friends or family.

Thankfully, and although details are scarce, the victim managed to escape Friday, May 23rd, the day in which the victim reported to police he would have been murdered.

Police reported that, upon entry to Mr. Woetlz apartment, they discovered a "blood-shoaked makeshift torture chamber".
WikWok

WikWok is a beautiful and functional app that transforms your Wikipedia reading experience into an engaging, TikTok-style article feed. Learn something new with every scroll!

๐Ÿ”— Links:
- Download
- Screenshots
- Features
- Source code
Developer: Konstantin (terrakok)

โค๏ธ Support the Project

If this project makes your life easier, here are a few quick ways to show some love:

โญ Star the repo/app
โ˜• Buy a coffee for the developer
๐Ÿ›  Contribute code, issues, or pull-requests


๐Ÿท Tags: #Learning #Android #Linux #Windows #MacOS
Forwarded from The Hacker News
๐Ÿšจ Fake installers, real threat โ€” Malware hidden in trojanized QQ Browser & LetsVPN setups drops Winos 4.0, a stealthy RAT built for memory-only attacks.

Signed with expired certs. Linked to Chinese-speaking targets & APT Silver Fox.

๐Ÿ‘€ Full scoop โ†’ https://thehackernews.com/2025/05/hackers-use-fake-vpn-and-browser-nsis.html