Forwarded from Gizchina.com
Do You Even Game? RedMagic 10S Pro+ Says You’re Not Hardcore Enough
https://www.gizchina.com/2025/05/26/do-you-even-game-redmagic-10s-pro-says-youre-not-hardcore-enough/
https://www.gizchina.com/2025/05/26/do-you-even-game-redmagic-10s-pro-says-youre-not-hardcore-enough/
Forwarded from The Great Imperial Interdimensional Multiversal Holy DAO of NoGoolag (NoGoolag)
Steampowered
SteamOS
SteamOS is Valve’s Linux-based operating system. It features a seamless user experience optimized for gaming, while retaining access to the power and flexibility of a PC, and plays tens of thousands of games on Steam. SteamOS officially ships on Steam Deck…
Forwarded from Hacker News
Forwarded from Hacker News
Dan Q
Google Shared My Phone Number!
When people started calling my personal mobile number with questions about a voluntary organisation I'm involved with, I was confused: we weren't sharing that number. It turns out that Google had decided to take the number I used to verify my identity for…
Forwarded from 4U Tech
🚀 Rising OS 7.0 custom gsi rom any device 🌟 best of roms
https://youtu.be/sVA1gtvw3fU
With new exciting features for all devices out now ⚡
https://youtu.be/sVA1gtvw3fU
With new exciting features for all devices out now ⚡
YouTube
🚀 Rising OS 7.0 custom gsi rom any device 🌟 best of roms
Hey what's up guys welcome back you are watching 4U tech so finally highly customizable custom rom rising OS started to roll out there new update rising os 7.0 persis
So all maintainers of rising os team releasing there official update for official devices…
So all maintainers of rising os team releasing there official update for official devices…
Forwarded from The Hacker News
70% of top sites drop tracking cookies even after users say no.
That’s a lawsuit waiting to happen.
This guide shows CISOs how to catch hidden privacy failures before they cost you millions.
→ Fix it now: https://thehackernews.com/2025/05/cisos-guide-to-web-privacy-validation.html
That’s a lawsuit waiting to happen.
This guide shows CISOs how to catch hidden privacy failures before they cost you millions.
→ Fix it now: https://thehackernews.com/2025/05/cisos-guide-to-web-privacy-validation.html
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡ Energetics: Beyond the Five Senses
Part 1 of 3 – Energetics: The Future of Health
In the opening of my talk Energetics: The Future of Health at The People's Reset: Manifestation in Morelia, I lay the groundwork for understanding health through vibration and frequency. Our bodies aren’t just biochemical—they’re energetic.
Our known senses—and even those we’ve forgotten or suppressed—are tuned to vibrations. Your eyes and ears are antennas. Your perception is energy-based. Indigenous peoples once used these senses to detect water or navigate the land. What if we could reawaken that ability—and even enhance it with energy medicine?
🎥 Watch the full talk on Odysee.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Part 1 of 3 – Energetics: The Future of Health
In the opening of my talk Energetics: The Future of Health at The People's Reset: Manifestation in Morelia, I lay the groundwork for understanding health through vibration and frequency. Our bodies aren’t just biochemical—they’re energetic.
Our known senses—and even those we’ve forgotten or suppressed—are tuned to vibrations. Your eyes and ears are antennas. Your perception is energy-based. Indigenous peoples once used these senses to detect water or navigate the land. What if we could reawaken that ability—and even enhance it with energy medicine?
🎥 Watch the full talk on Odysee.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from The Hacker News
🚨 Malware is hiding in your dev tools. 70+ npm & VS Code packages were caught stealing data, wiping files, even triggering shutdowns.
Hackers used trusted names to slip through.
Your next install could be a trap.
→ Audit often.
→ Trust less.
🔗Read: https://thehackernews.com/2025/05/over-70-malicious-npm-and-vs-code.html
Hackers used trusted names to slip through.
Your next install could be a trap.
→ Audit often.
→ Trust less.
🔗Read: https://thehackernews.com/2025/05/over-70-malicious-npm-and-vs-code.html
No deleted account found from
55 scanned users from this group 🚫👻Signal’s privacy claims exposed! Mark37 dives into “SignalGate,” revealing cracks in the app’s “gold standard” narrative. From closed-source anti-spam systems to leadership ties with Big Tech and government, plus vulnerabilities flagged by the Pentagon, is Signal truly secure? Learn the truth and explore safer alternatives.
https://mark37.com/signal/
https://mark37.com/signal/
The board includes additional members with deep establishment ties:
Amba Kak: Rhodes Scholar (British Pilgrims Society), Oxford graduate, senior advisor to the U.S. Federal Trade Commission, and executive director of AI Now Institute (founded during Obama Administration)
Jay Sullivan: Yale graduate, worked at Twitter, Facebook, Mozilla, Microsoft, and Oracle
Katherine R. Maher: CEO of NPR, executive director of Wikimedia Foundation, Council on Foreign Relations member, UNICEF officer, World Bank advisor, and connected to multiple NGOs funded by USAID and the British Pilgrims Society
This leadership structure raises serious questions about Signal’s true allegiances and priorities. Can an organization led by figures so deeply embedded in establishment institutions and ideologies truly be committed to challenging government surveillance and corporate data collection?
Amba Kak: Rhodes Scholar (British Pilgrims Society), Oxford graduate, senior advisor to the U.S. Federal Trade Commission, and executive director of AI Now Institute (founded during Obama Administration)
Jay Sullivan: Yale graduate, worked at Twitter, Facebook, Mozilla, Microsoft, and Oracle
Katherine R. Maher: CEO of NPR, executive director of Wikimedia Foundation, Council on Foreign Relations member, UNICEF officer, World Bank advisor, and connected to multiple NGOs funded by USAID and the British Pilgrims Society
This leadership structure raises serious questions about Signal’s true allegiances and priorities. Can an organization led by figures so deeply embedded in establishment institutions and ideologies truly be committed to challenging government surveillance and corporate data collection?
The Closed-Source Anti-Spam System: A Necessary Evil or Concerning Vulnerability?
Signal’s messaging protocol and client apps (Android, iOS, desktop) are open-source and subject to regular security audits. However, there’s a critical component that isn’t: Signal’s anti-spam system.
To be fair, Signal’s justification for keeping this component closed-source is legitimate – preventing spammers from studying and circumventing it makes practical sense. The amount of data this specific component can theoretically access is also more limited than, for example, the core messaging infrastructure.
However, this closed-source element creates a blind spot that inherently weakens Signal’s security model and contradicts its promise of complete transparency. Without independent verification, users must simply trust Signal’s claims about what this system does and doesn’t do. When examining potential concerns, several scenarios emerge:
Metadata Collection: While likely limited in scope, the anti-spam system could still collect certain metadata (IP addresses, phone numbers, patterns of communication) and potentially retain it longer than communicated to users.
Account Flagging: The system could include mechanisms to flag specific accounts for additional monitoring or data collection, possibly at the request of government agencies. Since this component isn’t subject to public scrutiny, there’s no way to verify what criteria might trigger such flagging.
Infrastructure Vulnerabilities: Even if the anti-spam system itself doesn’t have malicious intent, its closed nature means vulnerabilities might go undetected, potentially allowing sophisticated attackers to compromise it.
The recent Pentagon warning about Russian hackers exploiting Signal vulnerabilities demonstrates that even supposedly secure systems can have unexpected weak points. The fundamental question becomes: can a system be truly secure when parts of it remain hidden from independent security researchers?
Signal’s messaging protocol and client apps (Android, iOS, desktop) are open-source and subject to regular security audits. However, there’s a critical component that isn’t: Signal’s anti-spam system.
To be fair, Signal’s justification for keeping this component closed-source is legitimate – preventing spammers from studying and circumventing it makes practical sense. The amount of data this specific component can theoretically access is also more limited than, for example, the core messaging infrastructure.
However, this closed-source element creates a blind spot that inherently weakens Signal’s security model and contradicts its promise of complete transparency. Without independent verification, users must simply trust Signal’s claims about what this system does and doesn’t do. When examining potential concerns, several scenarios emerge:
Metadata Collection: While likely limited in scope, the anti-spam system could still collect certain metadata (IP addresses, phone numbers, patterns of communication) and potentially retain it longer than communicated to users.
Account Flagging: The system could include mechanisms to flag specific accounts for additional monitoring or data collection, possibly at the request of government agencies. Since this component isn’t subject to public scrutiny, there’s no way to verify what criteria might trigger such flagging.
Infrastructure Vulnerabilities: Even if the anti-spam system itself doesn’t have malicious intent, its closed nature means vulnerabilities might go undetected, potentially allowing sophisticated attackers to compromise it.
The recent Pentagon warning about Russian hackers exploiting Signal vulnerabilities demonstrates that even supposedly secure systems can have unexpected weak points. The fundamental question becomes: can a system be truly secure when parts of it remain hidden from independent security researchers?
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Font Gallery
Font Gallery app showcases how different Font Families with their different variations (Style, Weight and Size) look. You could switch between light and dark modes and also compare different font families.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Aditya (adeeteya)
🏷 Tags: #Android #Linux #Windows #Website #Utilities
Font Gallery app showcases how different Font Families with their different variations (Style, Weight and Size) look. You could switch between light and dark modes and also compare different font families.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Aditya (adeeteya)
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #Linux #Windows #Website #Utilities
Forwarded from Tech & Leaks Zone
iQOO Neo 10 Launched in India
Specifications:
• 6.78" (2800x1260 px) 1.5K AMOLED Display
• 144Hz variable refresh rate
• 1.07 billion colors, HDR 10+
• 5500nits peak brightness
• 4320Hz PWM dimming
• Q1 independent graphics chip
• Snapdragon 8s Gen 4 SoC
• LPDDR5X Ultra RAM
• UFS 3.1 (128GB); UFS 4.1 (256/512GB)
• 7000mm² Ice Dome VC liquid cooling.
• 50MP main (LYT 600, OIS) + 8MP Ultrawide
• 32MP front camera
• In-display fingerprint sensor
• Stereo speakers; IP65 rated
• IR Blaster; USB-C 2.0
• 7000mAh battery; 120W flash charging
3 AndroidOS + 4yrs Security Patch
Pricing:
• 8GB+128GB= Rs. 31,999 (~375$)
• 8GB+256GB= Rs. 33,999 (~400$)
• 12GB+256GB= Rs. 35,999 (~425$)
• 16GB+512GB= Rs. 40,999 (~500$)
Follow @TechLeaksZone
Specifications:
• 6.78" (2800x1260 px) 1.5K AMOLED Display
• 144Hz variable refresh rate
• 1.07 billion colors, HDR 10+
• 5500nits peak brightness
• 4320Hz PWM dimming
• Q1 independent graphics chip
• Snapdragon 8s Gen 4 SoC
• LPDDR5X Ultra RAM
• UFS 3.1 (128GB); UFS 4.1 (256/512GB)
• 7000mm² Ice Dome VC liquid cooling.
• 50MP main (LYT 600, OIS) + 8MP Ultrawide
• 32MP front camera
• In-display fingerprint sensor
• Stereo speakers; IP65 rated
• IR Blaster; USB-C 2.0
• 7000mAh battery; 120W flash charging
3 AndroidOS + 4yrs Security Patch
Pricing:
• 8GB+128GB= Rs. 31,999 (~375$)
• 8GB+256GB= Rs. 33,999 (~400$)
• 12GB+256GB= Rs. 35,999 (~425$)
• 16GB+512GB= Rs. 40,999 (~500$)
Follow @TechLeaksZone