Forwarded from The Hacker News
70% of top sites drop tracking cookies even after users say no.
That’s a lawsuit waiting to happen.
This guide shows CISOs how to catch hidden privacy failures before they cost you millions.
→ Fix it now: https://thehackernews.com/2025/05/cisos-guide-to-web-privacy-validation.html
That’s a lawsuit waiting to happen.
This guide shows CISOs how to catch hidden privacy failures before they cost you millions.
→ Fix it now: https://thehackernews.com/2025/05/cisos-guide-to-web-privacy-validation.html
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡ Energetics: Beyond the Five Senses
Part 1 of 3 – Energetics: The Future of Health
In the opening of my talk Energetics: The Future of Health at The People's Reset: Manifestation in Morelia, I lay the groundwork for understanding health through vibration and frequency. Our bodies aren’t just biochemical—they’re energetic.
Our known senses—and even those we’ve forgotten or suppressed—are tuned to vibrations. Your eyes and ears are antennas. Your perception is energy-based. Indigenous peoples once used these senses to detect water or navigate the land. What if we could reawaken that ability—and even enhance it with energy medicine?
🎥 Watch the full talk on Odysee.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Part 1 of 3 – Energetics: The Future of Health
In the opening of my talk Energetics: The Future of Health at The People's Reset: Manifestation in Morelia, I lay the groundwork for understanding health through vibration and frequency. Our bodies aren’t just biochemical—they’re energetic.
Our known senses—and even those we’ve forgotten or suppressed—are tuned to vibrations. Your eyes and ears are antennas. Your perception is energy-based. Indigenous peoples once used these senses to detect water or navigate the land. What if we could reawaken that ability—and even enhance it with energy medicine?
🎥 Watch the full talk on Odysee.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from The Hacker News
🚨 Malware is hiding in your dev tools. 70+ npm & VS Code packages were caught stealing data, wiping files, even triggering shutdowns.
Hackers used trusted names to slip through.
Your next install could be a trap.
→ Audit often.
→ Trust less.
🔗Read: https://thehackernews.com/2025/05/over-70-malicious-npm-and-vs-code.html
Hackers used trusted names to slip through.
Your next install could be a trap.
→ Audit often.
→ Trust less.
🔗Read: https://thehackernews.com/2025/05/over-70-malicious-npm-and-vs-code.html
No deleted account found from
55 scanned users from this group 🚫👻Signal’s privacy claims exposed! Mark37 dives into “SignalGate,” revealing cracks in the app’s “gold standard” narrative. From closed-source anti-spam systems to leadership ties with Big Tech and government, plus vulnerabilities flagged by the Pentagon, is Signal truly secure? Learn the truth and explore safer alternatives.
https://mark37.com/signal/
https://mark37.com/signal/
The board includes additional members with deep establishment ties:
Amba Kak: Rhodes Scholar (British Pilgrims Society), Oxford graduate, senior advisor to the U.S. Federal Trade Commission, and executive director of AI Now Institute (founded during Obama Administration)
Jay Sullivan: Yale graduate, worked at Twitter, Facebook, Mozilla, Microsoft, and Oracle
Katherine R. Maher: CEO of NPR, executive director of Wikimedia Foundation, Council on Foreign Relations member, UNICEF officer, World Bank advisor, and connected to multiple NGOs funded by USAID and the British Pilgrims Society
This leadership structure raises serious questions about Signal’s true allegiances and priorities. Can an organization led by figures so deeply embedded in establishment institutions and ideologies truly be committed to challenging government surveillance and corporate data collection?
Amba Kak: Rhodes Scholar (British Pilgrims Society), Oxford graduate, senior advisor to the U.S. Federal Trade Commission, and executive director of AI Now Institute (founded during Obama Administration)
Jay Sullivan: Yale graduate, worked at Twitter, Facebook, Mozilla, Microsoft, and Oracle
Katherine R. Maher: CEO of NPR, executive director of Wikimedia Foundation, Council on Foreign Relations member, UNICEF officer, World Bank advisor, and connected to multiple NGOs funded by USAID and the British Pilgrims Society
This leadership structure raises serious questions about Signal’s true allegiances and priorities. Can an organization led by figures so deeply embedded in establishment institutions and ideologies truly be committed to challenging government surveillance and corporate data collection?
The Closed-Source Anti-Spam System: A Necessary Evil or Concerning Vulnerability?
Signal’s messaging protocol and client apps (Android, iOS, desktop) are open-source and subject to regular security audits. However, there’s a critical component that isn’t: Signal’s anti-spam system.
To be fair, Signal’s justification for keeping this component closed-source is legitimate – preventing spammers from studying and circumventing it makes practical sense. The amount of data this specific component can theoretically access is also more limited than, for example, the core messaging infrastructure.
However, this closed-source element creates a blind spot that inherently weakens Signal’s security model and contradicts its promise of complete transparency. Without independent verification, users must simply trust Signal’s claims about what this system does and doesn’t do. When examining potential concerns, several scenarios emerge:
Metadata Collection: While likely limited in scope, the anti-spam system could still collect certain metadata (IP addresses, phone numbers, patterns of communication) and potentially retain it longer than communicated to users.
Account Flagging: The system could include mechanisms to flag specific accounts for additional monitoring or data collection, possibly at the request of government agencies. Since this component isn’t subject to public scrutiny, there’s no way to verify what criteria might trigger such flagging.
Infrastructure Vulnerabilities: Even if the anti-spam system itself doesn’t have malicious intent, its closed nature means vulnerabilities might go undetected, potentially allowing sophisticated attackers to compromise it.
The recent Pentagon warning about Russian hackers exploiting Signal vulnerabilities demonstrates that even supposedly secure systems can have unexpected weak points. The fundamental question becomes: can a system be truly secure when parts of it remain hidden from independent security researchers?
Signal’s messaging protocol and client apps (Android, iOS, desktop) are open-source and subject to regular security audits. However, there’s a critical component that isn’t: Signal’s anti-spam system.
To be fair, Signal’s justification for keeping this component closed-source is legitimate – preventing spammers from studying and circumventing it makes practical sense. The amount of data this specific component can theoretically access is also more limited than, for example, the core messaging infrastructure.
However, this closed-source element creates a blind spot that inherently weakens Signal’s security model and contradicts its promise of complete transparency. Without independent verification, users must simply trust Signal’s claims about what this system does and doesn’t do. When examining potential concerns, several scenarios emerge:
Metadata Collection: While likely limited in scope, the anti-spam system could still collect certain metadata (IP addresses, phone numbers, patterns of communication) and potentially retain it longer than communicated to users.
Account Flagging: The system could include mechanisms to flag specific accounts for additional monitoring or data collection, possibly at the request of government agencies. Since this component isn’t subject to public scrutiny, there’s no way to verify what criteria might trigger such flagging.
Infrastructure Vulnerabilities: Even if the anti-spam system itself doesn’t have malicious intent, its closed nature means vulnerabilities might go undetected, potentially allowing sophisticated attackers to compromise it.
The recent Pentagon warning about Russian hackers exploiting Signal vulnerabilities demonstrates that even supposedly secure systems can have unexpected weak points. The fundamental question becomes: can a system be truly secure when parts of it remain hidden from independent security researchers?
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Font Gallery
Font Gallery app showcases how different Font Families with their different variations (Style, Weight and Size) look. You could switch between light and dark modes and also compare different font families.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Aditya (adeeteya)
🏷 Tags: #Android #Linux #Windows #Website #Utilities
Font Gallery app showcases how different Font Families with their different variations (Style, Weight and Size) look. You could switch between light and dark modes and also compare different font families.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Aditya (adeeteya)
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #Linux #Windows #Website #Utilities
Forwarded from Tech & Leaks Zone
iQOO Neo 10 Launched in India
Specifications:
• 6.78" (2800x1260 px) 1.5K AMOLED Display
• 144Hz variable refresh rate
• 1.07 billion colors, HDR 10+
• 5500nits peak brightness
• 4320Hz PWM dimming
• Q1 independent graphics chip
• Snapdragon 8s Gen 4 SoC
• LPDDR5X Ultra RAM
• UFS 3.1 (128GB); UFS 4.1 (256/512GB)
• 7000mm² Ice Dome VC liquid cooling.
• 50MP main (LYT 600, OIS) + 8MP Ultrawide
• 32MP front camera
• In-display fingerprint sensor
• Stereo speakers; IP65 rated
• IR Blaster; USB-C 2.0
• 7000mAh battery; 120W flash charging
3 AndroidOS + 4yrs Security Patch
Pricing:
• 8GB+128GB= Rs. 31,999 (~375$)
• 8GB+256GB= Rs. 33,999 (~400$)
• 12GB+256GB= Rs. 35,999 (~425$)
• 16GB+512GB= Rs. 40,999 (~500$)
Follow @TechLeaksZone
Specifications:
• 6.78" (2800x1260 px) 1.5K AMOLED Display
• 144Hz variable refresh rate
• 1.07 billion colors, HDR 10+
• 5500nits peak brightness
• 4320Hz PWM dimming
• Q1 independent graphics chip
• Snapdragon 8s Gen 4 SoC
• LPDDR5X Ultra RAM
• UFS 3.1 (128GB); UFS 4.1 (256/512GB)
• 7000mm² Ice Dome VC liquid cooling.
• 50MP main (LYT 600, OIS) + 8MP Ultrawide
• 32MP front camera
• In-display fingerprint sensor
• Stereo speakers; IP65 rated
• IR Blaster; USB-C 2.0
• 7000mAh battery; 120W flash charging
3 AndroidOS + 4yrs Security Patch
Pricing:
• 8GB+128GB= Rs. 31,999 (~375$)
• 8GB+256GB= Rs. 33,999 (~400$)
• 12GB+256GB= Rs. 35,999 (~425$)
• 16GB+512GB= Rs. 40,999 (~500$)
Follow @TechLeaksZone
#xmpp #im criticisms:
You can follow any advise on the client XMPP setup but the main issue with the protocol is not your endpoint. The issue is the is the XMPP protocol and related infrastructure.
There are two things you wana do
1. content of the message (privacy setup),
2. identity (anonymity setup)
Don't mistake those two things!!
Privacy
is ensured on XMPP with the OTR or OMEMO encryption. The issue is that the key exchange in between the communication parties is not foolproof. You both *MUST* check the fingerprints through a separate secure channel. This is in large scale not practiced. If you don't check it right, the underlying infrastructure of the XMPP allows the adversary to MITM you and read your messages.
2 Anonymity
is ensured with Tor here. Tor tries to conceal you IP only and nothing more. But Tor, as a low latency network, cannot protect you from revealing your behavioral patterns, your social graph, your login and log out time, the number of messages sent and received at any time, the sender and receiver of the messages, their precise volume and so on *from the XMPP server* and any adversary that can monitor that server.
Our advice is - don't use XMPP! if possible at all and use something more resistant like SimpleX, Briar, CWTCH... and similar solutions that mitigate those leaks and diminish or even make impossible those related attacks from the active as well as passive adversaries.
You can follow any advise on the client XMPP setup but the main issue with the protocol is not your endpoint. The issue is the is the XMPP protocol and related infrastructure.
There are two things you wana do
1. content of the message (privacy setup),
2. identity (anonymity setup)
Don't mistake those two things!!
Privacy
is ensured on XMPP with the OTR or OMEMO encryption. The issue is that the key exchange in between the communication parties is not foolproof. You both *MUST* check the fingerprints through a separate secure channel. This is in large scale not practiced. If you don't check it right, the underlying infrastructure of the XMPP allows the adversary to MITM you and read your messages.
2 Anonymity
is ensured with Tor here. Tor tries to conceal you IP only and nothing more. But Tor, as a low latency network, cannot protect you from revealing your behavioral patterns, your social graph, your login and log out time, the number of messages sent and received at any time, the sender and receiver of the messages, their precise volume and so on *from the XMPP server* and any adversary that can monitor that server.
Our advice is - don't use XMPP! if possible at all and use something more resistant like SimpleX, Briar, CWTCH... and similar solutions that mitigate those leaks and diminish or even make impossible those related attacks from the active as well as passive adversaries.
Forwarded from Tech & Leaks Zone
Lenovo Legion Tab Y700 Launched in China
It can transform into a handheld gaming console when you attach the G9 game controller.
It features Central cooling architecture 2.0, so it can handle high load without getting hot, thanks to 12000mm² large VC Stereo three-channel liquid cooling and VC 7-layer composite cooling system with 41356mm² total cooling area.
Specifications:
• 8.8-inch (3040x1904 px) LCD Display
• 165Hz variable refresh rate
• 600nits brightness
• 16:10 aspect ratio
• 10x Touch Resolution
• 68.7 Billion colors display
• Snapdragon 8 Elite SoC
• LPDDR5X Ultra RAM; UFS 4.1 storage
• Upto 2TB MicroSD Card Slot
• 50MP main single rear camera
• 8MP front camera
• 7600mAh battery with 68W fast charging
• Dolby Atmos; Dual X-axis Linear Motor
• DisplayPort support
• 2 x 1W super linear speakers
• 1x USB-C 3.2 Gen 2
• 1x USB-C 2.0
Pricing:
• 12GB+256GB= 3299 CNY (~455$)
• 16GB+512GB= 3799 CNY (~525$)
G9 game controller: 499 CNY (~70$)
Follow @TechLeaksZone
It can transform into a handheld gaming console when you attach the G9 game controller.
It features Central cooling architecture 2.0, so it can handle high load without getting hot, thanks to 12000mm² large VC Stereo three-channel liquid cooling and VC 7-layer composite cooling system with 41356mm² total cooling area.
Specifications:
• 8.8-inch (3040x1904 px) LCD Display
• 165Hz variable refresh rate
• 600nits brightness
• 16:10 aspect ratio
• 10x Touch Resolution
• 68.7 Billion colors display
• Snapdragon 8 Elite SoC
• LPDDR5X Ultra RAM; UFS 4.1 storage
• Upto 2TB MicroSD Card Slot
• 50MP main single rear camera
• 8MP front camera
• 7600mAh battery with 68W fast charging
• Dolby Atmos; Dual X-axis Linear Motor
• DisplayPort support
• 2 x 1W super linear speakers
• 1x USB-C 3.2 Gen 2
• 1x USB-C 2.0
Pricing:
• 12GB+256GB= 3299 CNY (~455$)
• 16GB+512GB= 3799 CNY (~525$)
G9 game controller: 499 CNY (~70$)
Follow @TechLeaksZone