Privacy + Secure Tech Corner Channel πŸ›‘οΈ
90 subscribers
6.66K photos
579 videos
530 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Hacker News
Builder.ai Collapses: $1.5B 'AI' Startup Exposed as 'Indians'
Article, Comments
JITA - Just in Time Assistant

JITA is a comprehensive productivity and task management application for Android that helps you organize your tasks, track your time, and enhance your focus.

πŸ”— Links:
- Download
- Screenshots
- Features
- Source code
Developer: Mansour Taghizadeh

❀️ Support the Project

If this project makes your life easier, here are a few quick ways to show some love:

⭐ Star the repo/app
β˜• Buy a coffee for the developer
πŸ›  Contribute code, issues, or pull-requests


🏷 Tags: #Android #Productivity
Media is too big
VIEW IN TELEGRAM
⚑How Do We Know They're Trying to Get Into Your Phone?
@takebackourtech

I was asked this directly β€” and the answer is simple: companies like Cellebrite market to law enforcement showing exactly which phones they can access. Their internal docs reveal that they can’t get into a Pixel running GrapheneOS without the pincode. That’s why we use this setup.

The Above Phone is built with the highest level of security available to the public.

Listen to the whole episode here: https://above.sh/egXSFK

β€”
✌️ MORE POSTS | πŸ—― CHAT GROUP | πŸ“© NEWSLETTER | XMPP
Follow
🫢 @takebackourtech
It has been proven that your phone keeps a log of all your locations during Airplane Mode. It still is receiving GPS signals. After the Airplane Mode is turned off, the log is then uploaded.

https://youtu.be/S35_BfymTgE
Forwarded from The Hacker News
🚨 Critical bugs in HPE StoreOnce | 9.8 CVSS flaw allows auth bypass + RCE as root.

πŸ‘€ One bug (CVE-2025-37093) lets attackers skip loginβ€”then chain others for full takeover.

Patch now if you're running pre-4.3.11 versions.

πŸ”— Full details: https://thehackernews.com/2025/06/hpe-issues-security-patch-for-storeonce.html
Forwarded from The Hacker News
🚨 New wave of supply chain attacks hits npm, PyPI & RubyGems.

Hackers are hiding malware in popular open-source packages to:

πŸ”» Steal crypto wallets
πŸ—‘οΈ Delete entire codebases
πŸ•΅οΈ Exfiltrate Telegram bot data

Full story & package list β†’ https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html
Forwarded from Winaero
Facebook and Yandex used their Android apps to deanonymize users. They were found secretly bypassing user privacy tools like incognito mode and cookie-clearing features on Android devices. They used hidden communication links between mobile apps (e.g., Facebook, Instagram, Yandex Maps) and browsers to track users by linking browser activity with device identifiers like Facebook accounts or Android Advertising IDs. This allowed them to identify users even in incognito mode or after deleting cookies. Additionally, open network ports created risks for malicious apps to exploit user data.

Chrome blocked the exploited WebRTC feature on May 17, prompting Meta to stop using localhost requests in Facebook Pixel scripts. Yandex had been using similar methods since 2017. These techniques worked in Chrome, Edge, and partially in Firefox but were blocked or restricted in DuckDuckGo and Brave. To prevent such abuses, new specifications like PNA and LNA are being developed to enhance private network security.
No deleted account found from 54 scanned users from this group πŸš«πŸ‘»
Forwarded from The Hacker News
🚨 70% of data leaks now happen in-browser.

Legacy DLP tools can’t see what your employees are copy-pasting into AI tools, Slack, or Gmail.

The browser is the new security perimeter.

Read why browser-centric DLP is now a must β†’ https://thehackernews.com/2025/06/your-saas-data-isnt-safe-why.html
Forwarded from The Hacker News
🚨 New Chaos RAT variant targets Linux & Windows users

Masquerading as a Linux network tool, the malware spreads via phishing to deploy crypto miners, steal data, and gain full device control.

πŸ”— Full report: https://thehackernews.com/2025/06/chaos-rat-malware-targets-windows-and.html
Forwarded from The Hacker News
Do you know how and where AI is running in your org? That customer service agent isn't just an LLMβ€”it's system prompts, tool calls, RAG data, user logs, and MCP servers.

Every untracked component = a breach waiting to happen.

Why AI asset sprawl goes way beyond model discovery β†’ https://thn.news/ai-assets-sprawl