Forwarded from Hacker News
Techlog
How much EU is in DNS4EU?
This is another post that started after several toots on mastodon. Most of the things presented here were already tooted by other people, but I think this is a good chance to write a mini tutorial about what to look at. We’ll use DNS, whois, BGP and your…
Forwarded from Hacker News
Kobzol’s blog
Why doesn’t Rust care more about compiler performance?
Perhaps the most often repeated complaint about Rust is its slow feedback loop and long compilation times. I hear about it all the time; in Rust podcasts, blog posts, surveys, conference talks or offline discussions. I also regularly complain about it, being…
Forwarded from Hacker News
AP News
US-backed Israeli company's spyware used to target European journalists, Citizen Lab finds
New revelations that spyware made by a U.S-backed Israeli company was used against at least three European journalists have raised concerns about abuse of commercial spyware even in democratic countries.
Forwarded from Mystic Leaks
Media is too big
VIEW IN TELEGRAM
Remember when we talked about Pixel Sense in one of our previous leaks?
Well. Screw it. Google has changed its mind since then.
The brand-new Pixel 10 series exclusive AI feature is now getting renamed: Welcome, Magic Cue!
Magic Cue is the spiritual successor of the now-deprecated "Pixel Sense" assistant. While most of its features were already leaked beforehand, here you have a sneak peak at how the (hopefully) final setup page looks like.
What's your perception of Magic Cue? Is it useful or just spyware? Let us know down below!
Well. Screw it. Google has changed its mind since then.
The brand-new Pixel 10 series exclusive AI feature is now getting renamed: Welcome, Magic Cue!
Magic Cue is the spiritual successor of the now-deprecated "Pixel Sense" assistant. While most of its features were already leaked beforehand, here you have a sneak peak at how the (hopefully) final setup page looks like.
What's your perception of Magic Cue? Is it useful or just spyware? Let us know down below!
Forwarded from Tech & Leaks Zone
BREAKING: Another Linux Smartphone Enters The Market. Meet Liberux NEXX
Liberux NEXX is a phone built on LiberuxOS, based on Debian 13 Linux Distro. Liberux NEXX will never track your activity, collect your data or compromise your privacy. All source code will be available for you to further customize your system or even build alternative versions. NEXX grants you a full ARM Linux system, including Android OS, which would allow you to install applications for this environment without compromising your privacy.
CPU: Rockchip RK3588S
• 8-cores, 64-bit
• 4×Cortex-A76 (upto 2.4GHz)
• 4×Cortex-A55
Manufactured by TSMC on 8nm process
GPU: ARM Mali-G610
• 4-cores MP4 (450 GFLOPS)
Modem: Snapdragon X62 5G
RAM: upto 32GB LPDDR4X
ROM: upto 512GB emmC
upto 2TB SD Card support
• 6.34-inch (2400x1080 px) FHD+ OLED Display
• Gorilla Glass protection
• 32MP Single rear camera
• 13MP Front camera
• 5300mAh battery
• Rear fingerprint sensor
• 3.5mm headphone jack
• 2x USB-C 3.1 port
Audio Codec: ALC5640-VB-CG
Amplifier: AW8737SCSR
Wi-Fi/BT: AW-CM256SM (BT 5.0)
5 years of Upgrades
NEXX also supports GNOME Shell Mobile and contains 3 KILL SWITCHES — for Microphone/ camera, Wi-Fi/BT and Signal. When all 3 switches are flipped down, they also disable additional components like the GNSS unit (GPS + satellite systems), the IMU (accelerometer, gyroscope, magnetometer), and ambient & proximity sensors.
Liberux Team is also developing a gadget that, when connected to a monitor, keyboard, and mouse, will enable "wireless" connectivity to them. The smartphone is still under crowdfunding and will start shipping worldwide in July 2026.
The base model comes with 8GB+128GB+LTE and costs 790€. Since Liberux NEXX has been designed with a modular architecture, you can upgrade the RAM, storage & modem.
Storage: 256 GB (+45 €); 512 GB (+150 €)
RAM: 16 GB (+100 €); 32 GB (+250 €)
5G Modem: +120 €
Liberux 2TB MicroSD Card: +250€
Follow @TechLeaksZone
Liberux NEXX is a phone built on LiberuxOS, based on Debian 13 Linux Distro. Liberux NEXX will never track your activity, collect your data or compromise your privacy. All source code will be available for you to further customize your system or even build alternative versions. NEXX grants you a full ARM Linux system, including Android OS, which would allow you to install applications for this environment without compromising your privacy.
CPU: Rockchip RK3588S
• 8-cores, 64-bit
• 4×Cortex-A76 (upto 2.4GHz)
• 4×Cortex-A55
Manufactured by TSMC on 8nm process
GPU: ARM Mali-G610
• 4-cores MP4 (450 GFLOPS)
Modem: Snapdragon X62 5G
RAM: upto 32GB LPDDR4X
ROM: upto 512GB emmC
upto 2TB SD Card support
• 6.34-inch (2400x1080 px) FHD+ OLED Display
• Gorilla Glass protection
• 32MP Single rear camera
• 13MP Front camera
• 5300mAh battery
• Rear fingerprint sensor
• 3.5mm headphone jack
• 2x USB-C 3.1 port
Audio Codec: ALC5640-VB-CG
Amplifier: AW8737SCSR
Wi-Fi/BT: AW-CM256SM (BT 5.0)
5 years of Upgrades
NEXX also supports GNOME Shell Mobile and contains 3 KILL SWITCHES — for Microphone/ camera, Wi-Fi/BT and Signal. When all 3 switches are flipped down, they also disable additional components like the GNSS unit (GPS + satellite systems), the IMU (accelerometer, gyroscope, magnetometer), and ambient & proximity sensors.
Liberux Team is also developing a gadget that, when connected to a monitor, keyboard, and mouse, will enable "wireless" connectivity to them. The smartphone is still under crowdfunding and will start shipping worldwide in July 2026.
The base model comes with 8GB+128GB+LTE and costs 790€. Since Liberux NEXX has been designed with a modular architecture, you can upgrade the RAM, storage & modem.
Storage: 256 GB (+45 €); 512 GB (+150 €)
RAM: 16 GB (+100 €); 32 GB (+250 €)
5G Modem: +120 €
Liberux 2TB MicroSD Card: +250€
Follow @TechLeaksZone
Forwarded from Tech & Leaks Zone
Google services alongside AWS and Cloudfare are facing partial outage.
Forwarded from Tech & Leaks Zone
AMD Developer Community Discord Announced
You can connect with fellow developers and AMD staff and throw your questions on maybe why it sucks. You can even ask questions and share ideas about Game Dev, AI Dev and more!
Discord link: https://discord.gg/amd-dev
You can connect with fellow developers and AMD staff and throw your questions on maybe why it sucks. You can even ask questions and share ideas about Game Dev, AI Dev and more!
Discord link: https://discord.gg/amd-dev
Forwarded from The Hacker News
VexTrio’s cybercrime network hijacks hundreds of thousands of websites to spread scams & malware through fake ads and push alerts.
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on ↓ https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on ↓ https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
Forwarded from NoGoolag
OSINT via Bluetooth: how Android devices give away the owner
For reasons unknown to me, Bluetooth is still considered a purely local protocol: file transfer, connection to headsets, operation of a fitness bracelet. In practice, it gives a lot more. With proper processing of advertising packages and service information of Bluetooth devices, it is possible to determine the approximate location, type and model of the device, restore movement routes, and in some cases, identify the owner. All this happens without physical access to a smartphone or wearable devices.
Bluetooth-OSINT is used at the information collection stage, during technical support of events, during investigations and during movement monitoring. It is effective both in urban environments and in confined spaces: at train stations, business centers, hotels, and conference halls.
Android devices remain particularly vulnerable. Even with an inactive connection, they continue to send advertising packets.
Advertising packets in the context of Bluetooth, especially Bluetooth Low Energy (BLE), are special short packets of data that a device periodically transmits over the air to inform other devices about its presence.
These packets do not require a connection — they are transmitted "blindly" and are received by all devices within range. It is thanks to these advertising packages, for example, that headphones appear in the list of available Bluetooth devices on your phone.
Many models transmit the device name in clear text — for example, Pixel 8a Alex or Galaxy S22 Masha. This field often contains the user's name or nickname. Such data can be compared with search results in social networks, leaks, and databases.
Even if the name is hidden, there are still values in the packages that can be used to set the model, chip type, and manufacturer's version. If you collect data about such devices from different points, you can build a graph of movements and identify whether the devices belong to the same user.
What is visible via Bluetooth
– Device name
– Signal strength (RSSI) — allows you to estimate the distance to the source
– Manufacturer-specific data — additional fields specified by the manufacturer
– Advertising UUID — often static for specific models
– Frequency of broadcasting and interaction with services
The combination of smartphone, watch and headset is already a unique set. It is easily tracked by its characteristic behavior on the air.
Why Android makes more noise than other OS
– The MAC address may not be randomized until Bluetooth is manually rebooted
- Built–in BLE Privacy protection is either missing or partially implemented
– Device names are often transmitted in clear text
– System services are running in the background: Nearby, Fast Pair, geolocation, Smart Lock
This creates a permanent presence of the device on the radio. Even without connecting to other devices, the smartphone remains visible.
How to reduce visibility
1. Disable Bluetooth if it is not necessary to operate it
2. Disable background scanning:
Settings → Geolocation → Scan → Bluetooth Scan → Off
3. Change the device name:
Settings → About the phone → Device Name
4. Disable Nearby Share, Fast Pair, Smart Lock and other Bluetooth-enabled services
5. If root access is available, use additional utilities:
– Magisk BLE Privacy Module
– XPrivacyLua
– #Bluetooth MAC Spoofer
Tools for analysis
– nRF Connect — displays BLE packets transmitted over the air
- Beacon Scanner / BLE Hero – detection and tracking of surrounding devices
— btmon with ADB – allows you to view HCI logs, including BLE, without root access
- Kismet is a powerful framework for monitoring wireless interfaces (Wi-Fi, #BLE)
Even if the device is not connected to anything and is in your pocket, it can transmit this data, depending on the firmware, settings, and model. This creates a digital "fingerprint" on the airwaves.
#bt
For reasons unknown to me, Bluetooth is still considered a purely local protocol: file transfer, connection to headsets, operation of a fitness bracelet. In practice, it gives a lot more. With proper processing of advertising packages and service information of Bluetooth devices, it is possible to determine the approximate location, type and model of the device, restore movement routes, and in some cases, identify the owner. All this happens without physical access to a smartphone or wearable devices.
Bluetooth-OSINT is used at the information collection stage, during technical support of events, during investigations and during movement monitoring. It is effective both in urban environments and in confined spaces: at train stations, business centers, hotels, and conference halls.
Android devices remain particularly vulnerable. Even with an inactive connection, they continue to send advertising packets.
Advertising packets in the context of Bluetooth, especially Bluetooth Low Energy (BLE), are special short packets of data that a device periodically transmits over the air to inform other devices about its presence.
These packets do not require a connection — they are transmitted "blindly" and are received by all devices within range. It is thanks to these advertising packages, for example, that headphones appear in the list of available Bluetooth devices on your phone.
Many models transmit the device name in clear text — for example, Pixel 8a Alex or Galaxy S22 Masha. This field often contains the user's name or nickname. Such data can be compared with search results in social networks, leaks, and databases.
Even if the name is hidden, there are still values in the packages that can be used to set the model, chip type, and manufacturer's version. If you collect data about such devices from different points, you can build a graph of movements and identify whether the devices belong to the same user.
What is visible via Bluetooth
– Device name
– Signal strength (RSSI) — allows you to estimate the distance to the source
– Manufacturer-specific data — additional fields specified by the manufacturer
– Advertising UUID — often static for specific models
– Frequency of broadcasting and interaction with services
The combination of smartphone, watch and headset is already a unique set. It is easily tracked by its characteristic behavior on the air.
Why Android makes more noise than other OS
– The MAC address may not be randomized until Bluetooth is manually rebooted
- Built–in BLE Privacy protection is either missing or partially implemented
– Device names are often transmitted in clear text
– System services are running in the background: Nearby, Fast Pair, geolocation, Smart Lock
This creates a permanent presence of the device on the radio. Even without connecting to other devices, the smartphone remains visible.
How to reduce visibility
1. Disable Bluetooth if it is not necessary to operate it
2. Disable background scanning:
Settings → Geolocation → Scan → Bluetooth Scan → Off
3. Change the device name:
Settings → About the phone → Device Name
4. Disable Nearby Share, Fast Pair, Smart Lock and other Bluetooth-enabled services
5. If root access is available, use additional utilities:
– Magisk BLE Privacy Module
– XPrivacyLua
– #Bluetooth MAC Spoofer
Tools for analysis
– nRF Connect — displays BLE packets transmitted over the air
- Beacon Scanner / BLE Hero – detection and tracking of surrounding devices
— btmon with ADB – allows you to view HCI logs, including BLE, without root access
- Kismet is a powerful framework for monitoring wireless interfaces (Wi-Fi, #BLE)
Even if the device is not connected to anything and is in your pocket, it can transmit this data, depending on the firmware, settings, and model. This creates a digital "fingerprint" on the airwaves.
#bt
Forwarded from Fighting 4 AZ
A Blaze Media report reveals that Netflix, in partnership with data broker Experian, is intensifying its user data tracking beyond simple content recommendations. Through its ad-supported tier, Netflix collects detailed behavioral and psychological data from its 90 million U.S. users—tracking every pause, rewind, and binge—to build in-depth profiles. This data is reportedly combined with financial metrics to create a “creepy new credit score” predicting spending habits and loan risks.
Netflix claims this happens in privacy-protected “clean rooms,” but the report suggests it’s still extensive surveillance used to tailor ads based on users’ emotional states and behaviors. Experian’s involvement raises concerns that Netflix viewing habits could influence decisions beyond streaming, including loan approvals and targeted marketing, turning entertainment into a tool for deep psychological analysis and commercial exploitation.
https://endtimeheadlines.org/2025/06/netflixs-chilling-new-surveillance-tools-are-watching-us/
Netflix claims this happens in privacy-protected “clean rooms,” but the report suggests it’s still extensive surveillance used to tailor ads based on users’ emotional states and behaviors. Experian’s involvement raises concerns that Netflix viewing habits could influence decisions beyond streaming, including loan approvals and targeted marketing, turning entertainment into a tool for deep psychological analysis and commercial exploitation.
https://endtimeheadlines.org/2025/06/netflixs-chilling-new-surveillance-tools-are-watching-us/
End Time Headlines
Netflix’s chilling new surveillance tools are watching us
A recent report by Blaze Media has raised eyebrows about Netflix's latest data practices. It paints a picture of a streaming giant that’s not just serving
Forwarded from Hacker News