Forwarded from Tech & Leaks Zone
AMD Developer Community Discord Announced
You can connect with fellow developers and AMD staff and throw your questions on maybe why it sucks. You can even ask questions and share ideas about Game Dev, AI Dev and more!
Discord link: https://discord.gg/amd-dev
You can connect with fellow developers and AMD staff and throw your questions on maybe why it sucks. You can even ask questions and share ideas about Game Dev, AI Dev and more!
Discord link: https://discord.gg/amd-dev
Forwarded from The Hacker News
VexTrio’s cybercrime network hijacks hundreds of thousands of websites to spread scams & malware through fake ads and push alerts.
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on ↓ https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on ↓ https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
Forwarded from NoGoolag
OSINT via Bluetooth: how Android devices give away the owner
For reasons unknown to me, Bluetooth is still considered a purely local protocol: file transfer, connection to headsets, operation of a fitness bracelet. In practice, it gives a lot more. With proper processing of advertising packages and service information of Bluetooth devices, it is possible to determine the approximate location, type and model of the device, restore movement routes, and in some cases, identify the owner. All this happens without physical access to a smartphone or wearable devices.
Bluetooth-OSINT is used at the information collection stage, during technical support of events, during investigations and during movement monitoring. It is effective both in urban environments and in confined spaces: at train stations, business centers, hotels, and conference halls.
Android devices remain particularly vulnerable. Even with an inactive connection, they continue to send advertising packets.
Advertising packets in the context of Bluetooth, especially Bluetooth Low Energy (BLE), are special short packets of data that a device periodically transmits over the air to inform other devices about its presence.
These packets do not require a connection — they are transmitted "blindly" and are received by all devices within range. It is thanks to these advertising packages, for example, that headphones appear in the list of available Bluetooth devices on your phone.
Many models transmit the device name in clear text — for example, Pixel 8a Alex or Galaxy S22 Masha. This field often contains the user's name or nickname. Such data can be compared with search results in social networks, leaks, and databases.
Even if the name is hidden, there are still values in the packages that can be used to set the model, chip type, and manufacturer's version. If you collect data about such devices from different points, you can build a graph of movements and identify whether the devices belong to the same user.
What is visible via Bluetooth
– Device name
– Signal strength (RSSI) — allows you to estimate the distance to the source
– Manufacturer-specific data — additional fields specified by the manufacturer
– Advertising UUID — often static for specific models
– Frequency of broadcasting and interaction with services
The combination of smartphone, watch and headset is already a unique set. It is easily tracked by its characteristic behavior on the air.
Why Android makes more noise than other OS
– The MAC address may not be randomized until Bluetooth is manually rebooted
- Built–in BLE Privacy protection is either missing or partially implemented
– Device names are often transmitted in clear text
– System services are running in the background: Nearby, Fast Pair, geolocation, Smart Lock
This creates a permanent presence of the device on the radio. Even without connecting to other devices, the smartphone remains visible.
How to reduce visibility
1. Disable Bluetooth if it is not necessary to operate it
2. Disable background scanning:
Settings → Geolocation → Scan → Bluetooth Scan → Off
3. Change the device name:
Settings → About the phone → Device Name
4. Disable Nearby Share, Fast Pair, Smart Lock and other Bluetooth-enabled services
5. If root access is available, use additional utilities:
– Magisk BLE Privacy Module
– XPrivacyLua
– #Bluetooth MAC Spoofer
Tools for analysis
– nRF Connect — displays BLE packets transmitted over the air
- Beacon Scanner / BLE Hero – detection and tracking of surrounding devices
— btmon with ADB – allows you to view HCI logs, including BLE, without root access
- Kismet is a powerful framework for monitoring wireless interfaces (Wi-Fi, #BLE)
Even if the device is not connected to anything and is in your pocket, it can transmit this data, depending on the firmware, settings, and model. This creates a digital "fingerprint" on the airwaves.
#bt
For reasons unknown to me, Bluetooth is still considered a purely local protocol: file transfer, connection to headsets, operation of a fitness bracelet. In practice, it gives a lot more. With proper processing of advertising packages and service information of Bluetooth devices, it is possible to determine the approximate location, type and model of the device, restore movement routes, and in some cases, identify the owner. All this happens without physical access to a smartphone or wearable devices.
Bluetooth-OSINT is used at the information collection stage, during technical support of events, during investigations and during movement monitoring. It is effective both in urban environments and in confined spaces: at train stations, business centers, hotels, and conference halls.
Android devices remain particularly vulnerable. Even with an inactive connection, they continue to send advertising packets.
Advertising packets in the context of Bluetooth, especially Bluetooth Low Energy (BLE), are special short packets of data that a device periodically transmits over the air to inform other devices about its presence.
These packets do not require a connection — they are transmitted "blindly" and are received by all devices within range. It is thanks to these advertising packages, for example, that headphones appear in the list of available Bluetooth devices on your phone.
Many models transmit the device name in clear text — for example, Pixel 8a Alex or Galaxy S22 Masha. This field often contains the user's name or nickname. Such data can be compared with search results in social networks, leaks, and databases.
Even if the name is hidden, there are still values in the packages that can be used to set the model, chip type, and manufacturer's version. If you collect data about such devices from different points, you can build a graph of movements and identify whether the devices belong to the same user.
What is visible via Bluetooth
– Device name
– Signal strength (RSSI) — allows you to estimate the distance to the source
– Manufacturer-specific data — additional fields specified by the manufacturer
– Advertising UUID — often static for specific models
– Frequency of broadcasting and interaction with services
The combination of smartphone, watch and headset is already a unique set. It is easily tracked by its characteristic behavior on the air.
Why Android makes more noise than other OS
– The MAC address may not be randomized until Bluetooth is manually rebooted
- Built–in BLE Privacy protection is either missing or partially implemented
– Device names are often transmitted in clear text
– System services are running in the background: Nearby, Fast Pair, geolocation, Smart Lock
This creates a permanent presence of the device on the radio. Even without connecting to other devices, the smartphone remains visible.
How to reduce visibility
1. Disable Bluetooth if it is not necessary to operate it
2. Disable background scanning:
Settings → Geolocation → Scan → Bluetooth Scan → Off
3. Change the device name:
Settings → About the phone → Device Name
4. Disable Nearby Share, Fast Pair, Smart Lock and other Bluetooth-enabled services
5. If root access is available, use additional utilities:
– Magisk BLE Privacy Module
– XPrivacyLua
– #Bluetooth MAC Spoofer
Tools for analysis
– nRF Connect — displays BLE packets transmitted over the air
- Beacon Scanner / BLE Hero – detection and tracking of surrounding devices
— btmon with ADB – allows you to view HCI logs, including BLE, without root access
- Kismet is a powerful framework for monitoring wireless interfaces (Wi-Fi, #BLE)
Even if the device is not connected to anything and is in your pocket, it can transmit this data, depending on the firmware, settings, and model. This creates a digital "fingerprint" on the airwaves.
#bt
Forwarded from Fighting 4 AZ
A Blaze Media report reveals that Netflix, in partnership with data broker Experian, is intensifying its user data tracking beyond simple content recommendations. Through its ad-supported tier, Netflix collects detailed behavioral and psychological data from its 90 million U.S. users—tracking every pause, rewind, and binge—to build in-depth profiles. This data is reportedly combined with financial metrics to create a “creepy new credit score” predicting spending habits and loan risks.
Netflix claims this happens in privacy-protected “clean rooms,” but the report suggests it’s still extensive surveillance used to tailor ads based on users’ emotional states and behaviors. Experian’s involvement raises concerns that Netflix viewing habits could influence decisions beyond streaming, including loan approvals and targeted marketing, turning entertainment into a tool for deep psychological analysis and commercial exploitation.
https://endtimeheadlines.org/2025/06/netflixs-chilling-new-surveillance-tools-are-watching-us/
Netflix claims this happens in privacy-protected “clean rooms,” but the report suggests it’s still extensive surveillance used to tailor ads based on users’ emotional states and behaviors. Experian’s involvement raises concerns that Netflix viewing habits could influence decisions beyond streaming, including loan approvals and targeted marketing, turning entertainment into a tool for deep psychological analysis and commercial exploitation.
https://endtimeheadlines.org/2025/06/netflixs-chilling-new-surveillance-tools-are-watching-us/
End Time Headlines
Netflix’s chilling new surveillance tools are watching us
A recent report by Blaze Media has raised eyebrows about Netflix's latest data practices. It paints a picture of a streaming giant that’s not just serving
Forwarded from Hacker News
Forwarded from Hacker News
Forwarded from Tech Leaks/News Chat (PowerVR Founder)
Indiegogo
Liberux NEXX by Liberux Labs S.L. - Indiegogo
THE LINUX PHONE YOU’VE BEEN WAITING FOR.
Forwarded from Hacker News
Everything Is Down
Article, Comments
Article, Comments
Forwarded from Hacker News
Forwarded from Mishaal's Android News Feed
⏩ Google is killing Android Instant Apps, but you probably won't miss them
Instant Apps let you launch Android apps and games without installing them, but almost nobody supported it, so Google is killing it off later this year
More details👇
🔗 https://www.androidauthority.com/google-killing-android-instant-apps-3567211/
Instant Apps let you launch Android apps and games without installing them, but almost nobody supported it, so Google is killing it off later this year
More details👇
🔗 https://www.androidauthority.com/google-killing-android-instant-apps-3567211/
Android Authority
Google is killing Android Instant Apps, but you probably won't miss them
Google is killing Android Instant Apps, a feature that lets you try mobile apps without installing them, because nobody used them.
Forwarded from POCO F5 INDIA UPDATES
🚨 Fake Android Rumor Alert! 🚨
A viral post is claiming AOSP is dead and Android’s going closed-source.
⚠️ Totally false. Here’s the truth:
✅ AOSP isn’t ending.
Google shifted Android development private — but final, stable source code will still release publicly on AOSP like always.
✅ GrapheneOS is unaffected.
The official team confirmed this change won’t impact them at all.
✅ Pixel drivers closed-source?
Not new. Pixels (and other phones) have always had some proprietary parts like GPU, modem drivers. No change here.
✅ Android’s not over.
Android 16 dropped for Pixels on June 10, 2025. The platform is alive and kicking. 📱🔥
📌 Bottom line:
It’s just a twisted rumor based on a workflow tweak. Android stays open-source at release.
Stay smart, don’t fall for clickbait. 🔍
From - @POCO_F5_INDIA Admin Team❤️
A viral post is claiming AOSP is dead and Android’s going closed-source.
⚠️ Totally false. Here’s the truth:
✅ AOSP isn’t ending.
Google shifted Android development private — but final, stable source code will still release publicly on AOSP like always.
✅ GrapheneOS is unaffected.
The official team confirmed this change won’t impact them at all.
✅ Pixel drivers closed-source?
Not new. Pixels (and other phones) have always had some proprietary parts like GPU, modem drivers. No change here.
✅ Android’s not over.
Android 16 dropped for Pixels on June 10, 2025. The platform is alive and kicking. 📱🔥
📌 Bottom line:
It’s just a twisted rumor based on a workflow tweak. Android stays open-source at release.
Stay smart, don’t fall for clickbait. 🔍
From - @POCO_F5_INDIA Admin Team❤️
Forwarded from ATT • Tech News (Αgam)
Many services suddenly went down globally, some of them have been partially restored.
🔗 Downdetector
🧑💻 @agamtechtricks
🔗 Downdetector
🧑💻 @agamtechtricks