Forwarded from Gizchina.com
Kogata GC357B: A Smarter Way to Stream and Watch Anywhere https://www.gizchina.com/sponsored-2/kogata-gc357b-a-smarter-way-to-stream-and-watch-anywhere
Gizchina
Kogata GC357B: A Smarter Way to Stream and Watch Anywhere
Experience theater-quality entertainment anywhere with the Kogata GC357B 4K projector featuring Netflix, Dolby Audio, Wi-Fi 6, and easy setup.
Forwarded from vx-underground
wHatS a GooD pAssWorD mAnAgeR
I store all my passwords in a text file called "passwords" and if someone successfully gets access to that file then I'm going to kill myself
That's my security model
I store all my passwords in a text file called "passwords" and if someone successfully gets access to that file then I'm going to kill myself
That's my security model
Forwarded from Android Security & Malware
Spyrtacus: Italian Surveillanceware Targets Android via Telecom
https://www.secureblink.com/threat-research/spyrtacus-italian-surveillanceware-targets-android-via-telecom-phishing
https://www.secureblink.com/threat-research/spyrtacus-italian-surveillanceware-targets-android-via-telecom-phishing
Secureblink
Spyrtacus: Italian Surveillanceware Targets Android via Telecom Phishing | Secure Blink
SIO's Spyrtacus surveillanceware compromises Android devices via fake apps and cloned Italian telecom sites, stealing communications and media since 2018.
https://github.com/sn-00-x/aa4mg
Android Auto 4 microG
Android Auto 4 MicroG (for A11, A12, A13, A14, A15)
This is a Magisk module that provides an AA (Android Auto) stub as system app, optionally together with XLauncher Unlocked and stubs for Google TTS, Google Maps & Google Search. It is intended to be used on de-googled devices running MicroG!
If you instead prefer a non-root solution to be built into your own rom, please have a look at Android Auto as user app with media apps support
Android Auto 4 microG
Android Auto 4 MicroG (for A11, A12, A13, A14, A15)
This is a Magisk module that provides an AA (Android Auto) stub as system app, optionally together with XLauncher Unlocked and stubs for Google TTS, Google Maps & Google Search. It is intended to be used on de-googled devices running MicroG!
If you instead prefer a non-root solution to be built into your own rom, please have a look at Android Auto as user app with media apps support
GitHub
GitHub - sn-00-x/aa4mg: Android Auto 4 microG
Android Auto 4 microG. Contribute to sn-00-x/aa4mg development by creating an account on GitHub.
This media is not supported in your browser
VIEW IN TELEGRAM
This "techtoker" dude😭 they wasting phone like it's an ewaste
Forwarded from fatalcoder524
DebugAssistant-3.0.0.zip
3.2 KB
Forwarded from 5ec1cff (5ec1cff)
Tricky-Store-v1.4.1-245-72b2e84-release.zip
2.7 MB
TrickyStore 1.4.1
修复一些问题
Fix some issues
SHA256: 2f5e73fcba0e4e43b6e96b38f333cbe394873e3a81cf8fe1b831c2fbd6c46ea9
real5ec1cff | Github
修复一些问题
Fix some issues
SHA256: 2f5e73fcba0e4e43b6e96b38f333cbe394873e3a81cf8fe1b831c2fbd6c46ea9
real5ec1cff | Github
Forwarded from Gizchina.com
The one very old tech we all use but still don’t trust: Bluetooth https://www.gizchina.com/editorial/the-one-very-old-tech-we-all-use-but-still-dont-trust-bluetooth
Gizchina
The one very old tech we all use but still don’t trust: Bluetooth
Walk into any home or office today, and you’ll find Bluetooth in use. It runs in earbuds, cars, pads, remotes, and even fridges.
https://github.com/nlckysolutions/PrivacyStats
PrivacyStats
PrivacyStats checks your Android device’s privacy level based on installed packages.
PrivacyStats has 3 built in lists of apps, ranging from apps with 1-2 trackers, to apps with 5-6 trackers. It will scan apps against these lists, and show you the apps, with uninstall buttons for user-apps, and disable buttons for system apps.
It does not use an internet connection at all, and only has the permission: QUERY_ALL_PACKAGES.
PrivacyStats
PrivacyStats checks your Android device’s privacy level based on installed packages.
PrivacyStats has 3 built in lists of apps, ranging from apps with 1-2 trackers, to apps with 5-6 trackers. It will scan apps against these lists, and show you the apps, with uninstall buttons for user-apps, and disable buttons for system apps.
It does not use an internet connection at all, and only has the permission: QUERY_ALL_PACKAGES.
https://github.com/JingMatrix/TEESimulator
TEESimulator – A Full TEE Emulation Framework
TEESimulator is a FOSS system module designed to create a complete, software-based simulation of a hardware-backed Trusted Execution Environment (TEE) for Key Attestation.
The project's goal is to move beyond simple certificate patching and build a robust framework that can create and manage virtual, self-consistent cryptographic keys.
✨ Core Principles
Bypass Hardware-Backed Attestation: The primary goal of this project is to defeat Key Attestation, a security mechanism that allows apps to verify that they are running on a secure, unmodified device. This module provides the tools to bypass these checks on rooted or modified devices.
Stateful Emulation: Instead of patching responses from the real TEE, the ultimate goal is to create and manage virtual keys entirely in a simulated software environment. Any request concerning a virtual key will be handled by the simulator, ensuring perfect consistency without ever touching the real hardware.
Architectural Interception: By hooking low-level Binder IPC calls to the Keystore, the framework can transparently redirect requests for virtual keys to the software-based simulator, while allowing requests for real keys to pass through to the hardware TEE.
100% FOSS: Licensed under GPLv3, ensuring it stays free, auditable, and compliant with open-source laws.
Software simulation for Android hardware-backed key pairs with key attestation
📱 Requirements
Android 10 or above
TEESimulator – A Full TEE Emulation Framework
TEESimulator is a FOSS system module designed to create a complete, software-based simulation of a hardware-backed Trusted Execution Environment (TEE) for Key Attestation.
The project's goal is to move beyond simple certificate patching and build a robust framework that can create and manage virtual, self-consistent cryptographic keys.
✨ Core Principles
Bypass Hardware-Backed Attestation: The primary goal of this project is to defeat Key Attestation, a security mechanism that allows apps to verify that they are running on a secure, unmodified device. This module provides the tools to bypass these checks on rooted or modified devices.
Stateful Emulation: Instead of patching responses from the real TEE, the ultimate goal is to create and manage virtual keys entirely in a simulated software environment. Any request concerning a virtual key will be handled by the simulator, ensuring perfect consistency without ever touching the real hardware.
Architectural Interception: By hooking low-level Binder IPC calls to the Keystore, the framework can transparently redirect requests for virtual keys to the software-based simulator, while allowing requests for real keys to pass through to the hardware TEE.
100% FOSS: Licensed under GPLv3, ensuring it stays free, auditable, and compliant with open-source laws.
Software simulation for Android hardware-backed key pairs with key attestation
📱 Requirements
Android 10 or above
GitHub
GitHub - JingMatrix/TEESimulator: Software simulation for Android hardware-backed key pairs with key attestation
Software simulation for Android hardware-backed key pairs with key attestation - JingMatrix/TEESimulator
iodéOS-5.18-20251102
👤 Maintainer: iodé.tech
📆 Build Date: 2025-11-02
📝 Security Patch Level: November?
⬇️ Download & Changelog
🤝 Join
🔔 Follow
#A14 #Official #TD #GSI #iodéOS #LineageOS
👤 Maintainer: iodé.tech
📆 Build Date: 2025-11-02
📝 Security Patch Level: November?
⬇️ Download & Changelog
🤝 Join
🔔 Follow
#A14 #Official #TD #GSI #iodéOS #LineageOS