Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
578 videos
497 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Big Brother Watch
🚨BREAKING🚨

Apple is removing its most robust data protection tool from UK users.

This decision by Apple is the regrettable consequence of the Home Office’s outrageous order attempting to force Apple to breach encryption. As a result, from today Apple’s UK customers are less safe and secure than they were yesterday – and this will quickly prove to have much wider implications for internet users in the UK.

No matter how this is framed, there is simply no such thing as a “back door” that can be limited only to criminals or that can be kept safe from hackers or foreign adversaries. Once encryption is broken for anyone, it’s broken for everyone, and as we have cautioned: this will not stop with Apple.

We once again call on the Home Office to immediately rescind this draconian order and cease attempts to break encryption before the privacy rights of millions are eroded and the UK further ostracises itself from other democracies around the world.

Subscribe | @BigBrotherWatchHQ
Forwarded from Privacy & Security Goys
As federal employees, Elon is really focused on cutting funding to our department. Not only do I have to figure out what I can say I've accomplished over the past week, but they've taken down our primary channel too (I bet you didn't know "ban waves" are really just FBI budget cuts). They seem to have missed this one for now. Typical government incompetency.

Durov has made it clear that we aren't welcome. Those who take personal and operational security seriously should not use Telegram to communicate. We knew our time here was finite, and so we tried alternatives like SimpleX. It didn't take long for the tens of thousands of you fine dissidents to break the app; in fact, I still can't open SimpleX without it crashing. For small groups, it's fine, but for a big community like ours, syncing messages between every observer in the chat becomes taxing on your device.

That said, it is still the best censorship-proof option we have, so if you haven't joined our chat and channel, you may wish to do so. [If these links don't work for you, copy and paste the addresses into SimpleX to open them, don't mindlessly tap on the links here like a retard and wonder why you can't connect. Thank you.]

Some mods have offered to run a third iteration of the channel here, where they have agreed to self-police and only post news and FCC-compliant content. We've toyed with the idea of a Dread clone on TOR, or something Iron March-adjacent. Maybe we will. What I don't think is appropriate is to keep buying e-SIMs to churn out Telegram accounts/channels, which in turn, get blacklisted for posting "illegal content."

Of course, Telegram never specifies what the illegal content was. If it wasn't about calling Hasidic-Americans schizophrenic, it could have been because the Biden administration designated the so-called "Terrorgram Collective" as terrorists, but to that I say, "how can it be a hate crime when we loved doing it?" We've been good goys and hardly ever fedpost anymore! 😇

If this is the end, it's been a hell of a run. We've been here for six years(!) We identified a niche that was sorely unaddressed for /our guys/, and contributed what we could. I'd like to think that we helped some of you avoid the pinch of Johnny Law. The number one rule is "don't get caught," and I think it's time we take our own advice. And to be frank, we don't think our Top Secret security clearance is worth jeopardizing for the .46 TON we didn't get a chance to claim on the other channel.

Thanks to all of the cool cats who shared our content through the years. And a personal shout out to our tireless mods and jannies, who, just like us, did it for free.
Forwarded from NoGoolag
➡️ Remove your credentials from breached data providers:

➡️ Have I Been Pwned
• Conduct a search of your email address or username at https://haveibeenpwned.com/OptOut.
• Click the link in the email confirmation.
• Choose the "Remove email address completely" option.

➡️ Dehashed
• Create a free burner account at https://dehashed.com.
• Conduct a search of your email address or username.
• Click "Request entry removal" link below each result.
• Click the confirmation link within each email.

➡️ Leakcheck
• Register for a free burner account at https://leakcheck.net.
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to removal@leakcheck.net.
• Click the link within the confirmation email.

➡️ PSBDMP
• Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
• Search your email address at the first "PSBDMP" option.
• If any results are present, send an email to admin@psbdmp.ws requesting removal.

➡️ IntelX
• Conduct a search of your email address at https://intelx.io.
• Navigate to https://intelx.io/abuse.
• Paste any URLs associated with the found content "Full Data" links.
• Submit request.

➡️ HudsonRock
• Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
• Search your email address at the first "HudsonRock" option.
• If any results are present, send an email to hello@hudsonrock.com requesting removal. If that fails, use the contact page at https://www.hudsonrock.com/contact.

➡️ Leak-Lookup
• Register for a free burner account at https://leak-lookup.com.
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to info@leak-lookup.com.

➡️ HackCheck
• Register for a free burner account at https://hackcheck.io.
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to support@hackcheck.io.

➡️ Breach Directory
• Navigate to https://breachdirectory.org.
• Search your email address.
• If any results are present, begin the removal process at https://breachdirectory.org/deletemydata.

➡️ LeakPeek
• Navigate to https://leakpeek.com.
• Search your email address.
• If any results are present, send an email to support@LeakPeek.com requesting removal.


➡️ Agency International
Channel: https://t.me/+POdMf0guHLw4MTA0
Chat: https://t.me/+56gWedkBo-05ZDg8
Forwarded from NoGoolag
workbook.pdf
677.4 KB
Use the IntelTechniques.com Work Book to opt out of reverse searches and data collection sites.

⚠️ DO NOT HIRE DATA REMOVAL COMPANIES — They are not thorough. Remove the data yourself, be sure of the work you do. Check back every 6 months - 1 year to ensure nothing has changed.

➡️ The "MOST BANG FOR YOUR BUCK" removals:
• Spokeo
• Mylife
• Radaris
• Whitepages
• Intelius
• BeenVerified
• Acxiom
• Infotracer
• Lexis Nexis
• TruePeopleSearch
Forwarded from NoGoolag
Deep dive into the #Signal arbitrary deletion #vulnerability I discovered in Signal Desktop:

In Signal Desktop, attachments are stored in a designated folder (typically “attachments.noindex”). The deletion logic resolves this folder’s absolute path using fs.realpathSync, which inherently follows symbolic links.


https://nitter.poast.org/jipisback/status/1894682205500088793

https://x.com/jipisback/status/1894682205500088793

https://fixupx.com/jipisback/status/1894682205500088793
Forwarded from The Hacker News
A Serbian activist’s Android phone was unlocked using a zero-day exploit developed by Cellebrite.

This attack leveraged a vulnerability in Android USB drivers, enabling attackers to bypass lock screens.

Read the full article to uncover how this exploit was used: https://thehackernews.com/2025/02/amnesty-finds-cellebrites-zero-day.html
Blur + Zoom Effect – Bring Smooth Transitions to Your Android!🔥

📱 This app enables a stylish Blur & Zoom effect on your wallpaper when closing apps, just like premium UI animations! Now experience smoother transitions on any device.

🔹 Original App by: Remember Studios
🔹 Translation by: SDW
📥 Download Now: From Here
👀 Preview : Watch here
📝 Note: This app was originally made in Chinese, and while I translated most of it, some text couldn’t be translated. Hope you still enjoy it! 😅🎭

📢 Stay Updated:
📍 🚀 @SuperDroidWorld
💬 Join the Discussion:
📍 💬 @SuperDroidChats
👊 Firefox Deletes Promise To Not Sell Personal Data
@takebackourtech

Firefox removed the following section from their FAQ:

Does Firefox sell your personal data?
Nope. Never have, never will. And we protect you from many of the advertisers who do. Firefox products are designed to protect your privacy. That's a promise.


The updated version:
Mozilla doesn't sell data about you (in the way that most people think about "selling data"), and we don't buy data about you. Since we strive for transparency, and the LEGAL definition of "sale of data" is extremely broad in some places, we've had to step back from making the definitive statements you know and love. We still put a lot of work into making sure that the data that we share with our partners (which we need to do to make Firefox commercially viable) is stripped of any identifying information, or shared only in the aggregate, or is put through our privacy preserving technologies (like OHTTP).


What do you think? Do you trust them?

You can learn about the web browsers I recommend in my latest webinar.

ORIGINAL ARTICLE

✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
Mirror2RearUltra

Rear screen mirroring plugin/app for Xiaomi Mi 11 Ultra.

🔗 Links:
- Download
- Usage
- Source code
Developer: tpkarras

🏷️ Tags: #Android #Tools
Forwarded from The Hacker News
Mozilla updates Firefox’s Terms of Use after user concerns over data rights.

The new revisions clarify that Mozilla doesn’t own your data—but the language change follows a wave of community criticism.

Read the full breakdown here: https://thehackernews.com/2025/03/mozilla-updates-firefox-terms-again.html
Forwarded from NoGoolag
‘You Can’t Hide’: #Elon #Musk & #SpaceX Are Helping US Intelligence Build the World’s Largest Spy Satellite Network

Why are so many freedom loving, privacy aware people using a military contractor’s satellite service, and turning a blind eye to the surveillance grid he is co-creating with the U.S. military and intelligence?

https://www.thelastamericanvagabond.com/musk-space-x-satellite-network/
"Haunted by Legacy: Discovering and Exploiting Vulnerable #Tunnelling Hosts", 2025.

This paper is the first to systematically analyse the securityof tunnelling hosts on the IPv4 and IPv6 Internet. Our large-scale Internet-wide scans identified over 4 million hosts that
accept unencrypted tunnelling packets from any source.

This is concerning because vulnerable hosts can be abused asone-way proxies, and many of these hosts also allow an ad-versary to spoof a packet’s source address, enabling variouskinds of known and novel attacks.

Moreover, we also demon-strated that these vulnerable hosts enable novel DoS attacks,such as our TuTL and Ping-Pong attacks. The TuTL attack
is especially concerning since it can be abused to perform DoS attacks against any third-party host on the Internet.

Our measurements also show that many Autonomous Systems,more than four thousand in total, do not (properly) imple-ment source address filtering, thereby allowing the spoofing
of source IP addresses.


#Hosts #Vulnerability
Forwarded from NoGoolag
This media is not supported in your browser
VIEW IN TELEGRAM
📱 Scam by Apple as it created a plain-text protocol and said it protects user privacy.