For Braxman's insecure devices, he's partnered with the founder of "Secure Group", a company closely resembling Encrochat, SkyECC, ANOM, etc. which then transitioned into closely partnering with Braxman via "The Good Phone Foundation" and "LUNR". They're also partnered with iodéOS, yet another insecure OS based on forking LineageOSFor Braxman's insecure devices, he's partnered with the founder of "Secure Group", a company closely resembling Encrochat, SkyECC, ANOM, etc. which then transitioned into closely partnering with Braxman via "The Good Phone Foundation" and "LUNR". They're also partnered with iodéOS, yet another insecure OS based on forking LineageOS which is presenting itself as a highly private and secure OS. which is presenting itself as a highly private and secure OS.
Forwarded from Libreware
🚨 Your Android is watching you!
Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it won’t stop it because it reinstalls automatically.
The only way to stop it is to disable it, preventing Google Play from reinstalling or updating it without your consent.
In October 2024, Google introduced "Sensitive Content Warnings" in Google Messages, which scan images on-device to detect nudity. Since SafetyCore is linked to Google’s content moderation systems, it’s likely scanning files to classify content without your knowledge.
Even if you remove it, Google Play reinstalls it automatically.
There’s no clear explanation on what else it does or why it reinstalls itself.
Honorable mention: it requires 2GB RAM 😳
1️⃣ Enable USB Debugging
(Settings > Developer options).
2️⃣ Download & install ADB on your PC.
3️⃣ Connect your phone to a PC.
4️⃣ Open a terminal and run:
1️⃣ Download & install Termux on your phone.
2️⃣ Open Termux and run:
Take control of your device. Disable it now.
📱𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it won’t stop it because it reinstalls automatically.
The only way to stop it is to disable it, preventing Google Play from reinstalling or updating it without your consent.
🔍 Why Does This Matter?It may be scanning all your media files.
In October 2024, Google introduced "Sensitive Content Warnings" in Google Messages, which scan images on-device to detect nudity. Since SafetyCore is linked to Google’s content moderation systems, it’s likely scanning files to classify content without your knowledge.
Uninstalling is useless.
Even if you remove it, Google Play reinstalls it automatically.
No transparency from Google.
There’s no clear explanation on what else it does or why it reinstalls itself.
Honorable mention: it requires 2GB RAM 😳
🔒 How to disable it?ㅤㅤㅤㅤㅤㅤ⭐ Non-Root
1️⃣ Enable USB Debugging
(Settings > Developer options).
2️⃣ Download & install ADB on your PC.
3️⃣ Connect your phone to a PC.
4️⃣ Open a terminal and run:
🌌 Windows Command Prompt:adb shell pm disable-user --user 0 com.google.android.safetycore
🔟 Windows PowerShell:.\adb shell pm disable-user --user 0 com.google.android.safetycore
🐧 Mac/Linux Terminal:./adb shell pm disable-user --user 0 com.google.android.safetycore
ㅤㅤㅤㅤㅤㅤㅤㅤ🎭 Root
1️⃣ Download & install Termux on your phone.
2️⃣ Open Termux and run:
su -c pm disable com.google.android.safetycoreTake control of your device. Disable it now.
📱𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Google Play
Android System SafetyCore - Apps on Google Play
Provides safety features for Android devices.
Tools for encryption and anonymity - Germany and Europe need to step up to their responsibility
Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe to step into the breach and provide adequate and sustainable funding for the development ecosystem. A commentary.
The continuing erosion of the political and legal protection of civil liberties has led to a situation where freedom of information and communication and the right to privacy and anonymity become increasingly dependent on technology. Digital self-defence has many facets: anonymisation tools such as Tor, end-to-end encryption such as WireGuard or Signal, securing website access with LetsEncrypt or the tools for reproducible builds, which ensure that the software you install has actually been created from source code that someone has checked for security holes. This ecosystem of software and infrastructure has grown exponentially since the Snowden revelations.
Many of these projects have one thing in common: Their development is funded by the US government, often with money from the Open Technology Fund (OTF). Some projects like Tor also receive money from the US State Department and other US government agencies. But why would the US government fund technology development that makes life difficult for the NSA intelligence agency?
💡
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
👉🏼 Read more:
https://netzpolitik.org/2020/germany-and-europe-need-to-step-up-to-their-responsibility/
👉🏼 Read more 🇩🇪:
https://netzpolitik.org/2020/jetzt-sind-deutschland-und-europa-in-der-verantwortung/
#germany #eu #usa #NSA #OTF #encryption #anonymity
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe to step into the breach and provide adequate and sustainable funding for the development ecosystem. A commentary.
The continuing erosion of the political and legal protection of civil liberties has led to a situation where freedom of information and communication and the right to privacy and anonymity become increasingly dependent on technology. Digital self-defence has many facets: anonymisation tools such as Tor, end-to-end encryption such as WireGuard or Signal, securing website access with LetsEncrypt or the tools for reproducible builds, which ensure that the software you install has actually been created from source code that someone has checked for security holes. This ecosystem of software and infrastructure has grown exponentially since the Snowden revelations.
Many of these projects have one thing in common: Their development is funded by the US government, often with money from the Open Technology Fund (OTF). Some projects like Tor also receive money from the US State Department and other US government agencies. But why would the US government fund technology development that makes life difficult for the NSA intelligence agency?
💡
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
👉🏼 Read more:
https://netzpolitik.org/2020/germany-and-europe-need-to-step-up-to-their-responsibility/
👉🏼 Read more 🇩🇪:
https://netzpolitik.org/2020/jetzt-sind-deutschland-und-europa-in-der-verantwortung/
#germany #eu #usa #NSA #OTF #encryption #anonymity
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
the Guardian
NSA files decoded: Edward Snowden's surveillance revelations explained
In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together – and what does it mean for you?
Privacy + Secure Tech Corner Channel 🛡️
Tools for encryption and anonymity - Germany and Europe need to step up to their responsibility Much of the funding of projects for the technical implementation of digital freedoms is threatened by the Trump Government. It is now time for Germany and Europe…
This has multiple parts to it.
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/4
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/4
the Guardian
NSA files decoded: Edward Snowden's surveillance revelations explained
In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together – and what does it mean for you?
Dust Off That Old Hardware and Run DeepSeek R1 on It - Hackster.io
https://www.hackster.io/news/dust-off-that-old-hardware-and-run-deepseek-r1-on-it-b9f58347de58
https://www.hackster.io/news/dust-off-that-old-hardware-and-run-deepseek-r1-on-it-b9f58347de58
Hackster.io
Dust Off That Old Hardware and Run DeepSeek R1 on It
No A100 GPU? No problem! You can use exo to combine old laptops, phones, and Raspberry Pis into an AI powerhouse that runs even DeepSeek R1.
Forwarded from NoGoolag
Mozilla Chaos: Layoffs, Founder Out, New Democrat Operative Leadership
https://www.youtube.com/watch?v=r5jrdGzgE3I
https://digdeeper.club/articles/mozilla.xhtml
https://www.youtube.com/watch?v=r5jrdGzgE3I
https://digdeeper.club/articles/mozilla.xhtml
YouTube
Mozilla Chaos: Layoffs, Founder Out, New Democrat Operative Leadership
Yet another round of layoffs for troubled Firefox maker, with more looming. Insiders describe the mood as "ominous", the "writing is on the wall".
More from The Lunduke Journal:
https://lunduke.com/
More from The Lunduke Journal:
https://lunduke.com/
🤣🤣🤢🤢🤢 “Microsoft is Getting Rusty: A Review of Successes and Challenges - Mark Russinovich”
https://m.youtube.com/watch?v=1VgptLwP588
https://m.youtube.com/watch?v=1VgptLwP588
YouTube
Microsoft is Getting Rusty: A Review of Successes and Challenges - Mark Russinovich
Microsoft’s journey with Rust reflects a commitment to building safer and more efficient software. In this closing keynote, we’ll explore how Microsoft drives change by adopting Rust across key products and platforms. From security improvements to integration…
Forwarded from NoGoolag
How is #Mozilla Spending that $1 Million from US Taxpayers?
https://www.youtube.com/watch?v=i_TX3ihF22k
#Firefox
https://www.youtube.com/watch?v=i_TX3ihF22k
#Firefox
YouTube
How is Mozilla Spending that $1 Million from US Taxpayers?
That's right, the Firefox maker (turned activist organization) received a $1,051,622 grant from US Federal Government. How, exactly, are they spending that money?
More from The Lunduke Journal:
https://lunduke.com/
More from The Lunduke Journal:
https://lunduke.com/
Forwarded from NoGoolag
Use #Firefox? #Mozilla Says it Can Use Your Data However it Wants.
https://www.youtube.com/watch?v=ubtWZwtJCdw
https://www.youtube.com/watch?v=ubtWZwtJCdw
YouTube
Use Firefox? Mozilla Says it Can Use Your Data However it Wants.
"When you upload or input information through Firefox, you hereby grant us a nonexclusive, royalty-free, worldwide license to use that information," says Mozilla. Considering Mozilla is now an advertising company and a "Global Crew of Activists" this is…
Forwarded from cKure
■□□□□ United Kingdom 🇬🇧 Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution
Individuals in the United Kingdom who report cybersecurity vulnerabilities to the Home Office are at risk of facing prosecution for the simple act of discovering those vulnerabilities — even if they comply with new guidance the government department published on Monday.
https://www.gov.uk/guidance/report-a-vulnerability-on-a-home-office-system
https://therecord.media/uk-home-office-vulnerability-disclosure-ethical-hackers
Individuals in the United Kingdom who report cybersecurity vulnerabilities to the Home Office are at risk of facing prosecution for the simple act of discovering those vulnerabilities — even if they comply with new guidance the government department published on Monday.
https://www.gov.uk/guidance/report-a-vulnerability-on-a-home-office-system
https://therecord.media/uk-home-office-vulnerability-disclosure-ethical-hackers
GOV.UK
Report a vulnerability on a Home Office system
Explains how to report a security vulnerability on any Home Office service or system.