Privacy + Secure Tech Corner Channel πŸ›‘οΈ
90 subscribers
6.65K photos
578 videos
497 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Hacker News
Lessons from Building a Translator App That Beats Google Translate and DeepL
Article, Comments
Igatha

An open-source SOS signaling and recovery app designed for war zones and disaster areas, enabling offline emergency communication when traditional networks fail.

πŸ”— Links:
- Download: Github | IzzySoft | Appstore
- Screenshots
- Features
- Source code
Developer: Nizarmah

❗️Friendly reminder:
If you find it useful, You may star the repo/app, donate to the developer, or perhaps you may also contribute to the development of this project.
🏷 Tags: #Android #iOS #SOS
No deleted account found from 52 scanned users from this group πŸš«πŸ‘»
Forwarded from Bones' Tech Garage
If you use AI, other options exist than a PC that costs too much and does too little. If you are on the other end of the spectrum that is tired of seeing AI hyped in everything this is also welcome news.

https://www.makeuseof.com/reasons-you-dont-need-ai-pc/
Forwarded from The Hacker News
🚨 New malware drop from Golden Chickens: TerraStealerV2 steals browser logins, crypto wallets, and extensions, while TerraLogger silently records keystrokes.

πŸ“¦ Spread via EXE, MSI, LNK, OCX
πŸ“€ Sends data to Telegram + shady domain

πŸ”— Read this report: https://thehackernews.com/2025/05/golden-chickens-deploy-terrastealerv2.html
Forwarded from Gizchina.com
Forget β€˜Max’, Xiaomi’s Next Big Tablet is Going β€˜Ultra’ with Ludicrous 120W Charging!
https://www.gizchina.com/2025/05/05/forget-max-xiaomi-pad-7-ultra-next-big-tablet-with-ludicrous-120w-charging/
Forwarded from The Hacker News
🚨 You’re not running a security team. You're the security team.

One inbox. One admin panel. A hundred fire drills. Google Workspace helpsβ€”but attackers slip through the cracks.

πŸ” Identity is the new perimeter.
πŸ” MFA, context-aware access, DLPβ€”start there.
πŸ› οΈ Then, monitor, review, remediate.

You don’t need perfection. You need visibility and control.

See how it works β†’ https://thehackernews.com/2025/05/perfection-is-myth-leverage-isnt-how.html