Forwarded from Libreware
PeerTube Mobile App v1 Is Out | Linuxiac
The PeerTube mobile app has reached version 1, allowing users to easily edit playlists, comment on videos, and switch between accounts
Sortie de la v1 de l'application mobile ! | JoinPeerTube
PeerTube | F-Droid - Free and Open Source Android App Repository
Go to the git page to get version 1.0 the F-Droid link is 0.6
https://framagit.org/framasoft/peertube/mobile-application/-/releases
Via @linuxgram
#PeerTube
The PeerTube mobile app has reached version 1, allowing users to easily edit playlists, comment on videos, and switch between accounts
Sortie de la v1 de l'application mobile ! | JoinPeerTube
PeerTube | F-Droid - Free and Open Source Android App Repository
Go to the git page to get version 1.0 the F-Droid link is 0.6
https://framagit.org/framasoft/peertube/mobile-application/-/releases
Via @linuxgram
#PeerTube
Forwarded from Libreware
Snap Safe
The camera that doesn’t rat you out.
Snap Safe is an #Android #camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device.
Key Features:
• Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
• Fully Encrypted – Shots are written to encrypted, app‑private storage.
• Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
• PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
• Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours.
• Granular Location – Add coarse, fine, or zero location data—your call.
• 100% Open Source – Auditable code in plain sight.
• Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
• Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
The camera that doesn’t rat you out.
Snap Safe is an #Android #camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device.
Key Features:
• Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
• Fully Encrypted – Shots are written to encrypted, app‑private storage.
• Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
• PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
• Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours.
• Granular Location – Add coarse, fine, or zero location data—your call.
• 100% Open Source – Auditable code in plain sight.
• Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
• Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
Forwarded from The Hacker News
⚖️ A U.S. jury just hit NSO Group with $168M in damages for using Pegasus spyware to hack WhatsApp users in 51 countries—including 456 in Mexico, 100 in India, and dozens more in Bahrain, Morocco & Pakistan.
Meta proved NSO used a zero-day in WhatsApp calls (CVE-2019-3568) to silently hack phones—no tap needed.
🔗 Details: https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html
Meta proved NSO used a zero-day in WhatsApp calls (CVE-2019-3568) to silently hack phones—no tap needed.
🔗 Details: https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html
Forwarded from The Hacker News
🧪 Looks like a harmless Discord dev tool…
But behind the scenes? Full remote access.
📦 A fake PyPI package has 11,574+ installs
💥 Still live. Still dangerous.
😨 You won’t believe how it bypasses firewalls.
And it’s not the only one.
👀 What else is hiding in your software stack?
Read the full uncovering by researchers: https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html
But behind the scenes? Full remote access.
📦 A fake PyPI package has 11,574+ installs
💥 Still live. Still dangerous.
😨 You won’t believe how it bypasses firewalls.
And it’s not the only one.
👀 What else is hiding in your software stack?
Read the full uncovering by researchers: https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html
Forwarded from Hacker News
Forwarded from Tech & Leaks Zone
BREAKING: Journalists Mishaal Rahman and Kamila exploited a security flaw to leak internal Google Pixel and Android details
Two well-known Android Authority journalists, Kamila Wojciechowska and Mishaal Rahman, are being accused of exploiting a vulnerability to get unauthorized access to dogfood builds (internal Google builds). This access reportedly allowed them to leak unreleased information about upcoming Pixel hardware and Android software features.
Instead of reporting the security flaw to Google, the two allegedly used it to publish "exclusive" stories and leaks based on confidential and unofficial builds. They gave the impression that Google supported their reporting, while hiding the fact that it was based on a serious vulnerability.
This raises serious concerns about how tech outlets get their information, as they are now crossing ethical lines to leak it.
Follow @TechLeaksZone
Two well-known Android Authority journalists, Kamila Wojciechowska and Mishaal Rahman, are being accused of exploiting a vulnerability to get unauthorized access to dogfood builds (internal Google builds). This access reportedly allowed them to leak unreleased information about upcoming Pixel hardware and Android software features.
Instead of reporting the security flaw to Google, the two allegedly used it to publish "exclusive" stories and leaks based on confidential and unofficial builds. They gave the impression that Google supported their reporting, while hiding the fact that it was based on a serious vulnerability.
This raises serious concerns about how tech outlets get their information, as they are now crossing ethical lines to leak it.
Follow @TechLeaksZone
Forwarded from NoGoolag
Media is too big
VIEW IN TELEGRAM
🐙 OctoGram: The open-source alternative Telegram client with all the features you've always wanted. A5.0+
★ Appearance Features:
★ Functions:
@OctoGramApp
💭 Group: @OctoGramGroup
📦 APK: @OctoGramAPKs
🧪 βeta: @OctoGramBeta
🔗 Website: octogramapp.github.io
★ Appearance Features:
⚡️ More user details
- Get at a glance the datacenter to which a user belongs and his user ID.
⚡️ Emoji set
- Choose the emoji pack you prefer. Obviously, the changes only apply to your client. Others will continue to see what they choose.
⚡️ Alternative buttons
- You choose the appearance of the buttons to keep up with your tastes and have an interface that is always modern.
★ Functions:
⚡️ Registration date♨️ Octogram
- Find out when your girlfriend created her Telegram account. Unfortunately, in a roundabout way.
⚡️ Message details
- Discover the most secret details of any message in any chat. Simply activate the option from the settings and press on a message.
⚡️ Experimental features
- If you are very curious or you like risks, use our lab functions. Warning: these functions may make your app unstable or may cause it to crash.
⚡️ Pinned Reactions
- You can now choose your favorite reactions that will always appear before others. You can choose different lists between chats and channels.
⚡️ Pinned Emojis
-You can now pin all your favorite emojis (static or animated ones) that will appear as first in the emoji section!
⚡️ Hide Selected Folders
You can now choose to hide, without deleting, as many folders as you like. You can do this from the folder settings or by holding down on a folder in the chat list.
⚡️ Datacenter status
Stay updated on any lag or internal issues from Telegram. This option is also available online. The DC Status option is now more comprehensive and has 2 new features:
- 🎞 Media monitor to try downloading from the 5 Telegram DCs
- 🌐 Web monitor to try pinging to main Telegram sites
🔗 More details here: tg://dc.
⚡️ Favorite Hashtags
You can now choose your favorite hashtags that will always appear before others.
If you have already used hashtags frequently in chats, a suggestion will appear to pin them quickly.
🔗 More details here: tg://pinned_hashtags
or in Settings => OctoGram Settings => General => Pinned Hashtags.
- 👁 Lock individual chats (from the 3 dots or the chat list - open locked chats list by long pressing on the chats list action bar)
- 🔓 Lock individual actions (call history, secret chats, settings)
Account Locking By fingerprint unlocking and it's also possible to enable unlocking by device PIN or by face.
This can all be configured in the new settings menu.
🔗 More details here: tg://privacy
or in Settings => OctoGram Settings => Privacy and Security..
@OctoGramApp
💭 Group: @OctoGramGroup
📦 APK: @OctoGramAPKs
🧪 βeta: @OctoGramBeta
🔗 Website: octogramapp.github.io
Forwarded from cKure
■■■■□ Confirmed — 19 Billion Compromised Passwords Published Online.
https://www.forbes.com/sites/daveywinder/2025/05/05/new-warning---19-billion-compromised-passwords-create-hacking-arsenal/
https://www.forbes.com/sites/daveywinder/2025/05/05/new-warning---19-billion-compromised-passwords-create-hacking-arsenal/
Forbes
Warning — 19 Billion Compromised Passwords Have Been Published Online
You must take action now, as security experts confirm 19 billion compromised passwords available to cybercriminals for use in account hacking attacks.
Forwarded from cKure
■■■■■ BREAKING: Jew criminal spyware maker NSO Group must pay $167 million to WhatsApp for a hacking campaign in 2019 that targeted more than 1,400 chat app users.
This is a huge win for WhatsApp. NSO says it will consider appealing.
https://techcrunch.com/2025/05/06/nso-group-must-pay-more-than-167-million-in-damages-to-whatsapp-for-spyware-campaign/
This is a huge win for WhatsApp. NSO says it will consider appealing.
https://techcrunch.com/2025/05/06/nso-group-must-pay-more-than-167-million-in-damages-to-whatsapp-for-spyware-campaign/
TechCrunch
NSO Group must pay more than $167 million in damages to WhatsApp for spyware campaign | TechCrunch
The five-year legal battle between the Meta-owned company and the most notorious spyware maker in the world ends with a huge win for WhatsApp.
https://www.quora.com/Why-does-GNU-not-like-systemd/answer/Nala-Ginrut
Why does GNU not like systemd?
Nala Ginrut
GNU maintainer, W3C invited expert on privacyUpvoted by
Ed Carp
, Been writing software professionally since 1978. · Author has 156 answers and 271.2K answer viewsUpdated 7y
Few years ago, I was working for SUSE Linux Enterprise (SLE) as full-time developer. My boss asked me if I’m interested in maintaining systemd for SLE. At that time I know little about systemd. Then I said “I’ll see what I can do”.
I’ve downloaded the source code accompanied with 2000+ backport patches, this took almost a half day. When I was waiting, I had reviewed the code and try to find out what’s in it. And I had contacted several experienced colleagues to learn about it from them.
Finally, I could figure out that systemd takes advantages of Linux kernel things to start services in parallel. This sounds good, but it introduces unbelievable complexity for such a functionality. If you’re a common desktop user, maybe you rarely encounter problems, or you may endure some bugs in systemd. But for an enterprise version Linux, it makes the work of maintainer hard.
And the 2000+ backport patches implies that I (as the maintainer) have to maintain all of them alone, since it’s backported. I discussed with my boss, and told him this kind of work requires a small group people, rather than one man effort. Fortunately, my boss agreed with me completely, so he managed to throw out this package to a bigger team.
Even now, I still remember the complexity in systemd code, and I always tell my engineer team to avoid such kind of complexity in the project. Eliminating complexity is far more important than adding features without clear mind. Don’t try to put every good features into just one project. Every feature is good, but package all of them, you’ll get shit.
Why does GNU not like systemd?
Nala Ginrut
GNU maintainer, W3C invited expert on privacyUpvoted by
Ed Carp
, Been writing software professionally since 1978. · Author has 156 answers and 271.2K answer viewsUpdated 7y
Few years ago, I was working for SUSE Linux Enterprise (SLE) as full-time developer. My boss asked me if I’m interested in maintaining systemd for SLE. At that time I know little about systemd. Then I said “I’ll see what I can do”.
I’ve downloaded the source code accompanied with 2000+ backport patches, this took almost a half day. When I was waiting, I had reviewed the code and try to find out what’s in it. And I had contacted several experienced colleagues to learn about it from them.
Finally, I could figure out that systemd takes advantages of Linux kernel things to start services in parallel. This sounds good, but it introduces unbelievable complexity for such a functionality. If you’re a common desktop user, maybe you rarely encounter problems, or you may endure some bugs in systemd. But for an enterprise version Linux, it makes the work of maintainer hard.
And the 2000+ backport patches implies that I (as the maintainer) have to maintain all of them alone, since it’s backported. I discussed with my boss, and told him this kind of work requires a small group people, rather than one man effort. Fortunately, my boss agreed with me completely, so he managed to throw out this package to a bigger team.
Even now, I still remember the complexity in systemd code, and I always tell my engineer team to avoid such kind of complexity in the project. Eliminating complexity is far more important than adding features without clear mind. Don’t try to put every good features into just one project. Every feature is good, but package all of them, you’ll get shit.
Quora
Why does GNU not like systemd?
Answer (1 of 9): Few years ago, I was working for SUSE Linux Enterprise (SLE) as full-time developer. My boss asked me if I’m interested in maintaining systemd for SLE. At that time I know little about systemd. Then I said “I’ll see what I can do”.
I’ve…
I’ve…
Privacy + Secure Tech Corner Channel 🛡️
https://x.com/windscribecom/status/1915889645209919735
https://nitter.poast.org/windscribecom/status/1915889645209919735
Windscribe
@windscribecom
Apr 25
Our legal battle is over. A few years back, some idiot used our VPN to do idiot things. Greece then decided to charge the Windscribe CEO @yegor for the crimes because it was his name on the VPN server bill. No logs existed of anything. Case dismissed. windscribe.com/blog/windscri…
Windscribe Wins Legal Battle in Greece Due to No-Logs Policy
Windscribe was sued by a Greek court, which kicked off a 2 year legal battle. The case was dismissed because of our no-logs policy.
windscribe.com
Windscribe
@windscribecom
Apr 25
Our legal battle is over. A few years back, some idiot used our VPN to do idiot things. Greece then decided to charge the Windscribe CEO @yegor for the crimes because it was his name on the VPN server bill. No logs existed of anything. Case dismissed. windscribe.com/blog/windscri…
Windscribe Wins Legal Battle in Greece Due to No-Logs Policy
Windscribe was sued by a Greek court, which kicked off a 2 year legal battle. The case was dismissed because of our no-logs policy.
windscribe.com