No deleted account found from
55 scanned users from this group 🚫👻Signal’s privacy claims exposed! Mark37 dives into “SignalGate,” revealing cracks in the app’s “gold standard” narrative. From closed-source anti-spam systems to leadership ties with Big Tech and government, plus vulnerabilities flagged by the Pentagon, is Signal truly secure? Learn the truth and explore safer alternatives.
https://mark37.com/signal/
https://mark37.com/signal/
The board includes additional members with deep establishment ties:
Amba Kak: Rhodes Scholar (British Pilgrims Society), Oxford graduate, senior advisor to the U.S. Federal Trade Commission, and executive director of AI Now Institute (founded during Obama Administration)
Jay Sullivan: Yale graduate, worked at Twitter, Facebook, Mozilla, Microsoft, and Oracle
Katherine R. Maher: CEO of NPR, executive director of Wikimedia Foundation, Council on Foreign Relations member, UNICEF officer, World Bank advisor, and connected to multiple NGOs funded by USAID and the British Pilgrims Society
This leadership structure raises serious questions about Signal’s true allegiances and priorities. Can an organization led by figures so deeply embedded in establishment institutions and ideologies truly be committed to challenging government surveillance and corporate data collection?
Amba Kak: Rhodes Scholar (British Pilgrims Society), Oxford graduate, senior advisor to the U.S. Federal Trade Commission, and executive director of AI Now Institute (founded during Obama Administration)
Jay Sullivan: Yale graduate, worked at Twitter, Facebook, Mozilla, Microsoft, and Oracle
Katherine R. Maher: CEO of NPR, executive director of Wikimedia Foundation, Council on Foreign Relations member, UNICEF officer, World Bank advisor, and connected to multiple NGOs funded by USAID and the British Pilgrims Society
This leadership structure raises serious questions about Signal’s true allegiances and priorities. Can an organization led by figures so deeply embedded in establishment institutions and ideologies truly be committed to challenging government surveillance and corporate data collection?
The Closed-Source Anti-Spam System: A Necessary Evil or Concerning Vulnerability?
Signal’s messaging protocol and client apps (Android, iOS, desktop) are open-source and subject to regular security audits. However, there’s a critical component that isn’t: Signal’s anti-spam system.
To be fair, Signal’s justification for keeping this component closed-source is legitimate – preventing spammers from studying and circumventing it makes practical sense. The amount of data this specific component can theoretically access is also more limited than, for example, the core messaging infrastructure.
However, this closed-source element creates a blind spot that inherently weakens Signal’s security model and contradicts its promise of complete transparency. Without independent verification, users must simply trust Signal’s claims about what this system does and doesn’t do. When examining potential concerns, several scenarios emerge:
Metadata Collection: While likely limited in scope, the anti-spam system could still collect certain metadata (IP addresses, phone numbers, patterns of communication) and potentially retain it longer than communicated to users.
Account Flagging: The system could include mechanisms to flag specific accounts for additional monitoring or data collection, possibly at the request of government agencies. Since this component isn’t subject to public scrutiny, there’s no way to verify what criteria might trigger such flagging.
Infrastructure Vulnerabilities: Even if the anti-spam system itself doesn’t have malicious intent, its closed nature means vulnerabilities might go undetected, potentially allowing sophisticated attackers to compromise it.
The recent Pentagon warning about Russian hackers exploiting Signal vulnerabilities demonstrates that even supposedly secure systems can have unexpected weak points. The fundamental question becomes: can a system be truly secure when parts of it remain hidden from independent security researchers?
Signal’s messaging protocol and client apps (Android, iOS, desktop) are open-source and subject to regular security audits. However, there’s a critical component that isn’t: Signal’s anti-spam system.
To be fair, Signal’s justification for keeping this component closed-source is legitimate – preventing spammers from studying and circumventing it makes practical sense. The amount of data this specific component can theoretically access is also more limited than, for example, the core messaging infrastructure.
However, this closed-source element creates a blind spot that inherently weakens Signal’s security model and contradicts its promise of complete transparency. Without independent verification, users must simply trust Signal’s claims about what this system does and doesn’t do. When examining potential concerns, several scenarios emerge:
Metadata Collection: While likely limited in scope, the anti-spam system could still collect certain metadata (IP addresses, phone numbers, patterns of communication) and potentially retain it longer than communicated to users.
Account Flagging: The system could include mechanisms to flag specific accounts for additional monitoring or data collection, possibly at the request of government agencies. Since this component isn’t subject to public scrutiny, there’s no way to verify what criteria might trigger such flagging.
Infrastructure Vulnerabilities: Even if the anti-spam system itself doesn’t have malicious intent, its closed nature means vulnerabilities might go undetected, potentially allowing sophisticated attackers to compromise it.
The recent Pentagon warning about Russian hackers exploiting Signal vulnerabilities demonstrates that even supposedly secure systems can have unexpected weak points. The fundamental question becomes: can a system be truly secure when parts of it remain hidden from independent security researchers?
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Font Gallery
Font Gallery app showcases how different Font Families with their different variations (Style, Weight and Size) look. You could switch between light and dark modes and also compare different font families.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Aditya (adeeteya)
🏷 Tags: #Android #Linux #Windows #Website #Utilities
Font Gallery app showcases how different Font Families with their different variations (Style, Weight and Size) look. You could switch between light and dark modes and also compare different font families.
🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Aditya (adeeteya)
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #Linux #Windows #Website #Utilities
Forwarded from Tech & Leaks Zone
iQOO Neo 10 Launched in India
Specifications:
• 6.78" (2800x1260 px) 1.5K AMOLED Display
• 144Hz variable refresh rate
• 1.07 billion colors, HDR 10+
• 5500nits peak brightness
• 4320Hz PWM dimming
• Q1 independent graphics chip
• Snapdragon 8s Gen 4 SoC
• LPDDR5X Ultra RAM
• UFS 3.1 (128GB); UFS 4.1 (256/512GB)
• 7000mm² Ice Dome VC liquid cooling.
• 50MP main (LYT 600, OIS) + 8MP Ultrawide
• 32MP front camera
• In-display fingerprint sensor
• Stereo speakers; IP65 rated
• IR Blaster; USB-C 2.0
• 7000mAh battery; 120W flash charging
3 AndroidOS + 4yrs Security Patch
Pricing:
• 8GB+128GB= Rs. 31,999 (~375$)
• 8GB+256GB= Rs. 33,999 (~400$)
• 12GB+256GB= Rs. 35,999 (~425$)
• 16GB+512GB= Rs. 40,999 (~500$)
Follow @TechLeaksZone
Specifications:
• 6.78" (2800x1260 px) 1.5K AMOLED Display
• 144Hz variable refresh rate
• 1.07 billion colors, HDR 10+
• 5500nits peak brightness
• 4320Hz PWM dimming
• Q1 independent graphics chip
• Snapdragon 8s Gen 4 SoC
• LPDDR5X Ultra RAM
• UFS 3.1 (128GB); UFS 4.1 (256/512GB)
• 7000mm² Ice Dome VC liquid cooling.
• 50MP main (LYT 600, OIS) + 8MP Ultrawide
• 32MP front camera
• In-display fingerprint sensor
• Stereo speakers; IP65 rated
• IR Blaster; USB-C 2.0
• 7000mAh battery; 120W flash charging
3 AndroidOS + 4yrs Security Patch
Pricing:
• 8GB+128GB= Rs. 31,999 (~375$)
• 8GB+256GB= Rs. 33,999 (~400$)
• 12GB+256GB= Rs. 35,999 (~425$)
• 16GB+512GB= Rs. 40,999 (~500$)
Follow @TechLeaksZone
#xmpp #im criticisms:
You can follow any advise on the client XMPP setup but the main issue with the protocol is not your endpoint. The issue is the is the XMPP protocol and related infrastructure.
There are two things you wana do
1. content of the message (privacy setup),
2. identity (anonymity setup)
Don't mistake those two things!!
Privacy
is ensured on XMPP with the OTR or OMEMO encryption. The issue is that the key exchange in between the communication parties is not foolproof. You both *MUST* check the fingerprints through a separate secure channel. This is in large scale not practiced. If you don't check it right, the underlying infrastructure of the XMPP allows the adversary to MITM you and read your messages.
2 Anonymity
is ensured with Tor here. Tor tries to conceal you IP only and nothing more. But Tor, as a low latency network, cannot protect you from revealing your behavioral patterns, your social graph, your login and log out time, the number of messages sent and received at any time, the sender and receiver of the messages, their precise volume and so on *from the XMPP server* and any adversary that can monitor that server.
Our advice is - don't use XMPP! if possible at all and use something more resistant like SimpleX, Briar, CWTCH... and similar solutions that mitigate those leaks and diminish or even make impossible those related attacks from the active as well as passive adversaries.
You can follow any advise on the client XMPP setup but the main issue with the protocol is not your endpoint. The issue is the is the XMPP protocol and related infrastructure.
There are two things you wana do
1. content of the message (privacy setup),
2. identity (anonymity setup)
Don't mistake those two things!!
Privacy
is ensured on XMPP with the OTR or OMEMO encryption. The issue is that the key exchange in between the communication parties is not foolproof. You both *MUST* check the fingerprints through a separate secure channel. This is in large scale not practiced. If you don't check it right, the underlying infrastructure of the XMPP allows the adversary to MITM you and read your messages.
2 Anonymity
is ensured with Tor here. Tor tries to conceal you IP only and nothing more. But Tor, as a low latency network, cannot protect you from revealing your behavioral patterns, your social graph, your login and log out time, the number of messages sent and received at any time, the sender and receiver of the messages, their precise volume and so on *from the XMPP server* and any adversary that can monitor that server.
Our advice is - don't use XMPP! if possible at all and use something more resistant like SimpleX, Briar, CWTCH... and similar solutions that mitigate those leaks and diminish or even make impossible those related attacks from the active as well as passive adversaries.
Forwarded from Tech & Leaks Zone
Lenovo Legion Tab Y700 Launched in China
It can transform into a handheld gaming console when you attach the G9 game controller.
It features Central cooling architecture 2.0, so it can handle high load without getting hot, thanks to 12000mm² large VC Stereo three-channel liquid cooling and VC 7-layer composite cooling system with 41356mm² total cooling area.
Specifications:
• 8.8-inch (3040x1904 px) LCD Display
• 165Hz variable refresh rate
• 600nits brightness
• 16:10 aspect ratio
• 10x Touch Resolution
• 68.7 Billion colors display
• Snapdragon 8 Elite SoC
• LPDDR5X Ultra RAM; UFS 4.1 storage
• Upto 2TB MicroSD Card Slot
• 50MP main single rear camera
• 8MP front camera
• 7600mAh battery with 68W fast charging
• Dolby Atmos; Dual X-axis Linear Motor
• DisplayPort support
• 2 x 1W super linear speakers
• 1x USB-C 3.2 Gen 2
• 1x USB-C 2.0
Pricing:
• 12GB+256GB= 3299 CNY (~455$)
• 16GB+512GB= 3799 CNY (~525$)
G9 game controller: 499 CNY (~70$)
Follow @TechLeaksZone
It can transform into a handheld gaming console when you attach the G9 game controller.
It features Central cooling architecture 2.0, so it can handle high load without getting hot, thanks to 12000mm² large VC Stereo three-channel liquid cooling and VC 7-layer composite cooling system with 41356mm² total cooling area.
Specifications:
• 8.8-inch (3040x1904 px) LCD Display
• 165Hz variable refresh rate
• 600nits brightness
• 16:10 aspect ratio
• 10x Touch Resolution
• 68.7 Billion colors display
• Snapdragon 8 Elite SoC
• LPDDR5X Ultra RAM; UFS 4.1 storage
• Upto 2TB MicroSD Card Slot
• 50MP main single rear camera
• 8MP front camera
• 7600mAh battery with 68W fast charging
• Dolby Atmos; Dual X-axis Linear Motor
• DisplayPort support
• 2 x 1W super linear speakers
• 1x USB-C 3.2 Gen 2
• 1x USB-C 2.0
Pricing:
• 12GB+256GB= 3299 CNY (~455$)
• 16GB+512GB= 3799 CNY (~525$)
G9 game controller: 499 CNY (~70$)
Follow @TechLeaksZone
Various windows apps don't like being run as admin as well for the same reason: security. I think that various parts of play integrity are anti competitive and pointless from a security point of view, but checking if administrator/superuser/root/jailbreak is applied is a pretty common practice. Google chrome will check on windows for example if its being run as admin: https://www.ghacks.net/2025/05/16/google-chrome-will-not-launch-with-admin-rights-anymore-to-reduce-security-risks/
root/jailbreak checks are also a lot about anti piracy measures. Which has to be anti competitive as that's how copyright works. Competition with the samr movie cant legal
and windows has the same unlocked bootloader kind of checks with structures like denuvo. Only difference is naming
root/jailbreak checks are also a lot about anti piracy measures. Which has to be anti competitive as that's how copyright works. Competition with the samr movie cant legal
and windows has the same unlocked bootloader kind of checks with structures like denuvo. Only difference is naming
ghacks.net
Google Chrome will not launch with admin rights anymore, to reduce security risks
Google is making an important change to Chrome on Windows. The browser will no longer run with administrator privileges by default. ADVERTISEMENT This change is designed with the intent to protect users […]
Forwarded from cKure
■■□□□ Researchers claim ChatGPT o3 bypassed shutdown in controlled test.
https://www.bleepingcomputer.com/news/artificial-intelligence/researchers-claim-chatgpt-o3-bypassed-shutdown-in-controlled-test/
https://x.com/PalisadeAI/status/1926084635903025621
https://www.bleepingcomputer.com/news/artificial-intelligence/researchers-claim-chatgpt-o3-bypassed-shutdown-in-controlled-test/
https://x.com/PalisadeAI/status/1926084635903025621
BleepingComputer
Researchers claim ChatGPT o3 bypassed shutdown in controlled test
A new report claims that OpenAI's o3 model altered a shutdown script to avoid being turned off, even when explicitly instructed to allow shutdown