Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
581 videos
543 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
I'm catching up on my research on Electrohypersensitivity - the more I learn about RF hazards the more I feel like there's a silent epidemic of people suffering from the symptoms of RF over-exposure. Its wild because many people will attribute their fatigue, brain fog, and general malaise to a number of other things - never suspecting the WiFi router or phone on the bedstand.

But the truth is our phones are way too powerful for their own good.

We need solutions. I'm looking forward to getting closer to the truth in my next e-book.
⏲️ Has custom dark mode scheduling been broken for you on Android?

Users are reporting that this issue has finally been fixed in Android 16 QPR1 Beta 1.1!

Let me know if you've experienced this issue and if it's now fixed for you in Beta 1.1.

🔗 https://www.androidauthority.com/android-16-beta-custom-dark-mode-issue-3565252/
No deleted account found from 54 scanned users from this group 🚫👻
Forwarded from The Hacker News
⚠️ Generative AI is leaking your sensitive data—4 million+ blocked attempts just in Zscaler’s cloud alone.

Blocking AI apps won’t stop employees; it just pushes data risks into the shadows.

The real fix? Visibility, context-aware policies, and secure AI alternatives that keep productivity high and data safe.

Here’s what smart AI security looks like ↓

Details here → https://thehackernews.com/2025/06/empower-users-and-protect-against-genai.html
Forwarded from Tech & Leaks Zone
Update: Google secretly took down the Pixel 10 leaked ringtones already atleast 4 days ago and replaced them with the current ringtones

So now we have uploaded it in this Pixel10_ringtones zip file which contains all the leaked ringtones

For more seamless usage, you can install this leaked "Sound app" apk on your Pixel, to ensure even more "seamless" usage, where the ringtone string actually corresponds to it (And possibly includes a new collection 👀)

Google was able to change the content in the links because they were gstatic links. Gstatic.com is a web domain used by Google for accessing the Gstatic server: aserver where Google hosts its static content like CSS, Javascript code and images.

Follow @TechLeaksZone
Forwarded from Tech & Leaks Zone
The fact that Google replaced the leaked ringtones with the current ones on June 3rd, one day after it was leaked, suggests they're aware of the leak, including the YouTube video and its description.
Forwarded from Disclose.tv
NEW - A federal court has ruled that OpenAI must keep a record of every conversation held on ChatGPT, even if users try to delete them.

This includes all kinds of sensitive information—from personal therapy sessions to financial advice and emotional moments shared late at night. Nothing gets erased.

The reason behind this is a lawsuit from media companies like The New York Times, who accuse OpenAI of using their copyrighted content to train the AI. To build their legal case, they want access to all stored conversations.

@disclosetv
Forwarded from Realmeme Fuck-Ups (🅢🅐🅘)
So many names for the same device points towards only one direction i.e., it's a literal shit device and Realmeme trying its best to scam the people by confusing them with this shit playschool strategy 🤡🤡

#Realme #Realmeme #FuckRealme

Channel :- @fuckrealme
Group :- @fuckrealmeme
Join :- @TechHub_Updates
Cellebrite: How Your Smartphone Is Hacked? | by Hipeople | Jun, 2025 | Medium

Introduction
Cellebrite UFED is a tool designed for in-depth analysis of data on mobile devices, which is very useful in forensics.

What can Cellebrite UFED do?
Practically everything you can imagine in a cyber investigation. UFED can recover messages, calls, photos, videos, geolocation data, and even deleted files that the owner tried to erase. It can even decrypt encrypted chats in apps such as WhatsApp, Telegram, or Signal. This tool also bypasses screen locks, from PIN codes to biometrics.

UFED can connect to devices via USB, Wi-Fi, or even Bluetooth, depending on the model and settings. For many Android devices, it works without USB debugging enabled, which is obviously a big plus.


Via @technical_private_cat
#Cellebrite