Forwarded from mhmrdd
Google RKP SW is now available to the public, which allows you to perform RKP completely in software based implementation without needing TEE, thus includes capability to generate & sign keys and create keyboxes for personal use.
https://github.com/MhmRdd/google-rkp-sw
— — —
Google 的 RKP 软件现已向公众开放,这使你可以完全通过基于软件的实现来执行 RKP,而无需 TEE,从而具备生成和签名密钥以及为个人使用创建 keybox 的能力
https://github.com/MhmRdd/google-rkp-sw
— — —
Google 的 RKP 软件现已向公众开放,这使你可以完全通过基于软件的实现来执行 RKP,而无需 TEE,从而具备生成和签名密钥以及为个人使用创建 keybox 的能力
GitHub
GitHub - MhmRdd/google-rkp-sw
Contribute to MhmRdd/google-rkp-sw development by creating an account on GitHub.
❤1
Bugs caused by modules/root is not my responsibility to fix
❤2👏1😁1
Performance modules WILL NOT break the laws of physics and allow the silicon to run beyond it's physical limits
❤1👏1
Millennium Updates
My phone fell down from the stairs, looks like no more ROMs
... Bye bye display 🥀
Forwarded from Tech & Leaks Zone
BREAKING: Nekogram is secretly transmitting your telegram account phone number to the developer
According to SOTA,
"The backdoor is hidden in the http://Extra.java file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace. The same file implements account 'doxing' via several bots; it is possible that the leaked data is used to populate their databases."
Additionally, the creator of the Nekogram client, (presumably a Chinese national) was previously known for conducting DDoS attacks and unethical online behavior (including death threats against acquaintances).
Apparently, in the early versions of the client, de-anonymization was applied only to Chinese phone numbers, which could have been used for political surveillance;. However, it is now applied to all users.
Follow @TechLeaksZone
According to SOTA,
"The backdoor is hidden in the http://Extra.java file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace. The same file implements account 'doxing' via several bots; it is possible that the leaked data is used to populate their databases."
Additionally, the creator of the Nekogram client, (presumably a Chinese national) was previously known for conducting DDoS attacks and unethical online behavior (including death threats against acquaintances).
Apparently, in the early versions of the client, de-anonymization was applied only to Chinese phone numbers, which could have been used for political surveillance;. However, it is now applied to all users.
Follow @TechLeaksZone
😭3🤔1
Millennium Updates
we finally fucking transsion for Myth devices?
I should add a "FuckYouTranssion" log in there
Forwarded from kuroyuki #MillenniumTeam
Pulled from Nothing 2A, because the dobro one does not work on my device
⚡2
kuroyuki #MillenniumTeam
Pulled from Nothing 2A, because the dobro one does not work on my device
Can probably try r54 from Samsung A16, but we'd need to backport stuff to mali_kbase
Forwarded from AxionOS - Updates
AxionOS update:
AxionOS 2.5a REVERIE official release!
For changelogs: Changelog
Thank you for reporting bugs and participating to our beta, we really appreciate it 🤝 Happy flashing 🫡
AxionOS 2.5a REVERIE official release!
For changelogs: Changelog
Thank you for reporting bugs and participating to our beta, we really appreciate it 🤝 Happy flashing 🫡
🔥3