Forwarded from Winaero
Microsoft Partner Architect Rudy Huyn announced a new engineering team tasked with delivering “thoughtful and truly user‑friendly interfaces” for Windows 11 by building fully native apps and interface elements and abandoning web technologies such as WebView. The shift addresses long-standing visual inconsistency and performance issues caused by Windows 11’s hybrid use of web and native frameworks.
Microsoft confirmed plans to rewrite the Start menu on the native WinUI platform; the current Start menu relies largely on React Native. A delayed taskbar calendar widget revealed to be built on WebView is reportedly being rebuilt with WinUI.
These efforts are part of an internal initiative codenamed “Windows K2,” aimed at improving stability, usability and visual consistency across the OS. However, the fate of web-based Microsoft 365 apps, including Outlook, Teams and Copilot, remains unclear, since they are managed by Microsoft 365, which has shown limited interest in migrating to WinUI.
Microsoft confirmed plans to rewrite the Start menu on the native WinUI platform; the current Start menu relies largely on React Native. A delayed taskbar calendar widget revealed to be built on WebView is reportedly being rebuilt with WinUI.
These efforts are part of an internal initiative codenamed “Windows K2,” aimed at improving stability, usability and visual consistency across the OS. However, the fate of web-based Microsoft 365 apps, including Outlook, Teams and Copilot, remains unclear, since they are managed by Microsoft 365, which has shown limited interest in migrating to WinUI.
Winaero
A new Windows 11 engineering team will deliver native apps and UI
Microsoft Partner Architect Rudy Huyn announced a new engineering team focused on building “thoughtful and truly user-friendly interfaces” for Windows 11.
🤝40🤡7❤🔥5❤1👍1
Qualcomm Reportedly Replacing Adreno with Nvidia RTX to Rival AMD-Powered Samsung Exynos GPU
According to Digitimes, Qualcomm is finally looking to give up on its in-house Adreno GPU development. In a massive "Strategic Equity Alliance," NVIDIA has reportedly acquired a 10% stake in Qualcomm to fast-track the integration of Blackwell-based RTX Mobile architecture into the upcoming Snapdragon 9 series.
This move is a direct effort to rival the success of the AMD-powered Exynos chips. The Snapdragon 9 Gen 1 will feature an integrated NVIDIA RTX Blackwell based integrated GPU.
Compared to Adreno, it means:
• CUDA core integration for massive efficiency in AI tasks
• Support for NVIDIA GeForce drivers and the Omniverse on Android.
Follow @TechLeaksZone
According to Digitimes, Qualcomm is finally looking to give up on its in-house Adreno GPU development. In a massive "Strategic Equity Alliance," NVIDIA has reportedly acquired a 10% stake in Qualcomm to fast-track the integration of Blackwell-based RTX Mobile architecture into the upcoming Snapdragon 9 series.
This move is a direct effort to rival the success of the AMD-powered Exynos chips. The Snapdragon 9 Gen 1 will feature an integrated NVIDIA RTX Blackwell based integrated GPU.
Compared to Adreno, it means:
• CUDA core integration for massive efficiency in AI tasks
• Support for NVIDIA GeForce drivers and the Omniverse on Android.
Follow @TechLeaksZone
🤡77🤣29✍7❤7❤🔥4🤯3😱3🤷♂1👎1😁1🌚1
Hacker News
My son pleasured himself on Gemini Live. Entire family's Google accounts banned Article, Comments
It looks like the reddit post about "My son pleasured himself on Gemini Live and Entire family's Google accounts banned" was also an april fools post 🥀
🤣112👎4❤3
The Artemis II crew tossing around their iPhones, floating in Zero gravity
https://fixvx.com/OwenSparks/status/2039530455108608234?s=20
https://fixvx.com/OwenSparks/status/2039530455108608234?s=20
vxTwitter / fixvx
Owen Sparks (@OwenSparks)
The Artemis crew tossing around their iPhones, floating in zero gravity 😂
【QRT of Owen Sparks (@OwenSparks):】
'New iPhones are being packed into the suits of the Artemis II Crew!
There is something very familiar abo…
【QRT of Owen Sparks (@OwenSparks):】
'New iPhones are being packed into the suits of the Artemis II Crew!
There is something very familiar abo…
🤡36❤7🆒6
BREAKING: Nekogram is secretly transmitting your telegram account phone number to the developer
According to SOTA,
"The backdoor is hidden in the http://Extra.java file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace. The same file implements account 'doxing' via several bots; it is possible that the leaked data is used to populate their databases."
Additionally, the creator of the Nekogram client, (presumably a Chinese national) was previously known for conducting DDoS attacks and unethical online behavior (including death threats against acquaintances).
Apparently, in the early versions of the client, de-anonymization was applied only to Chinese phone numbers, which could have been used for political surveillance;. However, it is now applied to all users.
Follow @TechLeaksZone
According to SOTA,
"The backdoor is hidden in the http://Extra.java file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace. The same file implements account 'doxing' via several bots; it is possible that the leaked data is used to populate their databases."
Additionally, the creator of the Nekogram client, (presumably a Chinese national) was previously known for conducting DDoS attacks and unethical online behavior (including death threats against acquaintances).
Apparently, in the early versions of the client, de-anonymization was applied only to Chinese phone numbers, which could have been used for political surveillance;. However, it is now applied to all users.
Follow @TechLeaksZone
😨204🤡43😁12❤5🤣5😢4🆒1
EXPOSED: Source Code Evidence of Nekogram Phone Number Harvesting
1. Exfiltration Logic: The function uo5.g() (reconstructed as logNumberPhones) silently collects the UserID and Phone Number of every account logged into the app (up to 8 accounts).
2. Transmission: Data is sent via Inline Queries to the bot @nekonotificationbot. This is done programmatically, so no message appears in your "Sent" history.
3. Target Bots: Three bots embedded in the client's obfuscated code:
@nekonotificationbot: Receives the automated phone number uploads.
@tgdb_search_bot and @usinfobot: : An OSINT bot mentioned in the obfuscated classes.
4. Security Token: The app uses a hardcoded secret key 741ad28818eab17668bc2c70bd419fc25ff56481758a4ac87e7ca164fb6ae1b1 as a prefix for the stolen data, likely to authenticate with the bot's backend.
5. The image shows that Nekogram always wants to get the "reg date".
Unfortunately the Google Play Store version is also affected!!!
Follow @TechLeaksZone
1. Exfiltration Logic: The function uo5.g() (reconstructed as logNumberPhones) silently collects the UserID and Phone Number of every account logged into the app (up to 8 accounts).
2. Transmission: Data is sent via Inline Queries to the bot @nekonotificationbot. This is done programmatically, so no message appears in your "Sent" history.
3. Target Bots: Three bots embedded in the client's obfuscated code:
@nekonotificationbot: Receives the automated phone number uploads.
@tgdb_search_bot and @usinfobot: : An OSINT bot mentioned in the obfuscated classes.
4. Security Token: The app uses a hardcoded secret key 741ad28818eab17668bc2c70bd419fc25ff56481758a4ac87e7ca164fb6ae1b1 as a prefix for the stolen data, likely to authenticate with the bot's backend.
5. The image shows that Nekogram always wants to get the "reg date".
Unfortunately the Google Play Store version is also affected!!!
Follow @TechLeaksZone
😨141❤16☃2🔥2🙏1
Forwarded from TgDB News (TelegramDB)
Nekogram appears to be using the TgDB Search Bot in an automated manner (without our knowledge; this is not a partnership), likely to search for usernames.
However, this is unrelated to their obfuscated scraping of phone numbers; we do not receive any data from Nekogram and are in no way affiliated with them.
However, this is unrelated to their obfuscated scraping of phone numbers; we do not receive any data from Nekogram and are in no way affiliated with them.
❤38😁9👍3🙏2🆒1
Please do your part by reporting Nekogram to Google 🙏
Since the Google Play version also contains this malicious code, it is vital to report it so Play Protect can flag and disable the app on all user devices. (thx @RomashkaTea for confirming)
https://play.google.com/store/apps/details?id=tw.nekomimi.nekogram - App in Play store, you can report it here also
https://support.google.com/googleplay/android-developer/contact/takedown - Takedown page
Follow @TechLeaksZone
Since the Google Play version also contains this malicious code, it is vital to report it so Play Protect can flag and disable the app on all user devices. (thx @RomashkaTea for confirming)
https://play.google.com/store/apps/details?id=tw.nekomimi.nekogram - App in Play store, you can report it here also
https://support.google.com/googleplay/android-developer/contact/takedown - Takedown page
Follow @TechLeaksZone
Google Play
Nekogram - Apps on Google Play
Nekogram is an unofficial messaging app that uses Telegram's API.
💯74🤡13❤4❤🔥2
Nekogram developer has started damage control by banning people in his chat and the GitHub issue has been closed after being accused of phone number harvesting
https://github.com/Nekogram/Nekogram/issues/336
Follow @TechLeaksZone
https://github.com/Nekogram/Nekogram/issues/336
Follow @TechLeaksZone
🤣152🤡15❤4😁1
Forwarded from Nicole ニコール
The telegram scene for the next week is gonna be like "yeah so our slopgram doesn't steal data like goygram, we are a secure fork of ligmagram and have been vetted 69 times by the devs of cringegram which is our biggest competitor, and one of them is also in the navy"
🤣153❤5✍5🤡5🕊2⚡1👍1🏆1
Bug fixes by other unofficial telegram clients are now on speedrun 🫡
https://github.com/arsLan4k1390/Cherrygram/commit/56d2337179a6ae2f967498a48fe9cc69e9f1de07
Follow @TechLeaksZone
https://github.com/arsLan4k1390/Cherrygram/commit/56d2337179a6ae2f967498a48fe9cc69e9f1de07
Follow @TechLeaksZone
😁100🌚6❤4🗿1
GitHub PoC Proves Nekogram Collects Your Private Number
Mystic Leaks have built a PoC (Proof of Concept) using which you can see that Nekogram does indeed collect your phone number
The PoC is available here: https://github.com/RomashkaTea/nekogram-proof-of-logging
Follow @TechLeaksZone
Mystic Leaks have built a PoC (Proof of Concept) using which you can see that Nekogram does indeed collect your phone number
To validate this, we made a PoC: an LSPosed module that replaces the bot ID and username to ours so all requests are going to it. That way, we confirmed that the phone numbers are being collected EVERY LOGIN.
The PoC is available here: https://github.com/RomashkaTea/nekogram-proof-of-logging
Follow @TechLeaksZone
🤡74😭24❤3☃2👍1🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
NASA’s mission to orbit the Moon through Artemis II is being interrupted by Outlook (New) and Outlook (classic) as they both refuse to open 😂
Microslop never fails to entertain us, be it on Earth or in Outer Space.
Follow @TechLeaksZone
Microslop never fails to entertain us, be it on Earth or in Outer Space.
Follow @TechLeaksZone
😭92🤡15🤣12❤4
Forwarded from Eli meshi
Few months ago I found that Telegram Plus uses accounts that connect through their client to give themselves reaction on their Telegram channel.
I checked the logs on the app, you can see that as soon as I click download the file to update the app, a reaction is immediately sent.
I checked the logs on the app, you can see that as soon as I click download the file to update the app, a reaction is immediately sent.
18_12_2025_19_52_01.391 D/tmessages: create load operation fileName=4_5920320703357263724.apk documentName=beta_plus-armHockey-12.2.10.1-21908.apk size=67.4 MB position in queue 0 account=0 cacheType=1 priority=65536 stream=null
18_12_2025_19_52_01.393 D/tmessages: send request org.telegram.tgnet.TLRPC$TL_messages_sendReaction@2db04cd with token = 4849
18_12_2025_19_52_01.412 D/tmessages: start loading file to temp = /storage/emulated/0/Android/data/org.telegram.plus/cache/4_5920320703357263724.temp final = /storage/emulated/0/Android/data/org.telegram.plus/cache/4_5920320703357263724.apk priority65536
🤣143❤12