Forwarded from BX1_travel (No Matter)
This media is not supported in your browser
VIEW IN TELEGRAM
Who Said YouTube ReVanced Mod is not Safe ?? 🤔🥴 You can check by yourself before installing first downloaded apk her
https://www.tgoop.com/ReVancedTeam1/49
https://www.tgoop.com/ReVancedTeam1/36
https://www.tgoop.com/ReVancedTeam1/50
after downloading
go to check both version of YouTube ReVanced and Micro Vanced just uploaded your apk here👇https://www.virustotal.com/gui/home/upload
after uploading website automatic checking your apks
Note:-All apk is very clean and safe some permission is Disabled by modder like Unwanted Permissions/Activities/Services/Providers Disabled .
https://www.tgoop.com/ReVancedTeam1/49
https://www.tgoop.com/ReVancedTeam1/36
https://www.tgoop.com/ReVancedTeam1/50
after downloading
go to check both version of YouTube ReVanced and Micro Vanced just uploaded your apk here👇https://www.virustotal.com/gui/home/upload
after uploading website automatic checking your apks
Note:-All apk is very clean and safe some permission is Disabled by modder like Unwanted Permissions/Activities/Services/Providers Disabled .
花卷说科技
Who Said YouTube ReVanced Mod is not Safe ?? 🤔🥴 You can check by yourself before installing first downloaded apk her https://www.tgoop.com/ReVancedTeam1/49 https://www.tgoop.com/ReVancedTeam1/36 https://www.tgoop.com/ReVancedTeam1/50 after downloading go to check both version of YouTube…
Vanced 终于复活了~🥳
https://www.tgoop.com/ReVancedTeam1
https://www.tgoop.com/ReVancedTeam1
🤔原来你的安卓手机,早就是一个合格的硬件安全令牌了~https://fidoalliance.org/news-your-google-android-7-phone-is-now-a-fido2-security-key/
FIDO Alliance
News: Your Google Android 7+ Phone Is Now a FIDO2 Security Key - FIDO Alliance
Any phone running Android 7+ can function as a FIDO2 security key. Android users can now use their phones to log into their Google accounts on Windows, Chrome OS or macOS devices with phishing-resistant FIDO Authentication.
Forwarded from ReVanced (Brayden)
We have officially released an official Alpha version of the ReVanced Manager! Get the latest version here! 🔽
https://github.com/revanced/revanced-manager/releases/
https://github.com/revanced/revanced-manager/releases/
GitHub
Releases · ReVanced/revanced-manager
💊 Application to use ReVanced on Android . Contribute to ReVanced/revanced-manager development by creating an account on GitHub.
Forwarded from Abhishek mishra
Bug found in Android lets you unlock someone's device just a SIM card
Source
A recently disclosed vulnerability gives any attacker with physical access to your Android device the ability to unlock it.
All devices running Android 10 to Android 13 were affected with this bug whether they are running OneUI, MIUI or even Pixel's stock OS. Custom ROMs are also affected by it.
The attacker only needs a SIM card with the PIN and PUK code to run this exploit. PUK (Personal Unlocking Key) is an 8-digit code unique to your SIM card. It is used to unlock your mobile and reset your SIM PIN.
The vulnerability is tracked with CVE-2022-20465 with patches for this issue being now available for AOSP 10-13.
The security researcher reported this bug to Android’s Vulnerability Rewards Program in the middle of this year, but Google did not move on the issue until September after some in-person prompting. It resulted in a $70,000 reward and is listed in the November security patch under a “System” issue with “High” severity.
Source
A recently disclosed vulnerability gives any attacker with physical access to your Android device the ability to unlock it.
All devices running Android 10 to Android 13 were affected with this bug whether they are running OneUI, MIUI or even Pixel's stock OS. Custom ROMs are also affected by it.
The attacker only needs a SIM card with the PIN and PUK code to run this exploit. PUK (Personal Unlocking Key) is an 8-digit code unique to your SIM card. It is used to unlock your mobile and reset your SIM PIN.
The vulnerability is tracked with CVE-2022-20465 with patches for this issue being now available for AOSP 10-13.
The security researcher reported this bug to Android’s Vulnerability Rewards Program in the middle of this year, but Google did not move on the issue until September after some in-person prompting. It resulted in a $70,000 reward and is listed in the November security patch under a “System” issue with “High” severity.
YouTube
Pixel 6 Full Lockscreen Bypass POC
Accompanying blog post: Accidental $70k Google Pixel Lock Screen Bypass
https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/
I found a vulnerability affecting seemingly all Google Pixel phones where if you gave me any…
https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/
I found a vulnerability affecting seemingly all Google Pixel phones where if you gave me any…
Forwarded from 今天你想跑路了吗??
中国三大电商巨头之一的拼多多app被爆出间谍木马化
微信公众号「DarkNavy」[发文]( https://mp.weixin.qq.com/s/P_EYQxOEupqdU0BJMRqWsw ),称某互联网厂商 App 利用 Android 系统漏洞提升权限,进而获取用户隐私及阻止自身被卸载。
据信该APP指的是中国三大电商巨头之一“拼多多”。
该互联网厂商在自家看似无害的 App 里,使用的第一个黑客技术手段,是利用一个近年来看似默默无闻、但实际攻击效果非常好的 Bundle 风水 - Android Parcel 序列化与反序列化不匹配系列漏洞,实现 0day/Nday 攻击,从而绕过系统校验,获取系统级 StartAnyWhere 能力。
提权控制手机系统之后,该 App 即开启了一系列的违规操作,绕过隐私合规监管,大肆收集用户的隐私信息(包括社交媒体账户资料、位置信息、Wi-Fi 信息、基站信息甚至路由器信息等)
之后,该 App 进一步使用的另一个黑客技术手段,是利用手机厂商 OEM 代码中导出的 root-path FileContentProvider, 进行 System App 和敏感系统应用文件读写;
进而突破沙箱机制、绕开权限系统改写系统关键配置文件为自身保活,修改用户桌面(Launcher)配置隐藏自身或欺骗用户实现防卸载;
随后,还进一步通过覆盖动态代码文件的方式劫持其他应用注入后门执行代码,进行更加隐蔽的长期驻留;
甚至还实现了和间谍软件一样的遥控机制,通过远端“云控开关”控制非法行为的启动与暂停,来躲避检测。
微信公众号「DarkNavy」[发文]( https://mp.weixin.qq.com/s/P_EYQxOEupqdU0BJMRqWsw ),称某互联网厂商 App 利用 Android 系统漏洞提升权限,进而获取用户隐私及阻止自身被卸载。
据信该APP指的是中国三大电商巨头之一“拼多多”。
该互联网厂商在自家看似无害的 App 里,使用的第一个黑客技术手段,是利用一个近年来看似默默无闻、但实际攻击效果非常好的 Bundle 风水 - Android Parcel 序列化与反序列化不匹配系列漏洞,实现 0day/Nday 攻击,从而绕过系统校验,获取系统级 StartAnyWhere 能力。
提权控制手机系统之后,该 App 即开启了一系列的违规操作,绕过隐私合规监管,大肆收集用户的隐私信息(包括社交媒体账户资料、位置信息、Wi-Fi 信息、基站信息甚至路由器信息等)
之后,该 App 进一步使用的另一个黑客技术手段,是利用手机厂商 OEM 代码中导出的 root-path FileContentProvider, 进行 System App 和敏感系统应用文件读写;
进而突破沙箱机制、绕开权限系统改写系统关键配置文件为自身保活,修改用户桌面(Launcher)配置隐藏自身或欺骗用户实现防卸载;
随后,还进一步通过覆盖动态代码文件的方式劫持其他应用注入后门执行代码,进行更加隐蔽的长期驻留;
甚至还实现了和间谍软件一样的遥控机制,通过远端“云控开关”控制非法行为的启动与暂停,来躲避检测。
EP-086 王力雄:中国可以如何避免崩溃?
https://youtube.com/watch?v=Zqi1digNZvc
https://youtube.com/watch?v=Zqi1digNZvc
YouTube
EP-086 王力雄:中国可以如何避免崩溃?
1991年王力雄的第一部政治寓言小说《黄祸》在香港出版,一时洛阳纸贵,在1989年之后对国家前途充满迷茫的中国人中间广为流传。这部小说描写了“六四”事件后的中国如何陷入政治、经济、人口与生态等各种危机,最后导致大崩溃,中国人向世界各地逃难,形成“黄祸”。
事隔30年后,王力雄出版了《黄祸》的姊妹篇《转世》。这部政治寓言小说描写了在主席过世之后中国社会各阶层,从国家领导人、军队将领、野心家、革命者、恐怖分子、科学家、平民百姓到网红,在时代的大动荡中因缘际会走上了民主转型之路。
王力雄1980年脱离体制,靠…
事隔30年后,王力雄出版了《黄祸》的姊妹篇《转世》。这部政治寓言小说描写了在主席过世之后中国社会各阶层,从国家领导人、军队将领、野心家、革命者、恐怖分子、科学家、平民百姓到网红,在时代的大动荡中因缘际会走上了民主转型之路。
王力雄1980年脱离体制,靠…