NoGoolag
4.64K subscribers
19.6K photos
10.9K videos
752 files
19.7K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“š @SaveAlexandria

πŸ“‘ @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

πŸ’― % satire OSINT
Download Telegram
Forwarded from GJ `°÷°` πŸ‡΅πŸ‡ΈπŸ•Š (t ``~__/>_GJ06)
postmarketOS@fosstodon.org - Grab your headphones, it's time for not just one, but TWO new #postmarketOSpodcast episodes!

Part 1:
* #AlpineConf lookback
* #MMS​
* #Lomiri​
* #PureMaps​
* #postmarketOS-tweaks

Part 2:
* @AsteroidOS​
* #PinePhone Battery/DRAM Freq
* #RetroArch
* mobile-config-#firefox​

https://cast.postmarketos.org/episode/06.1-AlpineConf-MMS-Lomiri-PureMaps-pmOStweaks/​

https://cast.postmarketos.org/episode/06.2-AsteroidOS-PinePhone-Battery-RAM-RetroArch-Firefox/​
Dusting off Old Fingerprints: NSO Group's Unknown MMS Hack | Enea –

Unknown MMS Hack

In the ever-evolving landscape of mobile network security, it’s essential to stay vigilant and informed about the latest threats. However to do so, sometimes we end up looking in places we would not normally look. Today, we delve into a previously unknown mobile network attack known as the β€œMMS Fingerprint” attack, reportedly used by NSO Group, a well-known actor in the realm of surveillance technologies. How we found this attack – which had essentially been hiding in plain sight – and how this attack might work, takes a bit of explaining.

#MMSFingerprint #NSO #MMS