https://youtu.be/LLg2OUacUKU
How to Unlock Bootloader/Root And Install Custom ROM's Or GSI ROM's in Infinix/Techno MediaTek Devices
How to Unlock Bootloader/Root And Install Custom ROM's Or GSI ROM's in Infinix/Techno MediaTek Devices
YouTube
How To Unlock Bootloader/Root And Install Custom ROMs Or GSI ROMs In Infinix/Tecno Mediatek Devices
Hello ElectricMoves! It sounds like you're about to provide a tutorial on how to unlock the bootloader, root, and install custom ROMs or GSI ROMs on Infinix, Tecno, and MediaTek devices. That's great! If users have any questions or need assistance, they can…
Seems Google did a full crazy and revoked all currently working keybox yesterday. So max anyone can pass right now is Device integrity.
This might give some explanation: https://xdaforums.com/t/module-play-integrity-fix.4607985/post-90382104
This might give some explanation: https://xdaforums.com/t/module-play-integrity-fix.4607985/post-90382104
XDA Forums
🔧 [MODULE] Play Integrity Fix
PLAY INTEGRITY FIX
I've decided to discontinue the PIF project.
Google is increasingly putting up more obstacles, and I no longer have as much time to dedicate to this as I used to. It's been a...
I've decided to discontinue the PIF project.
Google is increasingly putting up more obstacles, and I no longer have as much time to dedicate to this as I used to. It's been a...
https://www.pcmag.com/news/oneplus-to-address-this-software-flaw-after-initial-silence
Oneplus and Oppo took 7 months to fix vulnerability CVE 2025-10184, which tells a lot about their security practices.
Through this vulnerabity, any application or malware could access SMS/MMS data without asking for permission, thereby stealing your 2FA codes and other sensitive data.
https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/
@PrivacySecureTechCornerChannel
Oneplus and Oppo took 7 months to fix vulnerability CVE 2025-10184, which tells a lot about their security practices.
Through this vulnerabity, any application or malware could access SMS/MMS data without asking for permission, thereby stealing your 2FA codes and other sensitive data.
https://www.rapid7.com/blog/post/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed/
@PrivacySecureTechCornerChannel
PCMAG
OnePlus To Address This SMS Leak Flaw After Initial Silence
The vulnerability can let installed mobile apps access SMS/MMS data on a OnePlus phone without asking for user permission, creating a pathway to steal two-factor authentication codes.
Forwarded from News and Tips
telega! 1.
PROXY_ADDRESS leads to VK servers, MYTRACKER_SDK_KEY is a mail.ru tracker (linked to VK), and CALLS_BASE_URL is sent through Odnoklassniki (also linked to VK) (a cherry on top of the MAX messenger).2. There are ads, also through
mail.ru.3. There's a "proprietary channel blacklist" to restrict users to blogs "undesirable in Russia," and this line isn't in the official client.
4. The client code is partially copied from Catogram*, right down to the variable names.
5. Phone numbers, authorization keys, and a lot of unnecessary data are sent to their servers.
6. The VK Video and VK Clips interfaces are substituted in JS to hide their branding.
7. Icons can be replaced with VK-specific ones.
* bruhcollective owns the Catogram development - @iTysonLab.
Why did this client appear? There's an explanation.
Sources: 💌, 💌, 💌
Please open Telegram to view this post
VIEW IN TELEGRAM
[beginners] Android Recon for Bug Bounty
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
YesWeHack
Android recon for Bug Bounty hunters: A complete guide
An in-depth Bug Bounty guide to performing reconnaissance on Android apps – from extracting APKs to mapping endpoints, secrets and vulnerable components.
BREAKING: Qualcomm has started killing Arduino development
Qualcomm has "quietly" made some massive changes to Arduino's Terms of Service and Privacy Policy.
According to Adafruit, the new policies introduce sweeping user-license provisions, broaden data collection & embed long-term account data retention, all while integrating user information into Qualcomm’s broader data to ecosystem.
Section 7.1 grants Arduino a perpetual, irrevocable license over anything you upload. Your code, projects, forum posts, and comments all fall under this & it will still remain in effect even after you delete your account.
Arduino retains rights to your content indefinitely. The license is also royalty-free and sub-licensable. Arduino can use your content however they want, distribute it, modify it, and even sublicense it to others.
Section 8.2 further states that users are not allowed to reverse engineer or attempt to understand how the platform works unless #Arduino gives permission
fuck #Qualcomm
Follow @TechLeaksZone
Qualcomm has "quietly" made some massive changes to Arduino's Terms of Service and Privacy Policy.
According to Adafruit, the new policies introduce sweeping user-license provisions, broaden data collection & embed long-term account data retention, all while integrating user information into Qualcomm’s broader data to ecosystem.
Section 7.1 grants Arduino a perpetual, irrevocable license over anything you upload. Your code, projects, forum posts, and comments all fall under this & it will still remain in effect even after you delete your account.
Arduino retains rights to your content indefinitely. The license is also royalty-free and sub-licensable. Arduino can use your content however they want, distribute it, modify it, and even sublicense it to others.
Section 8.2 further states that users are not allowed to reverse engineer or attempt to understand how the platform works unless #Arduino gives permission
fuck #Qualcomm
Follow @TechLeaksZone
This media is not supported in your browser
VIEW IN TELEGRAM
U.S. War Department on troops conducting raids in Somalia: "I can assure you, right, this is an America first department of war and president. So we aren't conducting forever wars in #Somalia. We're not seeking regime change, or, you know, we're not nation building."
@disclosetv
@disclosetv
This media is not supported in your browser
VIEW IN TELEGRAM
🇺🇸 “What threat did the two survivors clinging to a piece of wood in the ocean pose to the United States 1500 miles away?”
Karoline Leavitt directs questions to the Department of War.
Not a good look
🔗
Join us | @MyLordBebo
Karoline Leavitt directs questions to the Department of War.
Not a good look
🔗
Join us | @MyLordBebo
U.S. government-funded labs are actively breeding colonies of exotic Hyalomma #ticks imported from Africa to study Crimean-Congo Hemorrhagic Fever with a 30% mortality rate.
https://www.thegatewaypundit.com/2025/11/exposed-us-labs-breeding-deadly-foreign-ticks-bid/
Join: @davidavocadowolfe 🥑
#bioweapons #terrorism #safe #effective
https://www.thegatewaypundit.com/2025/11/exposed-us-labs-breeding-deadly-foreign-ticks-bid/
Join: @davidavocadowolfe 🥑
#bioweapons #terrorism #safe #effective
Forwarded from Geopolitics & Empire
The Spanish Data Protection Agency, AEPD, has sentenced airport operator Aena to a fine of 10 million euros and has ordered the immediate closure of all biometric boarding gates. The reason for this sanction is that Aena did not make a mandatory data protection impact assessment before introducing the technology that allows the recognition of passengers for their physical appearance.
According to aerotelegraph.com, the biometric gates have been operating in Spain since 2022, initially as a pilot test, and were quickly expanded to eight main airports, including Madrid-Barajas and Barcelona-El Prat. Following complaints from travellers, the AEPD initiated an investigation, which has led it to convict Aena for not having verified the effects that biometric recognition can have on data protection.
Aena disagrees with the decision and emphasizes that a corresponding analysis was carried out and that the use was voluntary. The operator wants to appeal, but the systems will remain disabled for the time being. https://www.tourinews.es/resumen-de-prensa/notas-de-prensa-destinos-turismo/aena-desactiva-embarque-biometrico-recibir-sancion-millonaria_4489851_102.html
According to aerotelegraph.com, the biometric gates have been operating in Spain since 2022, initially as a pilot test, and were quickly expanded to eight main airports, including Madrid-Barajas and Barcelona-El Prat. Following complaints from travellers, the AEPD initiated an investigation, which has led it to convict Aena for not having verified the effects that biometric recognition can have on data protection.
Aena disagrees with the decision and emphasizes that a corresponding analysis was carried out and that the use was voluntary. The operator wants to appeal, but the systems will remain disabled for the time being. https://www.tourinews.es/resumen-de-prensa/notas-de-prensa-destinos-turismo/aena-desactiva-embarque-biometrico-recibir-sancion-millonaria_4489851_102.html
Tourinews
Aena desactiva el embarque biométrico tras recibir una sanción millonaria - Tourinews
This media is not supported in your browser
VIEW IN TELEGRAM
Out of 2000 ICE agents in Chicago allegedly over 120 of them are Israeli ✡️s who were part of the IDF. If true it lends credibility to the theory that ICE is simply targeting the nons who are the most offensive to Israel so they can replace them with more compliant nons.
T.me/TheWesternChauvinist12
T.me/TheWesternChauvinist12