NoGoolag
4.54K subscribers
13.2K photos
6.93K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
SplinterNet

Android app designed to create an unblockable Twitter like network that uses no cellular or Internet communications. All messages are transmitted over Bluetooth between users, creating a true peer-to-peer messaging system. All messages are anonymous to prevent retaliation by government authorities.

SplinterNet is a true peer-to-peer network in that it requires physical proximity to other people to transmit messages. In the current version this happens over a close range Bluetooth connection. To illustrate how SplinterNet works, here is an example scenario:

You take a picture of a protest happening near your home.
Fearing a spread of the protest the government shuts down cellular and Internet access to most citizens.
You write a short message about the protest in SplinterNet and attach the picture.
When you next meet with your friends, you sync SplinterNet with them. They now have your photo and will spread it to their friends.
You also now have all their messages, which includes photos taken of protests happening in other parts of the country.
Any person who can reach a working Internet connection can post all of these photos to any sharing service or send directly to journalists to publicize.
If you fear capture, you can press a single button and all the messages in your copy of SplinterNet are deleted.

Features
Create a post with text and an optional single image.
Mark posts as important to increase their spread within the network. These posts will be sent first during syncing and will be highlighted for the people you sync with.
Delete posts to stop their spread. The contents of the network reflect what users of the network think is important and appropriate. You don't have to spread anything you don't want to.

Project Status
This is an experimental project still in development. All of the features listed here should work, they just haven't been tested in large networks. Please let us know how it works!

https://raw.githubusercontent.com/megamattron/SplinterNet/master/other/splinterNet-infosheet.png

https://github.com/megamattron/SplinterNet


πŸ“‘ @nogoolag πŸ“‘ @libreware
#SplinterNet #im #messaging #p2p #bt #bluetooth
This media is not supported in your browser
VIEW IN TELEGRAM
AIR PODS FREQUENCY WARFARE ON THE BRAIN

Electric and Magnetic Field (#EMF) is undetectable areas of energy, frequently referred to as radiation, linked with the use of electrical power and other forms of natural and human-made lighting.

The increase in the sale of this #wireless #headphones calls for serious concern considering how close-ranged the device is to the brain.

The intensity of the radiation equals that emitting from a microwave device which is similar to #Bluetooth radiation, that can cause brain damage.

The Bluetooth device uses radio waves in the 2.4–2.48 GHz frequency range to transmit signals wirelessly between devices. That’s the same range used by microwaves, cell phones, WIFI and other devices.
0xor0ne@infosec.exchange - Nice intro for beginners to bluetooth communications reverse engineering (Domyos EL500)

https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/

#bluetooth
#Bluetooth #vulnerability allows unauthorized user to record & play audio on Bluetooth speaker via #BlueSpy

Prevention section explains how you can check if your Bluetooth LE speakers/headsets are vulnerable to this attack using nRF Connect app
https://www.mobile-hacker.com/2024/03/22/bluetooth-vulnerability-allows-unauthorized-user-to-record-and-play-audio-on-bluetooth-speakers/

#BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
β–ͺ️automatically scans for devices
β–ͺ️store MAC addresses of devices that are no longer visible but have enabled Bluetooth
β–ͺ️uses Rubber Ducky payloads
https://www.mobile-hacker.com/2024/03/26/blueducky-automates-exploitation-of-bluetooth-pairing-vulnerability-that-leads-to-0-click-code-execution/

Demonstration of using BlueDucky to exploit 0-click Bluetooth vulnerability of unpatched Android smartphone (CVE-2023-45866)
Exploit was triggered by Raspberry Pi 4 and then by Android running NetHunter
https://youtu.be/GOGW7U1f2RA

@androidMalware