NoGoolag
4.54K subscribers
13.2K photos
6.93K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
Microsoft issues critical Windows security fix after tipoff from US NSA

Microsoft said the flaw could allow a hacker to forge digital certificates used by some versions of Windows to authenticate and secure data.

https://hindustantimes.com/world-news/microsoft-issues-critical-windows-security-fix-after-tipoff-from-us-nsa/story-Md62ttD4lb1kR0i6WnQalK.html

Note: https://en.wikipedia.org/wiki/NOBUS

NOBUS (nobody but us) are security vulnerabilities which the United States National Security Agency (NSA) believes that only it can exploit. As such, NSA sometimes chooses to leave such vulnerabilities open if NSA finds them, in order to exploit them against NSA's targets. More broadly, it refers to the notion that some signals intelligence capabilities are so powerful or otherwise inaccessible that only the NSA will be able to deploy them, though recent analyses suggest that this advantage may be under stress.


#windows #microsoft #nsa #vulnerability #patch
patch.sh
3.8 KB
Signature Spoofing patching for Android Q

- All the credit to Darknecromonger for discovering this method -

Basically some tools (namely DexPatcher) have been updated that now allow us to patch Android Q for sigspoofing without using shady stuff like SmaliPatcher.

Setialpha knows about it already and it will probably be in the next ND patcher release.

Meanwhile, here's a handy little shell script to be run from a PC. It'll pull, patch and push a sigspoof patched services.jar by itself.

Prerequisites:
- A deodexed ROM
- A PC with java and adb installed

Instructions:
- Connect the device to your PC with a cable and authorise ADB
- Run patcher.sh

[Tested on Debian, but should be distro agnostic]

Troubleshooting:
- ADB can't access USB for your user? Search online how to fix it. Or you can run with sudo, but that's just bad practice


πŸ“‘ @NoGoolag
#sigspoof #q #patch #patcher
UNLP patch
Ask maintainer to apply this patch if UNLP doesn't bind on your N+ ROM:
https://github.com/microg/android_packages_apps_UnifiedNlp/blob/master/patches/android_frameworks_base-N.patch

Also make sure your the ROM looks for com.google.android.gms as a location provider

If you are one a GSI, you might need to configure your overlay:
https://github.com/phhusson/vendor_hardware_overlay/commit/b78fde1912e1925701cf9e66f1fe4f8fa4301ae1

#unlp #patch #microg #troubleshooting