https://forums-images.oneplus.net/attachments/1693/1693765-dd7f5b36e136cd671f54d37b6f2fc685.png
Let's see if they're going to follow this naming scheme, it looks pretty chaotic for now
Let's see if they're going to follow this naming scheme, it looks pretty chaotic for now
https://practical_emv.gitlab.io/
The Apple Pay lock screen can be bypassed for any iPhone with a Visa card set up in transit mode. The contactless limit can also be bypassed allowing unlimited EMV contactless transactions from a locked iPhone.
This attack is made possible by a combination of flaws in both Apple Pay and Visa’s system. It does not, for instance, affect Mastercard on Apple Pay or Visa on Samsung Pay.
The Apple Pay lock screen can be bypassed for any iPhone with a Visa card set up in transit mode. The contactless limit can also be bypassed allowing unlimited EMV contactless transactions from a locked iPhone.
This attack is made possible by a combination of flaws in both Apple Pay and Visa’s system. It does not, for instance, affect Mastercard on Apple Pay or Visa on Samsung Pay.
https://shop.fairphone.com/en/accessories/true-wireless-stereo-earbuds
>ecology
>TWS with non-replaceable battery
>ecology
>TWS with non-replaceable battery
Fairphone
True Wireless Stereo Earbuds
Fairphone True Wireless Earbuds deliver an immersive listening experience, with superior sound quality and active noise cancelling. More importantly though, they’re designed with fair and recycled materials, a battery that outlasts your longest playlist and…
https://www.reddit.com/r/androiddev/comments/q4nltn/ads_are_now_able_to_bypass_google_play_to_install/
Stock ROMs sell you all the time.
Tl;dr: a system app can (and has a financial incentive to) bypass Google Play when cooperating with ad provider.
Stock ROMs sell you all the time.
Tl;dr: a system app can (and has a financial incentive to) bypass Google Play when cooperating with ad provider.
Reddit
From the androiddev community on Reddit: Ads are now able to bypass Google Play to install apps WITHOUT user consent. Digital Turbine…
Explore this post and more from the androiddev community
It supposedly works on deep links, so a fully rogue (interaction-less) installation can be possible if that's true.
Most notorious form of bypassing Google Play (outside of core GMS apps) is obviously the Facebook updater, there's a lot of stock ROMs that come with it and it's quite privileged, other than the ability of installing stuff.
Tadi Channel
https://twitter.com/shanasaimoe/status/1451265487535435791
Better context
https://twitter.com/topjohnwu/status/1451282578514735131
https://twitter.com/topjohnwu/status/1451282578514735131
Twitter
John Wu
@topjohnwu Yup, we managed to get kernel assisted SU up and running in WSA, which bootstraps Magisk using my emulator noscripts, and the rest is business as usual. (Also by "we", I mean Magisk + Riru + LSPosed folks as we are in close collaboration) twitte…
A good measure of education on security and privacy is proof of the design implications. Simply assuming complete scrapability of publicly accessible (probeable) data lets you avoid many upcoming fuckups.
https://github.com/tejado/telegram-nearby-map
https://github.com/tejado/telegram-nearby-map
GitHub
GitHub - tejado/telegram-nearby-map: Discover the location of nearby Telegram users 📡🌍
Discover the location of nearby Telegram users 📡🌍. Contribute to tejado/telegram-nearby-map development by creating an account on GitHub.
https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/
https://comsec.ethz.ch/research/dram/blacksmith/
https://comsec.ethz.ch/research/dram/blacksmith/
Ars Technica
DDR4 memory protections are broken wide open by new Rowhammer technique
Researchers build "fuzzer" that supercharges potentially serious bitflipping exploits.