ladfrombrad

joined 2 years ago
MODERATOR OF
[–] [email protected] 1 points 2 days ago (1 children)

Some of us love seeing dodgy devices and their nooks and crannies. If you wanna share them here, or even over on our TG * where there're many nerds from that region still ;)

t.me/randroidtg

[–] [email protected] 1 points 2 days ago (3 children)

You've got me more curious about the device itself and a rough geographical area it was bought in. Care to share?

[–] [email protected] 1 points 2 days ago

It does when you're sharing nationally classified information with what is a third party, not sanctioned by the administration itself?

[–] [email protected] 1 points 2 days ago* (last edited 2 days ago) (2 children)

The headquarters are irrelevant.

Is it?

Is that why people trying to protect their privacy use VPN's/DNS resolvers outside of the US jurisdiction such as Mullvad/Quad9 etc?

And as stated by someone else if you're using a personal device with a phone number to share classified information outside of a SCIF, you've got to ask yourself if there's a modicum of "sensibility" in the administration here.

[–] [email protected] 1 points 2 days ago

It's like someone else said - I went back and dug a little on old.reddit (RIP r/America) and there's for some reason its "not being shared" and actually, neutered?

Maybe I'm just a sucker for popcorn but it smells like it shit, it usually is 💩

[–] [email protected] 17 points 2 days ago* (last edited 2 days ago)

It is absolutely insane, considering they have SCIF devices / rooms but also the option of "not using off the shelf" shit like Signal and using a phone number. But here they are.

Hell, they could even use something like Briar / Matrix / whatever that is decentralised/does not require a phone number unlike Signal but instead they sent emotes, and classified information detrimental to US citizens over a centralised (third party) platform. Literally, insane.

[–] [email protected] 4 points 2 days ago* (last edited 2 days ago) (8 children)

Are we missing an /s here? Signal is headquartered in the US, and here's me pondering if they were actually using Telegram instead. Which would've been pretty apt.

I think at this point I'd be better off trying to use WeChat.....

edit: https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger - archive

For a bit of clarity some are not seeing. Google, sanctioned too. Crazy times.

[–] [email protected] 6 points 2 days ago (2 children)

To be fair, it's running at the top of BBC news here in the UK this morning which is kinda weird. They usually dunk stuff like this unless they too have some angle on it.

[–] [email protected] 3 points 3 days ago (5 children)

Why being MDM'ed would make it stolen?

Because companies that have already implemented MDM on a device (which your friend has) will be the first to remove any trace of them on it (data protection/GDPR etc) and if it's being sold still with the credentials of said company (with bonus malware?) you might want to poke around it a little.

As the page above states - someone is in charge of that device still and can manipulate it as per the policies they introduced when locking the phone down to an entity.

tldr: most thieves ask for FRP exploits etc to get around a MDM secured device.

[–] [email protected] 2 points 3 days ago (7 children)

If it's MDM'ed, that 99.99% of the time means it's a stolen device.

Where did they buy it from exactly?

[–] [email protected] 1 points 5 days ago* (last edited 5 days ago)

You're gonna be on an aeroplane for a month?

e: tongue in cheek and all aren't SD cards are a thing these days? You've got the obvious network solutions but if you're off the grid?

Why bother?

[–] [email protected] 3 points 5 days ago (1 children)

Pray tell, how do you "pirate" a SSO service as you alluded to above?

No one asked for alternatives. We're more interested in how you're gonna "pirate" these things. Cheers!

 

cross-posted from: https://lemdro.id/post/18949902

 

cross-posted from: https://feddit.org/post/8317927

 

Customers' photos and documents stored online will no longer be protected by end-to-end encryption.

 

I've told qbit to exclude those files and many other extensions from someone's helpful comment on here previously, but the stack keeps on grabbing and seeding them, which the latter I'm a little unhappy about sharing malware.

While all the boxes on my network have no sign of Windows to get exploited it does worry me about another family members arrr stack because there is a Windows laptop down there, but thankfully not used for media consumption.

Help?


edit: big thanks to [email protected] for pointing me in line separators instead of comma separated exclusions!

 

cross-posted from: https://infosec.pub/post/18563178

Qualcomm has released security patches for a zero-day vulnerability in the Digital Signal Processor (DSP) service that impacts dozens of chipsets. [...]

 
 

cross-posted from: https://lemdro.id/post/11927852

Skylo announced the support of an innovative satellite SOS feature on the new Google Pixel 9 series in the US

 

Skylo announced the support of an innovative satellite SOS feature on the new Google Pixel 9 series in the US

27
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

I seem to be suffering from the above bug

https://github.com/TeamNewPipe/NewPipe/issues/11139

but it only seems to pervade if I'm using Tailscale to VPN ~~home~~ to my exit node at a family members house?

Is Google / YT blocking the use of VPN's here / anyone else experiencing this?

view more: next ›