Forwarded from Decentralize!
Xeres v0.7.0
[https://xeres.io/]
[https://github.com/zapek/Xeres]
Xeres is a Peer-to-Peer (Friend-to-Friend), decentralized, encrypted and secure application designed for communication and sharing.
Features:
π€ Peer-to-Peer (Friend-to-Friend), fully decentralized
π« No censorship. Cannot be censored
π Compatible with Retroshare 0.6.6 or higher
π Hardware accelerated encryption
π₯ Modern looking desktop user interface with several themes including dark mode
πΆ Remote access
π Free software (GPL), source code on GitHub
π Available for Windows, Linux and MacOS
Changelog:
[https://github.com/zapek/Xeres/releases/tag/v0.7.0]
#Retroshare #Tor #I2P
[https://xeres.io/]
[https://github.com/zapek/Xeres]
Xeres is a Peer-to-Peer (Friend-to-Friend), decentralized, encrypted and secure application designed for communication and sharing.
Features:
π€ Peer-to-Peer (Friend-to-Friend), fully decentralized
π« No censorship. Cannot be censored
π Compatible with Retroshare 0.6.6 or higher
π Hardware accelerated encryption
π₯ Modern looking desktop user interface with several themes including dark mode
πΆ Remote access
π Free software (GPL), source code on GitHub
π Available for Windows, Linux and MacOS
Changelog:
[https://github.com/zapek/Xeres/releases/tag/v0.7.0]
#Retroshare #Tor #I2P
GitHub
GitHub - zapek/Xeres: A Friend-to-Friend, decentralized and secure application for communication and sharing
A Friend-to-Friend, decentralized and secure application for communication and sharing - zapek/Xeres
π13π€·2
Sharing
Share files and apps on android to other devices using browser
Share files and apps over HTTP.
You need the other device to be connected to the same network. just toggle on the server and scan the QR Code on other device and you're good to go. Files sent from browser to the app can be found in Sharing/ folder in your internal storage. You can always disable uploads in the app settings.
https://github.com/Ammar64/Sharing
ββ¬Download
https://github.com/Ammar64/Sharing/releases/latest
https://f-droid.org/packages/com.ammar.sharing/
#share #file #Transfer #Android #qr
Share files and apps on android to other devices using browser
Share files and apps over HTTP.
You need the other device to be connected to the same network. just toggle on the server and scan the QR Code on other device and you're good to go. Files sent from browser to the app can be found in Sharing/ folder in your internal storage. You can always disable uploads in the app settings.
https://github.com/Ammar64/Sharing
ββ¬Download
https://github.com/Ammar64/Sharing/releases/latest
https://f-droid.org/packages/com.ammar.sharing/
#share #file #Transfer #Android #qr
GitHub
GitHub - Ammar64/Sharing: Share files and apps on android to other devices using browser
Share files and apps on android to other devices using browser - Ammar64/Sharing
π8β€4π€2π1
Interactive PDF Analysis (also called IPA) allows any researcher to explore the inner details of any PDF file. PDF files may be used to carry malicious payloads that exploit vulnerabilities, and issues of PDF viewer, or may be used in phishing campaigns as social engineering artefacts. The goal of this software is to let any analyst go deep on its own the PDF file. Via IPA, you may extract important payload from PDF files, understand the relationship across objects, and infer elements that may be helpful for triage of malicious or untrusted payloads.
IPA/README.md at main Β· seekbytes/IPA Β· GitHub
#PDF #PDFanalysis #Malware #Security
IPA/README.md at main Β· seekbytes/IPA Β· GitHub
#PDF #PDFanalysis #Malware #Security
π17β€4
This media is not supported in your browser
VIEW IN TELEGRAM
How to export this channel
If you run into any issues with the export, change the date range to month by month.
If you run into any issues with the export, change the date range to month by month.
π6
From preppercollective:
Lots of DMCA takes-downs today. Channel is now private.
We'll see if this helps. Here's an invite link if you need it. https://t.iss.one/+nmw_P039K8Q4ZWRh
Lots of DMCA takes-downs today. Channel is now private.
We'll see if this helps. Here's an invite link if you need it. https://t.iss.one/+nmw_P039K8Q4ZWRh
β€14
#Unlock #bootloader #xiaomi #Android
HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/
MiUnlockTool
Retrieve encryptData (token) for Xiaomi devices to unlock bootloader, it is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool
termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/
MiUnlockTool
Retrieve encryptData (token) for Xiaomi devices to unlock bootloader, it is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool
termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
GitHub
GitHub - TheAirBlow/HyperSploit: Bypasses HyperOS restrictions on bootloader unlocking
Bypasses HyperOS restrictions on bootloader unlocking - TheAirBlow/HyperSploit
π24π₯12β€7π€―3
Media is too big
VIEW IN TELEGRAM
kv4p HT introduction
Turn your phone into a modern ham radio transceiver.
https://kv4p.com
#HAM #radio
@LinuxTechIndex
Turn your phone into a modern ham radio transceiver.
https://kv4p.com
#HAM #radio
@LinuxTechIndex
π17π€3
Open NotebookLM offers a community-driven #ai #alternative to Google NotebookLM!
https://itsfoss.com/open-notebooklm/
@itsfoss_official
https://itsfoss.com/open-notebooklm/
@itsfoss_official
It's FOSS
Meet Open NotebookLM: An Open Source Alternative to Google's NotebookLM
Good to see an open source alternative arriving on the scene so soon.
π5π4β€1π1
This is the best search engine for current events and history
Clip Genie - Grand Theft World
https://grandtheftworld.com/clip-genie
https://gtw.clipgenie.com
Another search engine:
https://corbettreport.com
#Google #search #engines #alternatives
Clip Genie - Grand Theft World
https://grandtheftworld.com/clip-genie
https://gtw.clipgenie.com
Another search engine:
https://corbettreport.com
#Google #search #engines #alternatives
π€‘8π4π3β€1π₯±1
Amir Taaki
@Narodism
States track our phones using the #IMEI code. But you can change it. They don't want people to know. This info is kept secret.
But today I am making it public in this guide. You will get a hotspot usable with any phone that protects your IMEI from the government for $300.
Your phone broadcasts 2 pieces of info: the IMEI which is tied to the phone's hardware and the IMSI which is tied to the SIM card. To change the IMSI, simply use change your SIM card every so often.
The Pinephone allows you to change this number. Here's a guide to setup the phone for this. You will need a Pinephone, a micro SD card and an adapter for your computer.
Terminology
There are 3 storage types: SPI-NOR, eMMC and the SD card.
The SPI-NOR stores the bootloader. The eMMC is internal memory for the OS. We will use the SD card to load the bootloader into the SPI-NOR.
Setup the Installer Environment
We install the OS to the pinephone using a tool called pmbootstrap, but it needs root access. So I instead made a VM with a USB passthrough and installed Manjaro Linux there.
You can do this with virt-manager, then add a new VM with the Manjaro VM and install it. Then inside Manjaro, you can install spice guest tools for more seemless integration (optional).
For the USB passthrough, I had to edit /etc/libvirt/qemu/manjaro.xml, where I added this code:
<disk type='block' device='disk'>
<driver name='qemu' type='raw' cache='none'/>
<source dev='/dev/sdb'/>
<target dev='vdb' bus='virtio'/>
<address type='pci' domain='0x0000' bus='0x07' slot='0x00' function='0x0'/>
</disk>
(replace /dev/sdb and the other details with the relevant info you need)
Now when I boot the VM, I see a device called /dev/vdb which corresponds to my host computer's /dev/sdb.
Install pmbootstrap and we're ready to go.
Install PostmarketOS
We will install PostmarketOS with SXMO which is a tiling WM. It's quite easy to learn, just read the userguide. Don't be lazy. But if you're a normie, fine you can use Phosh instead which is just like Android.
Using pmbootstrap
Now connect the Pinephone Pro to your computer and put it in the mount mode (blue light), and it should appear on your computer with lsblk.
Inside the Manjaro VM, perform the install:
pmbootstrap zap
pmbootstrap init
pmbootstrap install --fde --sdcard=/dev/vdb ----cipher aes-cbc-essiv:sha256
We need the cipher option due to bug #2916 on postmarketOS bug tracker.
Install Bootloader
Now on your normal machine, put the tow-boot installer. Download tow-boot's spi.installer.img and dd to your SD card. Follow the SPI installer instructions.
Now your phone should boot pmOS.
Tweaks
Disable suspend in System Menu -> Config -> Auto-suspend / Auto-screen-off.
Optionally install an Arch Linux chroot for access to more packages you might not have in pmOS.
IMEI Changing
Now for the juicy part of the guide.
SSH is enabled by default, so SSH in. On your phone, open a terminal and type ip a to find your IP. Then just use ssh username@XXXX. Now sudo su as root. Create this file /root/.bashrc.
alias show-imei="echo 'AT+EGMR=0,7' | atinout - /dev/EG25.AT /dev/stdout"
function _set_imei() {
IMEI=$1
echo "AT+EGMR=1,7,\"$IMEI\"" | atinout - /dev/EG25.AT /dev/stdout
}
# Vanity, I prefer - to _ for cmds ;)
alias set-imei=_set_imei
Now reload your shell using source ~/.bashrc. You now have the commands show-imei and set-imei XXXXX.
To get the IMEI code, we will impersonate legit devices. I scraped all the TAC code prefixes from public DBs and made a little util for that. Download it from github: narodnik/immi. You simply run ./imeichanger.py and it gives you an IMEI code you can put into set-imei.
@Narodism
States track our phones using the #IMEI code. But you can change it. They don't want people to know. This info is kept secret.
But today I am making it public in this guide. You will get a hotspot usable with any phone that protects your IMEI from the government for $300.
Your phone broadcasts 2 pieces of info: the IMEI which is tied to the phone's hardware and the IMSI which is tied to the SIM card. To change the IMSI, simply use change your SIM card every so often.
The Pinephone allows you to change this number. Here's a guide to setup the phone for this. You will need a Pinephone, a micro SD card and an adapter for your computer.
Terminology
There are 3 storage types: SPI-NOR, eMMC and the SD card.
The SPI-NOR stores the bootloader. The eMMC is internal memory for the OS. We will use the SD card to load the bootloader into the SPI-NOR.
Setup the Installer Environment
We install the OS to the pinephone using a tool called pmbootstrap, but it needs root access. So I instead made a VM with a USB passthrough and installed Manjaro Linux there.
You can do this with virt-manager, then add a new VM with the Manjaro VM and install it. Then inside Manjaro, you can install spice guest tools for more seemless integration (optional).
For the USB passthrough, I had to edit /etc/libvirt/qemu/manjaro.xml, where I added this code:
<disk type='block' device='disk'>
<driver name='qemu' type='raw' cache='none'/>
<source dev='/dev/sdb'/>
<target dev='vdb' bus='virtio'/>
<address type='pci' domain='0x0000' bus='0x07' slot='0x00' function='0x0'/>
</disk>
(replace /dev/sdb and the other details with the relevant info you need)
Now when I boot the VM, I see a device called /dev/vdb which corresponds to my host computer's /dev/sdb.
Install pmbootstrap and we're ready to go.
Install PostmarketOS
We will install PostmarketOS with SXMO which is a tiling WM. It's quite easy to learn, just read the userguide. Don't be lazy. But if you're a normie, fine you can use Phosh instead which is just like Android.
Using pmbootstrap
Now connect the Pinephone Pro to your computer and put it in the mount mode (blue light), and it should appear on your computer with lsblk.
Inside the Manjaro VM, perform the install:
pmbootstrap zap
pmbootstrap init
pmbootstrap install --fde --sdcard=/dev/vdb ----cipher aes-cbc-essiv:sha256
We need the cipher option due to bug #2916 on postmarketOS bug tracker.
Install Bootloader
Now on your normal machine, put the tow-boot installer. Download tow-boot's spi.installer.img and dd to your SD card. Follow the SPI installer instructions.
Now your phone should boot pmOS.
Tweaks
Disable suspend in System Menu -> Config -> Auto-suspend / Auto-screen-off.
Optionally install an Arch Linux chroot for access to more packages you might not have in pmOS.
IMEI Changing
Now for the juicy part of the guide.
SSH is enabled by default, so SSH in. On your phone, open a terminal and type ip a to find your IP. Then just use ssh username@XXXX. Now sudo su as root. Create this file /root/.bashrc.
alias show-imei="echo 'AT+EGMR=0,7' | atinout - /dev/EG25.AT /dev/stdout"
function _set_imei() {
IMEI=$1
echo "AT+EGMR=1,7,\"$IMEI\"" | atinout - /dev/EG25.AT /dev/stdout
}
# Vanity, I prefer - to _ for cmds ;)
alias set-imei=_set_imei
Now reload your shell using source ~/.bashrc. You now have the commands show-imei and set-imei XXXXX.
To get the IMEI code, we will impersonate legit devices. I scraped all the TAC code prefixes from public DBs and made a little util for that. Download it from github: narodnik/immi. You simply run ./imeichanger.py and it gives you an IMEI code you can put into set-imei.
π3