Please open Telegram to view this post
VIEW IN TELEGRAM
4๐ฅ40โค12๐2 2
๐จ URGENT: Google's New Android Requirement Violates EU Laws
Starting September 2026, Google will FORCE all Android developers to verify their identity - even for sideloaded apps. This affects EVERY EU citizen's digital rights.
๐ฑ What's Happening:
ALL apps must be registered by verified developers
Includes sideloaded apps & alternative stores
Mandatory registration through Google's system
Starts in 4 countries Sept 2026, then globally
โ๏ธ EU Laws Violated:
1๏ธโฃ Digital Markets Act (DMA)
โ Art. 6(4): Blocks free sideloading
โ Art. 5(7): Forces Google's ID system
โ Fine: โฌ25-50 BILLION (10-20% turnover)
2๏ธโฃ GDPR
โ No legal basis for forced data collection
โ Violates data minimization
โ Fine: โฌ10 BILLION (4% turnover)
3๏ธโฃ Antitrust (TFEU Art. 102)
โ Abuse of 70%+ market dominance
โ Same violation EU fined โฌ4.34B in 2018
โ Fine: โฌ25 BILLION
4๏ธโฃ Digital Services Act
โ No transparency or risk assessment
โ Fine: โฌ15 BILLION (6% turnover)
5๏ธโฃ Charter of Fundamental Rights
โ Violates data protection (Art. 8)
โ Kills anonymous publishing (Art. 11)
โ Blocks entrepreneurship (Art. 16)
That is insane - this is what happens when corporations think they are the government
Starting September 2026, Google will FORCE all Android developers to verify their identity - even for sideloaded apps. This affects EVERY EU citizen's digital rights.
๐ฑ What's Happening:
ALL apps must be registered by verified developers
Includes sideloaded apps & alternative stores
Mandatory registration through Google's system
Starts in 4 countries Sept 2026, then globally
โ๏ธ EU Laws Violated:
1๏ธโฃ Digital Markets Act (DMA)
โ Art. 6(4): Blocks free sideloading
โ Art. 5(7): Forces Google's ID system
โ Fine: โฌ25-50 BILLION (10-20% turnover)
2๏ธโฃ GDPR
โ No legal basis for forced data collection
โ Violates data minimization
โ Fine: โฌ10 BILLION (4% turnover)
3๏ธโฃ Antitrust (TFEU Art. 102)
โ Abuse of 70%+ market dominance
โ Same violation EU fined โฌ4.34B in 2018
โ Fine: โฌ25 BILLION
4๏ธโฃ Digital Services Act
โ No transparency or risk assessment
โ Fine: โฌ15 BILLION (6% turnover)
5๏ธโฃ Charter of Fundamental Rights
โ Violates data protection (Art. 8)
โ Kills anonymous publishing (Art. 11)
โ Blocks entrepreneurship (Art. 16)
That is insane - this is what happens when corporations think they are the government
๐25โค9๐คฏ3๐ค2
Channel name was changed to ยซZalexDev Blog | Stryker | Developerยป
Recently, I remembered the legendary Android app Arcai NetCut. One of its interesting features was not only that it could disable internet for any device in local network, but also that it could throttle the internet speed for each device without access to the admin panel, router, and so on. I became curious about how it works. And what I found is truly fascinating. It turns out that it uses many libraries written in native C and C++, which communicate with the Android app via WebSocket by opening port 4132 on localhost. This is a really well-thought-out and interesting application for reverse engineering. I'm amazed at what solutions and tricks they used to make this program work, still functional and hard to "crack" even after more then 3 years from the last update ๐
Please open Telegram to view this post
VIEW IN TELEGRAM
โค27๐ค11
Write the bugs that annoy you most below. Screenshots or videos are welcome๐
โค8๐ฑ2
As for my past birthday, I'll give a premium for free! Wait... Oh damn
Then I'll try to fix most annoying bugs this year, and a small update๐
Then I'll try to fix most annoying bugs this year, and a small update
Please open Telegram to view this post
VIEW IN TELEGRAM
โค38๐ฅฐ4๐ฅ1๐1
Do you need Yet Another One "Pentest GPT", that will work with Claude opus/Gpt 5 pro latest models + custom data on real vector attacks?
So you won't get:
Not for free of course, but less than gpt plus subscription. Just asking your opinion in the comments๐
So you won't get:
Sorry I can't help you with that bla bla bla
Not for free of course, but less than gpt plus subscription. Just asking your opinion in the comments
Please open Telegram to view this post
VIEW IN TELEGRAM
โค22๐ฅ3๐2๐ฟ1
ZalexDev Blog | Stryker | Developer
๐จ URGENT: Google's New Android Requirement Violates EU Laws Starting September 2026, Google will FORCE all Android developers to verify their identity - even for sideloaded apps. This affects EVERY EU citizen's digital rights. ๐ฑ What's Happening: ALL appsโฆ
Google has finally changed its mind about this. Now you'll just see a thousand warnings before installation, and that's it. (Like on mi devices). Victory.
๐14๐6๐คฉ5โค2๐พ1
Many people post New Year's greetings as the holiday approaches. Well, I'm no different, so I congratulate those for whom the new year has already arrived โ or those for whom 2026 is just around the corner
Although this year has been quite challenging, I've personally improved my skills in the field of AI, security research, reverse engineering โ significantly. While I don't see the need to release updates for the app just yet, I'm nevertheless working on other tools and features that you'll be able to try and test in the future.
Thank you for your understanding, and thank you for being here with me. I'll try to post more news about new vulnerabilities next year โ maybe, I'll experiment with other formats, like writeups
So, stay tuned โ and once again, congratulations!
Although this year has been quite challenging, I've personally improved my skills in the field of AI, security research, reverse engineering โ significantly. While I don't see the need to release updates for the app just yet, I'm nevertheless working on other tools and features that you'll be able to try and test in the future.
Thank you for your understanding, and thank you for being here with me. I'll try to post more news about new vulnerabilities next year โ maybe, I'll experiment with other formats, like writeups
So, stay tuned โ and once again, congratulations!
1โคโ๐ฅ22โค12๐8๐4๐2
Beta will be here: https://t.iss.one/+ibnYi-WHfVBiNmMy
๐6โค3
ZalexDev Blog | Stryker | Developer
App was updated to 1.1! https://github.com/zalexdev/whisper-pair-app/releases/tag/1.1
Note on Find Hub Network (FMDN) tracking
And i wish everyone understand that some things must never be done (or in our world reality - win as much time as possible, for people, and moreover VENDORS that must do patches!)
More then 150 days from cve reserved and there is like almost zero patches? What in the world, insane
Also dear vendors, that claims that patch is very difficult. I am not talking even for proper keys and encryption verification. It is literally:
This tool deliberately does not include FMDN provisioning functionality. While the vulnerability chain technically allows enrolling compromised devices into Google's Find Hub Network for persistent location tracking, I've chosen not to implement this capability. Converting someone's headphones into a covert tracking beacon crosses a clear ethical line from security research into stalkerware territory. The Account Key write and audio access demonstrations are sufficient to prove the vulnerability's severity
And i wish everyone understand that some things must never be done (or in our world reality - win as much time as possible, for people, and moreover VENDORS that must do patches!)
More then 150 days from cve reserved and there is like almost zero patches? What in the world, insane
Also dear vendors, that claims that patch is very difficult. I am not talking even for proper keys and encryption verification. It is literally:
if (!is_pairing_mode_active()) {
return REJECT;
}โค4
200 starts in GitHub!
Thanks for the support, i am already making a huge update!
In the meantime, please, star the repo! Let's try to get into the trending on github๐
https://github.com/zalexdev/whisper-pair-app
Thanks for the support, i am already making a huge update!
In the meantime, please, star the repo! Let's try to get into the trending on github
https://github.com/zalexdev/whisper-pair-app
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - zalexdev/wpair-app: WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair)โฆ
WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair protocol. This vulnerability affects millions of Blueto...
โค16๐5
Server Shutdown Notice
Our servers(stryker related once) will be shutting down in 2 weeks. An offline version (fully opensource v4) of Stryker will be released within the next couple of months.
Until then you wont be able to: install, login, use premium tools inside the stryker
Thank you for your support and for being part of this journey.
๐ข21๐ค5โคโ๐ฅ4๐คฏ3โค1๐1