Chad_NFTs
320 posts

Chad_NFTs
@chad3431
Full-time Chad | Part-time Degen | Overtime on Laughing Through The AI Takeover 🚀 Building on Web3 Gaming, AI & Architect of my own obsolescence


Welcoming a new member of the family Get XChat for iOS: apple.co/4sVp8bF

PALZ beta drops soon! Jumping on X Spaces with @OntologyNetwork to talk: 🎮 What's coming in beta 🎟 How to get in early 🏠 Why ONT is the right home for PALZ Wednesday 22 April 2:30PM UTC. Come through




Hacking the #EU #AgeVerification app in under 2 minutes. During setup, the app asks you to create a PIN. After entry, the app *encrypts* it and saves it in the shared_prefs directory. 1. It shouldn't be encrypted at all - that's a really poor design. 2. It's not cryptographically tied to the vault which contains the identity data. So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app. After choosing a different PIN, the app presents credentials created under the old profile and let's the attacker present them as valid. Other issues: 1. Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying. 2. "UseBiometricAuth" is a boolean, also in the same file. Set it to false and it just skips that step. Seriously @vonderleyen - this product will be the catalyst for an enormous breach at some point. It's just a matter of time.


WhatsApp’s “E2E encryption by default” claim is a giant consumer fraud: ~95% of private messages on WhatsApp end up in plain-text backups on Apple/Google servers — not E2E-encrypted. Backup encryption is optional, and few people enable it — let alone use strong passwords.


Regarding recent press coverage

Computer use is now in Claude Code. Claude can open your apps, click through your UI, and test what it built, right from the CLI. Now in research preview on Pro and Max plans.














