R3doubt

3.8K posts

R3doubt banner
R3doubt

R3doubt

@r3doubt

Katılım Ekim 2017
522 Takip Edilen331 Takipçiler
R3doubt retweetledi
hackaday
hackaday@hackaday·
Open Source Radar Has Up To 20 KM Range ift.tt/TJQroUL
English
25
296
2.5K
108K
R3doubt retweetledi
R3doubt retweetledi
Techjunkie Aman
Techjunkie Aman@Techjunkie_Aman·
Some Android phones can be fully decrypted in ~45 seconds. Researchers from @Ledger Donjon team discovered a flaw in parts of MediaTek’s secure boot chain. With physical access and just a USB cable, attackers can: • Dump encryption keys before Android boots • Decrypt the entire phone storage • Brute-force the lock PIN offline • Extract crypto wallet seed phrases The proof-of-concept was demonstrated on the Nothing CMF Phone 1. Wallets tested included: • Trust Wallet • Kraken Wallet • Phantom • Rabby • Base MediaTek issued a firmware patch earlier in 2026, but devices are only protected if the manufacturer ships the update. Many budget and mid-range phones using MediaTek chips could be affected. Update your device. Source : Bitget
Techjunkie Aman tweet media
English
31
168
1.1K
161.1K
R3doubt retweetledi
The Hacker News
The Hacker News@TheHackersNews·
⚠️ Attackers are abusing FortiGate firewalls as entry points. A SentinelOne report says exploits and weak credentials let intruders extract configs holding Active Directory service account credentials, then enroll rogue machines and scan internal networks. 🔗 FortiGate breach chain and AD access details → thehackernews.com/2026/03/fortig…
The Hacker News tweet media
English
9
113
407
47.4K
R3doubt retweetledi
EFF
EFF@EFF·
"Any method that can be misused to surreptitiously track people's movements without their knowledge is concerning," EFF’s Cooper Quintin told @CNET. "But so are all of the technologies in modern cars that intentionally violate drivers' privacy.” cnet.com/roadshow/news/…
English
6
46
103
4.6K
R3doubt retweetledi
Kali Linux
Kali Linux@kalilinux·
Kali & LLM: Completely local with Ollama & 5ire: We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing everything locally and offline. We are using our own hardware and not… kali.org/blog/kali-llm-…
Kali Linux tweet media
English
26
329
1.9K
113.6K
R3doubt retweetledi
Abhishek Yadav
Abhishek Yadav@yabhishekhd·
Bro Google is doing something wild. Starting September 2026 every Android developer has to give Google their government ID. Legal name. Home address. Phone number. And pay a fee. Even if they never use the Play Store. Even if they just put their app on their own website. So basically if you build any app for Android — Google wants to know exactly who you are. No exceptions. Brave, EFF, Tor Project and 40+ other organizations said no and signed an open letter against it. And think about who this really hurts. The people building privacy apps, VPNs, encrypted messaging, tools for journalists and activists. People who specifically chose to stay away from Google. Now Google wants their home address. Google is literally building a database of every person who writes Android software. Run by Google. Controlled by Google. Android was supposed to be the open system. The alternative to Apple locking everything down. Slowly it's starting to look the same. Is Android still actually open? 👇
Abhishek Yadav tweet media
English
347
2.1K
8.2K
507.9K
R3doubt retweetledi
Catherine Herridge
Catherine Herridge@C__Herridge·
EXCLUSIVE: Former US Army Pacific Commander, Retired 4-Star General Charles Flynn Warns of Arctic Vulnerabilities And Says CCP Has Already Infiltrated Alaska Military Bases With Cameras and Drones “I was stunned to find out the amount of penetrations that had been happening at our bases up there by Chinese nationals that were in the United States. These individuals were going to the gate. Some of them were getting into the installations and when they were getting into the installations, they would have cameras and unmanned aerial vehicles in the trunks of their cars.“ @thelatmg @latimesstudios_
Catherine Herridge@C__Herridge

BREAKING: Former Commander US Army Pacific Gen. Charles Flynn EXPOSES CCP’s Stealth War on America; Says President Trump’s Venezuela Raid Was a WARNING SHOT to Our Enemies And Explains Why United States National Security Strategy MUST Prioritize Asia I recently sat down with Gen. Charles Flynn, a retired 4-Star General who said the Chinese Communist Party operates a network of “hard spies” inside the US that exploits 300,000 Chinese students, has already infiltrated Alaska military bases with cameras and drones, and intentionally poisons American youth with fentanyl. Our full interview goes in depth on the Chinese cyber attacks Salt Typhoon & Volt Typhoon, the importance of American control over rare earth minerals, emerging threats in the Arctic, and more. FULL TRANSPARENCY: Our interview with Gen. Charles Flynn was recorded prior to Operation Epic Fury. Straight to the Point: CCP's Stealth War on America 00:37 China, US relationship will define this Century 01:10 China’s cyber strategy to disrupt, delay, deny US military operations 03:19 Chinese Communist Party’s spy network inside the US 04:29 Flynn: Chinese spies infiltrate Alaska base 06:23 Canada: China uses commerce for coercion 08:02 Rare Earth Minerals: China dominates physical separation 09:34 Venezuela: Operation showed US will not tolerate narco-trafficking 10:22 Venezuela: Foothold for Iran, Russia and China 10:37 Maduro raid: PhD level Joint Operations 13:01 President Trump’s use of hard power: Global deterrence 14:01 Must do a better job calling out CCP: COVID 14:59 China’s Communist Party used Fentanyl precursors to “harm” a generation of Americans 18:48 Pivot to Asia: US can’t decouple from China 19:27 Flynn: What it means to continue to serve 21:02 Independent Journalism @thelatmg @latimesstudios_

English
89
2.6K
5.3K
282K
R3doubt
R3doubt@r3doubt·
@AuronMacintyre Remember that time Lincoln took over the Whigs from inside the party and wore it like a skin suit? Neither do I because it didn't happen. Took the founding of the American Party under Fremont, and the implosion of the Whigs to get change via the Republicans.
English
0
0
1
53
R3doubt
R3doubt@r3doubt·
@AuronMacintyre For those who just learned the word "primary", look up "ranked choice voting". The establishment will do whatever it takes, the GOP belongs to the grifters and lobbyists and always will. And Trump will endorse their candidates every time, ex. Cornyn.
English
0
0
0
7
R3doubt
R3doubt@r3doubt·
@AuronMacintyre Because Goldwater/Reagan Revolution/Tea Party/MAGA didn't work, but let's do the same thing over again expecting different results.
English
1
0
0
16
Auron MacIntyre
Auron MacIntyre@AuronMacintyre·
The GOP Senate passed a vote on holding a dog show before they passed the SAVE Act They built a monument commemorating Jan 6th before a statue honoring a patriot like Pat Buchannan We need a revolution inside the GOP before we can save the country
English
84
489
3.2K
40.5K
R3doubt retweetledi
vx-underground
vx-underground@vxunderground·
Chat, all hell has broken loose in the Linux community. Linux nerds are discussing how they'd implement age verification at the OS level (if need be to comply with laws). Linux nerds are having a psychiatric meltdown. The nerds are revolting.
vx-underground tweet mediavx-underground tweet media
English
435
533
6.4K
484.6K
R3doubt retweetledi
Tom's Hardware
Tom's Hardware@tomshardware·
390TB video game archive being taken offline due to skyrocketing RAM, SSD, and hard drive prices — AI-driven supply squeeze results in closure of one of the largest online video game archives tomshardware.com/video-games/39…
English
21
123
552
26K
R3doubt retweetledi
Hunt.io
Hunt.io@Huntio·
🚨 New APT37 Campaign Shows That Air-Gapped Systems Aren’t Untouchable cybersecuritynews.com/north-korean-a… North Korean group APT37 is running a new campaign, “Ruby Jumper,” built to reach air-gapped systems. The infection chain starts with a malicious LNK file and moves through custom loaders, using USB drives to bridge isolated machines. For teams relying on physical isolation, this is a reminder to revisit removable media controls and endpoint monitoring. #ThreatIntelligence #CyberSecurity #APT37
English
2
81
351
23.4K