现在我也不知道这频道发了啥了,各位慢慢吃瓜,将就着看

联系我请去 @abc1763613206

友链儿
@cyberElaina
@rvalue_daily
@billchenla
【重要通知】播放页暂停广告功能即将上线
播放页暂停广告将于4月10日上线。收益将基于转化效果计算,与基础激励合并展示。
播放页暂停广告,是指用户在App端手动暂停视频时,概率触发的展示在播放器下方的广告。
为确保用户正常观看体验,用户可在广告出现前或广告出现后随时取消、关闭该广告。
若您希望关闭播放页暂停广告,您可前往【创作激励-广告设置-暂停广告设置】操作关闭。
感谢您的支持与理解。
System Card: Claude Mythos Preview [pdf]
307 points by be7a ago | 185 comments
https://news.ycombinator.com/item?id=47679258
大模型推理JWT说是(
ping0.cc被曝利用WebRTC静默上报用户真实IP
https://www.nodeseek.com/post-674661-1
今天是yau的生日。轉發這條消息自我的手機到5個群聊,yau就會獎勵你一塊華為手表,還會允許你打手槍。這個機遇不可特意去求!我試過了,是假的,還不會受到任何處分,還會被移出群聊,還會被記兩次大過。但今天真的是yau的生日。
User-Agent
Tech & Leaks Zone
Photo
需要顺便说一句的是,源代码里的 TrustedBot 除了上文的 @nekonotificationbot(1190800416)外,还同时出现了 @WatchdogNextBot (6371744499),供参考。
为验证这一点,我们制作了一个PoC:一个LSPosed模块,将机器人ID和用户名替换为我们自己的信息,这样所有请求都会发送到我们的服务器上。通过这种方式,我们确认电话号码确实在被收集。每次登录都会如此。

该PoC可在此处获取: https://github.com/RomashkaTea/nekogram-proof-of-logging

https://t.me/EvolutionXOfficial/2488 GitHub - RomashkaTea/nekogram-proof-of-logging: A proof of Nekogram sending phone numbers to the developer
EXPOSED: Source Code Evidence of Nekogram Phone Number Harvesting

1. Exfiltration Logic: The function uo5.g() (reconstructed as logNumberPhones) silently collects the UserID and Phone Number of every account logged into the app (up to 8 accounts).

2. Transmission: Data is sent via Inline Queries to the bot @nekonotificationbot. This is done programmatically, so no message appears in your "Sent" history.

3. Target Bots: Three bots embedded in the client's obfuscated code:
@nekonotificationbot: Receives the automated phone number uploads.
@tgdb_search_bot and @usinfobot: : An OSINT bot mentioned in the obfuscated classes.

4. Security Token: The app uses a hardcoded secret key 741ad28818eab17668bc2c70bd419fc25ff56481758a4ac87e7ca164fb6ae1b1 as a prefix for the stolen data, likely to authenticate with the bot's backend.

5. The image shows that Nekogram always wants to get the "reg date".

Unfortunately the Google Play Store version is also affected!!!

Follow
@TechLeaksZone
Media is too big
VIEW IN TELEGRAM
BREAKING: Nekogram is secretly transmitting your telegram account phone number to the developer

According to SOTA,
"The backdoor is hidden in the http://Extra.java file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace. The same file implements account 'doxing' via several bots; it is possible that the leaked data is used to populate their databases."

Additionally, the creator of the Nekogram client, (presumably a Chinese national) was previously known for conducting DDoS attacks and unethical online behavior (including death threats against acquaintances).

Apparently, in the early versions of the client, de-anonymization was applied only to Chinese phone numbers, which could have been used for political surveillance;. However, it is now applied to all users.

Follow @TechLeaksZone
Back to Top