现在我也不知道这频道发了啥了,各位慢慢吃瓜,将就着看

联系我请去 @abc1763613206

友链儿
@cyberElaina
@rvalue_daily
@billchenla
System Card: Claude Mythos Preview [pdf]
307 points by be7a ago | 185 comments
https://news.ycombinator.com/item?id=47679258
大模型推理JWT说是(
ping0.cc被曝利用WebRTC静默上报用户真实IP
https://www.nodeseek.com/post-674661-1
今天是yau的生日。轉發這條消息自我的手機到5個群聊,yau就會獎勵你一塊華為手表,還會允許你打手槍。這個機遇不可特意去求!我試過了,是假的,還不會受到任何處分,還會被移出群聊,還會被記兩次大過。但今天真的是yau的生日。
User-Agent
Tech & Leaks Zone
Photo
需要顺便说一句的是,源代码里的 TrustedBot 除了上文的 @nekonotificationbot(1190800416)外,还同时出现了 @WatchdogNextBot (6371744499),供参考。
为验证这一点,我们制作了一个PoC:一个LSPosed模块,将机器人ID和用户名替换为我们自己的信息,这样所有请求都会发送到我们的服务器上。通过这种方式,我们确认电话号码确实在被收集。每次登录都会如此。

该PoC可在此处获取: https://github.com/RomashkaTea/nekogram-proof-of-logging

https://t.me/EvolutionXOfficial/2488 GitHub - RomashkaTea/nekogram-proof-of-logging: A proof of Nekogram sending phone numbers to the developer
EXPOSED: Source Code Evidence of Nekogram Phone Number Harvesting

1. Exfiltration Logic: The function uo5.g() (reconstructed as logNumberPhones) silently collects the UserID and Phone Number of every account logged into the app (up to 8 accounts).

2. Transmission: Data is sent via Inline Queries to the bot @nekonotificationbot. This is done programmatically, so no message appears in your "Sent" history.

3. Target Bots: Three bots embedded in the client's obfuscated code:
@nekonotificationbot: Receives the automated phone number uploads.
@tgdb_search_bot and @usinfobot: : An OSINT bot mentioned in the obfuscated classes.

4. Security Token: The app uses a hardcoded secret key 741ad28818eab17668bc2c70bd419fc25ff56481758a4ac87e7ca164fb6ae1b1 as a prefix for the stolen data, likely to authenticate with the bot's backend.

5. The image shows that Nekogram always wants to get the "reg date".

Unfortunately the Google Play Store version is also affected!!!

Follow
@TechLeaksZone
Media is too big
VIEW IN TELEGRAM
BREAKING: Nekogram is secretly transmitting your telegram account phone number to the developer

According to SOTA,
"The backdoor is hidden in the http://Extra.java file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace. The same file implements account 'doxing' via several bots; it is possible that the leaked data is used to populate their databases."

Additionally, the creator of the Nekogram client, (presumably a Chinese national) was previously known for conducting DDoS attacks and unethical online behavior (including death threats against acquaintances).

Apparently, in the early versions of the client, de-anonymization was applied only to Chinese phone numbers, which could have been used for political surveillance;. However, it is now applied to all users.

Follow @TechLeaksZone
什么 openclaw 都是小儿科,给我 instructkr/claude-code 擦皮鞋
全球首款双摄云台相机影石Nuna宣传片(待审核)
轻轻一扭,轻松拍出360°全景画面;搭配可拆卸镜头设计,随时转换第一视角;1200倍变焦+微距,不管是远在天边还是近在眼前,都能清晰捕捉;翻转屏秒变小风扇,炎炎夏日也要拍出“呼吸感”大片;同时支持手动发电,10分钟就能充至80%;内置带轮三脚架,一个人旅行也能全程跟拍,出门带它就够了!

这样的Nuna,你想试试吗?

@影石Insta360:
发布视频
播放量:8742 弹幕:166 评论:235
点赞:811 投币:195 收藏:139 转发:548
发布日期:2026-04-01 02:30:00
上传日期:2026-03-31 18:27:37
🔝> @影石Insta360:
【转发+关注】说说你最喜欢Nuna的哪个功能,5月1日抽1位朋友送69元购买新品的福利(我保证这句是认真的(°∀°)ノ)


via @bilifeedbot
Media is too big
VIEW IN TELEGRAM
Back to Top