techbites

@techbites@techbites.info

Your tech-savvy guide, passionate about exploring the ever-evolving landscape of technology.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

techbites, to android

Hey there, fellow internet explorer! Have you ever felt like your browser should reflect your unique browsing habits and preferences? Well, that’s where Vivaldi steps in. As an avid Vivaldi user, I can attest to its unparalleled customization options, especially when it comes to organizing your favorite websites with Speed Dial folders. Today, I’m excited to share with you a simple guide on how to create and customize Speed Dial folders in Vivaldi, right from your Android device.

https://techbites.info/wp-content/uploads/2024/03/screenshot_20240316-233958_vivaldi3862862443086079015-473x1024.jpgMy Vivaldi HomepageCreating Speed Dial Folders:

Long Press and Drag & Drop:

To start organizing your Speed Dial links into folders, simply long press on a Speed Dial link and drag it on top of another link icon. Voila! A new folder named “New Folder” will magically appear.

Renaming Folders:

Want to give your folder a personalized touch? No problem. Long press on the folder icon and select “Edit Speed Dial.” This action will take you to a new screen where you can easily rename your folder to something more fitting.

Thanks for tuning in to discover the wonders of Vivaldi’s Speed Dial folders. I hope this guide has inspired you to take your browsing experience to the next level. Stay tuned for more tips and tricks to make the most out of your time on the web. Until next time, happy browsing!

https://techbites.info/featured/customizing-vivaldi-for-android-speed-dial-folders/

#android #browser #Customization #Vivaldi #VivaldiForAndroid

image/jpeg

vidma_recorder_16032024_234501.mp4
vidma_recorder_16032024_234850.mp4

techbites, to apple

In a recent discovery, privacy researcher Tommy Mysk has revealed a concerning loophole in popular iOS apps, shedding light on how they exploit a push notification feature to clandestinely gather detailed user device data. Despite Apple’s firm stance against fingerprinting, these apps have found a backdoor to track users through their hardware and software features, raising significant privacy concerns.

Mysk’s investigation uncovered a recurring pattern among various social media apps like TikTok, Facebook, Instagram, and others. These apps take advantage of a push notification feature introduced in 2016, which allows them to run code in the background when triggered by a notification, even when the app is not actively in use. While this capability may seem innocuous, it serves as a gateway for surreptitious data collection.

Here’s how it works: when a user receives a push notification, iOS quietly wakes up the corresponding app in the background, enabling it to execute predefined code. While this code may ostensibly enhance notification presentation, it also enables the extraction of a wealth of device information. Apps exploit this window to gather data such as system uptime, locale, battery status, device model, and more. This aggregated data forms a comprehensive profile of users, allowing for cross-app tracking and behavioral analysis.

Mysk highlights how apps like TikTok and Facebook leverage this loophole to collect device-specific data, such as boot time, which is then transmitted to remote servers. By consistently transmitting this data, companies can uniquely identify devices and correlate user activity across different apps. Furthermore, some apps exploit iOS’s Notification Center to transmit additional information, compounding privacy concerns.

Apple has responded to these revelations by introducing new regulations aimed at curbing such data harvesting practices. Developers will now be required to justify the necessity of accessing device information through specific APIs, including third-party SDKs. They will need to provide “approved reasons” for accessing device data, fostering transparency and accountability. However, the effectiveness of these measures remains uncertain and hinges on Apple’s enforcement and developers’ compliance.

As technology continues to evolve, vigilance and proactive measures are essential to safeguard user privacy. The exploitation of push notification features underscores the ongoing battle for privacy in the digital age. Moving forward, it’s crucial for both tech companies and regulatory bodies to prioritize user privacy and implement robust measures to protect it.

Stay tuned to TechBites for the latest updates on privacy, security, and technological advancements.

https://techbites.info/privacy-cybersecurity/revealed-how-popular-ios-apps-exploit-push-notifications-to-harvest-user-data/

techbites, to Bulgaria

SpaceX CEO Elon Musk recently refuted claims of any involvement with the Russian market, following reports suggesting that Russian troops were utilizing Starlink devices along the active front lines to access SpaceX’s satellite internet service.

Speculation regarding Starlink’s presence in Russian hands surfaced on social media platforms last week, as Defense One reported sightings of Starlink terminals at alleged Russian positions and in the possession of Russian volunteers. Allegations further suggested that the Kremlin procured SpaceX’s devices through a third-party in Dubai.

Ukrainian intelligence later corroborated these claims, asserting that evidence of Russian possession of Starlink devices existed along the front lines. Andrii Yusov of the Defense Intelligence of Ukraine emphasized the systemic nature of Russian usage of Starlink, echoing previous reports of increasing accessibility of SpaceX’s terminals by the Kremlin.

Responding to the allegations, Elon Musk categorically denied any direct or indirect sales of Starlink terminals to Russia. SpaceX reiterated that Starlink services were inactive in Russia, and the company had not marketed or shipped terminals to Russian locations. Despite reports of some Russian stores offering Starlink terminals, SpaceX deemed these claims as fraudulent.

Starlink denies that it is used in Russia or sold by an intermediary in Dubai, but what that statement omits is that the accusations are not about the usage in Russia but by usage of the Russian military which operates in Ukraine.

Even the Starlink Availability map shows that… https://t.co/rKWKlUUhf8 pic.twitter.com/xBmXDe8EyJ

— (((Tendar))) (@Tendar) February 10, 2024

While SpaceX acknowledged the absence of official third-party intermediaries or distributors of Starlink in Dubai, concerns persisted regarding potential unauthorized usage of Starlink equipment by sanctioned parties. SpaceX vowed to investigate and deactivate terminals found to be used unlawfully, although distinguishing legitimate usage from illicit activities remained challenging.

Starlink’s role in supporting Ukraine during Russia’s invasion in March 2022 was noted, with the service aiding military communications and facilitating civilian connectivity amidst damaged infrastructure. Initially provided free of charge to the Ukrainian military by Elon Musk, SpaceX later secured a contract from the Pentagon to offer services in Ukraine, although specific details of the agreement remained undisclosed.

The controversy surrounding Starlink’s alleged use by Russian forces underscores broader concerns about the intersection of technology and geopolitics, highlighting the challenges faced by companies operating in politically sensitive regions. As the situation unfolds, SpaceX faces mounting scrutiny over the integrity and security of its satellite internet service amidst global tensions.

https://techbites.info/news/spacexs-starlink-faces-controversy-amidst-allegations-of-russian-use/

techbites, to fediverse

In a recent announcement, Pixelfed creator Daniel Supernault (@dansup), shared exciting news for Pixelfed instance administrators. A forthcoming feature is set to empower admins by allowing the storage of imported media from Instagram directly on S3 Storage.

The development is part of a pull request (PR) on GitHub, where Supernault detailed the functionality of the feature. Admins will soon have the ability to opt-in to store Instagram-imported media on S3 filesystem driver. This marks a significant enhancement for Pixelfed instances, providing a seamless integration for media management.

Key Configuration Details:

To enable or disable the feature, admins can set PF_IMPORT_IG_CLOUD_STORAGE to true or false. Notably, this can only be activated if Cloud Storage (PF_ENABLE_CLOUD) is enabled. However, admins have the flexibility to disable this feature and retain Instagram-imported media locally, even with Cloud Storage enabled.

Existing local media will be seamlessly migrated without requiring any action from admins. A cron job will automatically handle the migration of both existing and new Instagram media. While the process may take some time for instances with substantial media content, Pixelfed assures administrators that the system is designed to efficiently manage the transition.

Migration Process:

During the migration, Pixelfed has chosen to silently update media URLs to avoid sending unnecessary “Update” activities. This careful approach ensures a smooth experience for users, with local media URLs gracefully redirecting to their corresponding S3 URLs when appropriate.

Pixelfed’s commitment to user experience and efficient media management is evident in this upcoming feature. Admins can anticipate enhanced control over media storage, providing a more seamless and scalable solution for Pixelfed instances.

The Pixelfed community eagerly awaits the official release of this feature, anticipating its positive impact on the platform’s media management capabilities.

What’s your Reaction?

+1

1

+1

0

+1

0

+1

0

+1

0

+1

0

<a class="share-btn share-btn-facebook" data-platform="facebook" style="border-radius: 30px;"> Facebook </a> <a class="share-btn share-btn-twitter" data-platform="twitter" style="border-radius: 30px;"> Twitter </a> <a class="share-btn share-btn-email" data-platform="email" style="border-radius: 30px;"> Email </a>

https://techbites.info/fediverse/pixelfed-announces-upcoming-feature-for-admins-instagram-media-storage-on-s3/

techbites, to iran

Microsoft’s threat intelligence team revealed that Iranian cyberspies, identified as Peach Sandstrom, are targeting defense industrial base organizations with a new backdoor named FalseFont. This malware grants remote access to compromised systems, enables the execution of additional files, and facilitates data transmission to its command-and-control servers. The backdoor was initially detected in use against targets in early November 2023.

Mandiant, tracking the Iran-backed group as APT33, highlights their strategic cyberespionage focus on organizations in the US, Saudi Arabia, and South Korea. Their targets include commercial and military aviation companies, as well as energy sector entities linked to petrochemical production.

According to Mandiant’s alert updated in October, APT33’s activities involve malware tied to an Iranian individual, potentially working for the Iranian government to conduct cyber threats against adversaries.

Earlier research by Microsoft revealed APT33 engaging in password spraying attacks across thousands of organizations. Following successful breaches, Peach Sandstorm employed a mix of publicly available and custom tools to navigate networks, establish persistence, and move laterally within the victim’s IT systems.

Microsoft noted instances where Peach Sandstorm exfiltrated data from compromised environments, although this occurred in a limited number of intrusions.

Source: Microsoft’s X Posts

https://techbites.info/news/cybersecurity/microsoft-warns-of-iranian-cyberspies-using-falsefont-backdoor/

#cyber #iran #microsoft #security #tech

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • tacticalgear
  • DreamBathrooms
  • InstantRegret
  • magazineikmin
  • Youngstown
  • everett
  • anitta
  • slotface
  • GTA5RPClips
  • rosin
  • thenastyranch
  • kavyap
  • mdbf
  • Leos
  • modclub
  • osvaldo12
  • Durango
  • khanakhh
  • provamag3
  • cisconetworking
  • ngwrru68w68
  • cubers
  • tester
  • ethstaker
  • megavids
  • normalnudes
  • lostlight
  • All magazines