libreware | Неотсортированное

Telegram-канал libreware - Libreware

4805

Libreware Software Library 📡 t.me/Libreware ★ Send us your suggestions and menaces here: https://t.me/joinchat/nMOOE4YJPDFhZjZk

Подписаться на канал

Libreware

#Linux devices have a unique identifier called machine-id. Here is how to change it.

Posted on February 24, 2021

What is a machine-id, and why should you randomize it? From the machine-id man pages, it is defined as:

This ID uniquely identifies the host. It should be considered “confidential”, and must not be exposed in untrusted environments, in particular on the network. If a stable unique identifier that is tied to the machine is needed for some application, the machine ID or any part of it must not be used directly.
https://www.man7.org/linux/man-pages/man5/machine-id.5.html


In an effort to promote privacy, having a unique and unchanging identifier tied to your device seems like the wrong approach. It’s quite possible that poorly coded or even maliciously coded software could fetch this ID from your system. Let’s make sure that even if that does happen, that the value is constantly changing so that your device can not be uniquely identified as your device.
This is an incredibly simple and quick adjustment to your default Linux system. What we’re doing is showing you how to either adjust this value manually by hand, or by running a cronjob to change this value every minute with a new, randomized value.
Before we begin, a disclaimer: We’ve tested this on our own work desktops and development environments and I’ve tested it on my daily driver desktop. We have not found that anything has ‘broken’ because of this, but this is untested in many environments and may not be suitable for your use. It’s always reversible if you later wish to continue with a single, uniquely identifying ID attached to your device(s).
Debian / Ubuntu systems
To check your machine-id, open up your terminal and enter the following:
cat /etc/machine-id
The output should look a little something like this:
a9976154f0084a3782892638656ad9fd
You’ll note that this value is also stored in /var/lib/dbus/machine-id and that a symlink between the two exist. Any change to one file, will be reflected in the other.
me@virtbox-testing:~$ cat /etc/machine-id a9976154f0084a3782892638656ad9fd me@virtbox-testing:~$ cat /var/lib/dbus/machine-id a9976154f0084a3782892638656ad9fd
If you reboot your device, you’ll notice that this value remains unchanged. So, let’s change it ourselves!
Method 1: Manually.
Method 2 is automatically, every minute, as ran by a cron-job. If you don’t want to fully commit to that, you can change your machine-id by hand manually whenever you feel like it.
Step 1, remove the old machine-id file.
sudo rm /etc/machine-id
Step 2, recreate the machine-id file.
sudo systemd-machine-id-setup
Step 3, confirm that /etc/machine-id (and /var/lib/dbus/machine-id) now show a new value, different from the original.
cat /etc/machine-id && cat /var/lib/dbus/machine-id
That’s it! You should see two lines in your output with matching IDs that differ from the original machine-id you had in the beginning.
me@virtbox-testing:~$ cat /etc/machine-id && cat /var/lib/dbus/machine-id a78badce3e73beced163bbef7e55232a a78badce3e73beced163bbef7e55232a
You’ve changed your device’s uniquely identifying machine-id. This change will survive device reboots and will remain the same until you create a new one.
Method 2: Changing every 1 minute, automatically.
If the above didn’t satisfy your needs, than feel free to automate the creation of a new machine-id by creating a cronjob entry that will generate a new ID every minute.
Step 1, open up your crontab file.
sudo crontab -e
Step 2, enter at the bottom of the file the following:
*/1 * * * * sudo rm /etc/machine-id && sudo systemd-machine-id-setup
Save and Exit.
Step 3, wait a minute and confirm that your machine-id value has changed:
cat /etc/machine-id && cat /var/lib/dbus/machine-id
You should see two new matching values, that differs from the original value you had at the start. Wait a minute and run the step 3 command again, and you’ll see that these values have changed.

Читать полностью…

Libreware

#Android #web #browsers

Ungoogled Chromium (forked from cromite) with Bromite patches and additional codecs
https://github.com/macchrome/droidchrome/releases
https://chromium.woolyss.com/#android

Cromite is another example of ungoogled chromium without the extra codecs from the above link, but cromite includes more patches as noted at github.
https://github.com/uazo/cromite
Fdroid repo
https://www.cromite.org/fdroid/repo?fingerprint=49f37e74dee483dca2b991334fb5a0200787430d0b5f9a783dd5f13695e9517b

For an Android Firefox based browser, use IronFox
https://gitlab.com/ironfox-oss/IronFox/-/releases
Fdroid repo
https://fdroid.ironfoxoss.org/fdroid/repo?fingerprint=c5e291b5a571f9c8cd9a9799c2c94e02ec9703948893f2ca756d67b94204f904

These can be added to Obtainium to download the latest release when they are available
https://github.com/ImranR98/Obtainium

Читать полностью…

Libreware

IronFox

IronFox is a fork of DivestOS's Mull Browser based on #Firefox that has been discontinued. Our goal is to continue the legacy of #Mull to provide a secure, hardened and privacy-oriented #browser for daily use.

And add the release link to Obtainium: https://gitlab.com/ironfox-oss/IronFox/-/releases

Don't forget to use extensions uBlock Origin and Libredirect only. Adding more extensions will cause fingerprinting and most are false security.
- uBlock Origin
-- add the ai blocklist to uBO

- LibRedirect
-- setup all the sites you want to redirect to and choose your mirrors for them.


Set your default search to 4get
(Captcha) https://4get.ca/web?s=%s
(No captcha) https://4get.ch/web?s=%s

Finally, go through all the ironfox settings and set them how you would prefer them.

Read the gitlab page. Specifically...

Known Issues
Please see the list of known issues and workarounds before opening an issue!

Issues inherited from Mull that still apply to IronFox *(contents adapted from DivestOS's website)*

You should also see here for a list of websites with known issues due to hardening, and what you may need to do to fix them. This list is maintained by Phoenix - so while it isn't specific to IronFox or Mull, many of these problems do still apply.
Ironfox has Phoenix already, but this can be added to other browsers on Android and desktop.

Читать полностью…

Libreware

microG GMSCore v0.3.6.244735 has been released on 2024-12-23.



UPDATE HIGHLIGHTS:

This is a feature and bugfix/compatibility update. There is at least one report of a new issue with this release.

If you have critical reliance on your device you may want to wait a week or two until more user reports are in before updating to this. (UNLESS you are still on 0.2.27 for UNLP reasons. Scroll to the bottom of this doc for more info before installing.)


New Features Overview


Initial Support for Play Integrity

If you need this, you probably already know what it is. We doubt this is going to be some magic solution as Google is always targeting to block custom ROM users with this tool, but it may improve compatibility for some users. Let us know how it works for you.


Add support in the Self-Check Page to show compatibility with Google’s new app signing regime

Google recently broke compatibility with Google Apps and future apps downloaded from Google Play by changing their app signing scheme.

This requires a change in your app signature spoofing solution, either inside your ROM or in an external add-on. This change will show you if your ROM or signature spoofing solution has updated to support this Google change.


Other improvements

Improve Google Play Games compatibility, general compatibility improvements, various bugfixes, language translation updates.

For a full changelog, see the links below.


Github release page
Includes release notes overview
https://github.com/microg/GmsCore/releases/tag/v0.3.6.244735


DETAILED changelogs with code commits:

0.3.5 —> 0.3.6
https://github.com/microg/GmsCore/compare/v0.3.5.240913...v0.3.6.244735



========


UPDATING:


* This has been flagged as a PREVIEW release on the microG website and F-droid repo.

Since this is a “Preview” release, it will NOT be suggested to you as a new update unless you have your client configured to offer "unstable” software versions, or select the new version manually in the “Versions” dropdown at the bottom of the app page on F-droid.


The most straightforward way to update the microG core module for most people is by using the F-droid client, with the special microG F-droid repo added. (See our “f-droid-repo” group note here)

You can also update microG on an existing installation by downloading the new APK from the official microG Github download page or website, and install it like any other standalone APK.



REMEMBER THAT THERE ARE TWO MAIN MICROG COMPONENTS: GmsCore and microG Companion. Always update both together, and ensure the version numbers match.

If you use a ROM which bundles microG and the above update methods do not work, you may have to wait for your ROM to update to the new microG version. Ask your ROM developer.

For new installs, the 3rd-party installer bundles will be updated as per each developer's workflow.

Читать полностью…

Libreware

Home Assistant Voice Preview Edition

Open, local, and private #voice #assistant

https://www.home-assistant.io/voice-pe/

Resources
https://voice-pe.home-assistant.io/resources/
https://github.com/esphome/home-assistant-voice-pe

Community
https://community.home-assistant.io/

Specs
SoC ESP32-S3 SoC with 16 MB of FLASH storage 8 MB octal PSRAM
Audio Processing XMOS XU316
Featuring:
Echo cancellation
Stationary noise removal
Auto gain control
Dedicated I2S lines for audio in and out
Power / data USB-C, 5 V DC, 2 A
Radios 2.4 GHz Wi-Fi
Bluetooth 5.0
Audio output 3.5 mm (⅛”) stereo headphone jack
Digital to analog converter (DAC): TI AIC3202
48 kHz sampling rate
Software
ESPHome preloaded
Fully open-source firmware for both the ESP32 and XMOS chip

#iot #homeassistant

Читать полностью…

Libreware

Telegram Maltego

a free set of Transforms for Maltego that enables OSINT investigations in the Telegram messenger.
Initially designed solely to simplify de-anonymization through stickers/emojis, it has since expanded far beyond its original functionality, allowing for more advanced investigations.

Features:
Getting Telegram profile by phone number
Getting a linked Telegram channel group
Getting a list of Telegram group administrators
Getting a list of authors of a Telegram channel
Collect all forwarded & similar channels by Channel
Search for deleted posts and generate links to view them
Indexing of all stickers/emoji in Telegram channel
Identification of the creator of a set of stickers/emoji

https://github.com/vognik/maltego-telegram

#tg #telegram

Читать полностью…

Libreware

How to trace IP of someone's id in telegram using Golang!

Code:
package mai

import (
"fmt"
"log"
"os"
"os/exec"
"strings"
)

func main() {
const CAP_PATH = "/tmp/tg_cap.pcap" // Temporary path for pcap capture file
const CAP_TEXT = "/tmp/tg_text.txt" // Temporary path for text file with information
const CAP_DURATION = "5" // Capture duration in seconds

// Get the external IP address of the device
ipCmd := exec.Command("curl", "-s", "icanhazip.com")
ipOutput, err := ipCmd.Output()
if err != nil {
log.Fatal("Failed to get IP address:", err)
}
MY_IP := strings.TrimSpace(string(ipOutput))

// Check if Wireshark is installed
_, err = exec.LookPath("tshark")
if err != nil {
log.Println("[-] Wireshark not found. Try installing Wireshark first.")
log.Println("[+] Debian-based: sudo apt-get install -y tshark")
log.Println("[+] RedHat-based: sudo yum install -y tshark")
os.Exit(1)
}

fmt.Println("[+] Discovering User's IP Address on Telegram using Golang")
fmt.Println("[+] Starting traffic capture. Please wait for", CAP_DURATION, "seconds...")

// Start traffic capture with Wireshark
captureCmd := exec.Command("tshark", "-w", CAP_PATH, "-a", "duration:"+CAP_DURATION)
captureOutput, err := captureCmd.CombinedOutput()
if err != nil {
log.Fatal("Traffic capture error:", err)
}

fmt.Println("[+] Traffic captured.")

// Convert pcap file to readable text file
convertCmd := exec.Command("tshark", "-r", CAP_PATH)
convertOutput, err := convertCmd.Output()
if err != nil {
log.Fatal("Error converting pcap file to text:", err)
}

err = os.WriteFile(CAP_TEXT, convertOutput, 0644)
if err != nil {
log.Fatal("Error writing text file:", err)
}

fmt.Println("[+] Pcap file successfully converted to text.")

// Check if Telegram traffic is present in the text file
if strings.Contains(string(convertOutput), "STUN 106") {
fmt.Println("[+] Telegram traffic found.")

// Extract the IP address from the text
extractCmd := exec.Command("cat", CAP_TEXT, "|", "grep", "STUN 106", "|", "sed", "'s/^.*XOR-MAPPED-ADDRESS: //'", "|", "awk", "'{match($0,/[0-9]+\\.[0-9]+\\.[0-9]+\\.[0-9]+/); ip = substr($0,RSTART,RLENGTH); print ip}' | awk '!seen[$0]++'")
extractOutput, err := extractCmd.Output()
if err != nil {
log.Fatal("Error extracting IP address:", err)
}

TG_OUT := strings.TrimSpace(string(extractOutput))
IP_1 := strings.Fields(TG_OUT)[0]
IP_2 := strings.Fields(TG_OUT)[1]

var IP string

// Check if the IP address is ours or the recipient's
if MY_IP == IP_1 {
IP = IP_2
} else if MY_IP == IP_2 {
IP = IP_1
} else {
IP = "[-] Sorry. IP address not found."
os.Exit(1)
}

// Get host information for the IP address
hostCmd := exec.Command("host", IP)
hostOutput, err := hostCmd.Output()
if err != nil {
log.Fatal("Error getting host information:", err)
}

fmt.Println("[+]")
fmt.Println("[+] IP Address:", IP)
fmt.Println("[+] Host:", strings.TrimSpace(string(hostOutput)))
fmt.Println("[+]")

// Clean up temporary files
err = os.Remove(CAP_PATH)
if err != nil {
log.Fatal("Cleanup error:", err)
}

err = os.Remove(CAP_TEXT)
if err != nil {
log.Fatal("Cleanup error:", err)
}

fmt.Println("[+] Cleanup completed.")
} else {
fmt.Println("[-] Telegram traffic not found.")
fmt.Println("[!]")
fmt.Println("[!] Run this script only >>>AFTER<<< the response.")
fmt.Println("[!]")
os.Exit(1)
}

fmt.Println("[?]")
fmt.Print("[?] Run whois", IP, "? (Y/N): ")

// Check if the user wants to run the whois command
var answer string
fmt.Scanln(&answer)

Читать полностью…

Libreware

Kaonic 1S is our flagship Single Board Computer with dual integrated long range radios.

It enables capabilities that were only available to the military sector before, such as encrypted live audio calls over mesh networks.

Meshing is based on the revolutionary Reticulum mesh network, with our own backwards compatible Rust port for much higher performance.

Our firmware and software is open source, allowing users to modify the system to their own needs and providing full transparency of the system’s capabilities.

Kaonic is the future of decentralised off grid communication.

Читать полностью…

Libreware

for which operating systems is your software available ?

Читать полностью…

Libreware

Could you please explain (for a regular end user) exactly how to communicate with other Kaonic radios, send text, audio files, etc.

Has any end-user software been written yet? In other words, as a non-dev, how would I use it?

Читать полностью…

Libreware

Kaonic will enable unstoppable, uncensorable mesh networks everywhere. Our production is now ramping up and nothing can stop it

Читать полностью…

Libreware

Simulated area coverage between two Kaonic 1S at 1 Watt output power at 500 metre antenna altitude (drone scenario):

926 km² (575 mi²)

Читать полностью…

Libreware

beechatnetwork/introducing-kaonic-long-range-radio-mesh-networking-sbc-single-board-computer-with-10x-speeds-248e7957a193" rel="nofollow">https://medium.com/@beechatnetwork/introducing-kaonic-long-range-radio-mesh-networking-sbc-single-board-computer-with-10x-speeds-248e7957a193

Читать полностью…

Libreware

In case you're searching for wifi and Ethernet #routers with open source #Openwrt Linux distribution here's some trustworthy ones

Openwrt One
https://openwrt.org/toh/openwrt/one
https://docs.banana-pi.org/en/OpenWRT-One/BananaPi_OpenWRT-One

Turris
https://www.turris.com
https://openwrt.org/toh/turris/turris_omnia

GL-inet
https://www.gl-inet.com
https://openwrt.org/toh/gl.inet/start

Читать полностью…

Libreware

Pandora

A red team tool that assists into extracting/dumping master credentials and/or entries from different #password managers.

This is a red team tool that assists in gathering credentials from different password managers. They are separated into three categories, Windows 10 desktop applications, browsers, and browser plugins. This may work on other OS, like Linux, but it is not tested yet. In this release (v1.0), the tool supports 14 password managers, with 18 different implementations (e.g., the tool could dump credentials either from the desktop app, or the browser plugin of the same product). Specifically, in most cases, password managers must be up and unlocked for the tool to work.

https://github.com/efchatz/pandora

Читать полностью…

Libreware

https://archive.is/0OLMG

how to change #linux machine-id

Читать полностью…

Libreware

Changelog : v4.6.4 (65)

• Fixed issues with shared library installation for apps like Chrome and WebView
• Support for login into personal account using microG
• Fixed an issue with auth verification
• Translation updates; Additional strings localized

Читать полностью…

Libreware

Google Apps update


If you're having problems with various Google Apps not working properly starting within the last 2 weeks or so, check this out:

Google recently changed the method used to create app signatures on all Google Apps, and will be rolling these changes out to ALL apps distributed via Google Play starting next year.

This requires all app signature spoofing methods (either embedded within your ROM or used as an external patch) to be updated to continue to support apps distributed via Google Play on a device running microG.


The Github comment linked below contains a list of which ROMs and signature spoofing patches have imported the changes necessary to support the new Google Play app signing mechanism.

We advise you to NOT do any updates of apps sourced from Google Play - especially paid apps or any app that does license-checking - until you have these fixes applied on your devices or those apps may stop working!



(I do not know if the linked post will be continuously updated to reflect news about other ROMs etc but it is correct as of the time of posting. Most ROMs based on LOS should get these patches eventually. Please check with your ROM maintainer.)



https://github.com/microg/GmsCore/issues/2680#issuecomment-2548579352

Читать полностью…

Libreware

Very sadly DivestOS come to the end 😱😭

Anniversary and Final Update¶
Notes from Tavi

December marks 10 years of #DivestOS!
There were over 7,000 git commits created in this time.
I believe the projects were highly successful in their goals, however this month will mark the end.
DivestOS and its apps will not receive any further updates.
Hypatia and Carrion will no longer receive database updates.
The non-mobile Divested projects (eg. Brace, D-WRT, real-ucode, and DNS blocklists) will continue to be maintained.
Most of our forum threads will be closed and the DivestOS XMPP chat rooms will also be turned off.
Donations will no longer be accepted and all recurring donations will be cancelled.
Thank you to all the users, contributors, and donors for this time. -Tavi

https://divestos.org/pages/news#end

Читать полностью…

Libreware

#NewPipe on #Linux, Using Android_translation_layer

https://flathub.org/apps/net.newpipe.NewPipe

Comments
https://news.ycombinator.com/item?id=41963932

#yt

Читать полностью…

Libreware

Continuation:

if strings.ToUpper(answer) == "Y" {
        whoisCmd := exec.Command("whois", IP)
        whoisOutput, err := whoisCmd.Output()
        if err != nil {
            log.Fatal("Error running whois command:", err)
        }

        fmt.Println(string(whoisOutput))
    } else {
        fmt.Println("[+] Goodbye!")
        os.Exit(0)
    }
}


Source: Internet :)

Читать полностью…

Libreware

Find out the #IP address through a call to #Telegram

ibederov_en/find-out-the-ip-address-through-a-call-to-telegram-a899441b1bac" rel="nofollow">https://medium.com/@ibederov_en/find-out-the-ip-address-through-a-call-to-telegram-a899441b1bac

Github: https://github.com/n0a/telegram-get-remote-ip

#tg

Читать полностью…

Libreware

Kaonic is compatible with Android, Windows, Mac, Linux and iOS.
However iOS doesn't provide open access to USB ports, so only WiFi/BT tethering will work with it.

Читать полностью…

Libreware

1. Install the Kaonic app: the download link will be on the QR code within the package
2. Create an account (no information is sent to any server) you can do this purely offline.
3. Log in
4. You can start scanning the network around you and find surrounding nodes.
5. Click on a user to begin chatting, sending files or even start an audio call

Читать полностью…

Libreware

Our previous product Beechat Clip had only one radio to which users needed to connect via USB. Each radio module was region specific, so when travelling to a region with other frequency bands, the module would not work in that region. It had a maximum of 32 network hops.

Over the last year, we've developed Kaonic:
- 2x independent radios
- Live audio call capability (instead of walkie-talkie "push-to-talk")
- Frequency switchable for different regions (868/900 MHz)
- Longer range at highest data rate option (over 200%)
- More than 200% maximum data rate from previous model (250 vs 600 kbps)
- Capability to connect not only via USB, but also via WiFi tethering, and Bluetooth pairing
- Up to 128 network hops for globally scalable networks
- Open source firmware
- End-to-end encrypted

Читать полностью…

Libreware

https://beechat.network/2024/12/01/how-to-simulate-kaonics-range-for-your-area-with-radio-mobile-online/

Check out our latest blog post:
How to simulate Kaonic’s range for your area with Radio Mobile Online

Читать полностью…

Libreware

Simulated area coverage between two Kaonic 1S at 1 Watt output power at 2 metre antenna height:

87 km² (54 mi²)

Читать полностью…

Libreware

26/11/2024

Today at PMRExpo in Cologne we launched our long awaited new high performance encrypted radio system Kaonic 1S. We demoed file sending, live audio calls, and encrypted messaging.

- cryptographic mesh: Kaonic uses Rust-based Reticulum mesh networking with up to 128 network hops (10X compared to LoRa)

- performance: Kaonic 1S features dual radios for simultaneous operations unlocking new capabilities like live audio/video. Each radio has data rates of up to 2400 kbps and 600 kbps for CE/FCC versions.

- open source software and firmware and modularity: soon to be published on GitHub, all code will be available on MIT License. Kaonic 1S runs Yocto Linux. Featuring expansion ports for FPGA, microphones, speakers, sensors and dual USB-C connectors.

Kaonic is more than a radio module, it’s a full featured radio-based single board computer set to revolutionise decentralised communications.

Click here to order a Kaonic 1S today!

Читать полностью…

Libreware

Invidious is currently being blocked by Google. Use Materialious on Android or Desktop to get around this with local video fallback.

#yt

Читать полностью…

Libreware

Betterfox

Set of about:config options for Mozilla #Firefox
It aims to improve browser settings for privacy-conscious users.
Betterfox is also capable of significantly increasing Firefox browsing speed.

https://github.com/yokoffing/Betterfox

Читать полностью…
Подписаться на канал