15793
Stay Updated on the latest tech-related news inclusive of smartphones, Tech news NO need to wander on Google or check websites now Advertise on our channel to reach a highly engaged audience to grow your brand Buy ads: https://telega.io/c/techleakszone
LinkedIn has responded by saying that the claims are "plain wrong," and that:
To protect the privacy of our members, their data, and to ensure site stability, we do look for extensions that scrape data without members’ consent or otherwise violate LinkedIn’s Terms of Service
Google is upgrading the AI Pro Plan of Google One that comes with 2TB storage to 5TB storage free of cost for everyone.
Your existing Al benefits and bill will stay exactly the same - we just wanted to give you some more space for your photos, documents and more.
You don't need to do anything to claim it; the extra storage is already available in your account.
RIP Samsung Messages
Samsung is discontinuing its official Messages app in July, 2026 and is urging users to shift to Google Messages as their default messaging app.
Note: Users of an older Android versions (Android 11 or lower) are not affected by this End Of Service.
Follow @TechLeaksZone
Telegram will let users know whether the user they are interacting with uses an unofficial client and thus their messages sent to them may be less secure.
Learn more about the other features in the latest update here: https://telegram.org/blog/ai-editor-mighty-polls-and-more
Follow @TechLeaksZone
GitHub Copilot inserted advertisements in pull requests
GitHub Copilot inserted ads promoting Raycast, Slack, Teams and itself in more than 11000 pull requests.
Technically, these were not ads but just "tips" by Copilot, as the raw data included a hidden HTML comment, "START COPILOT CODING AGENT TIPS."
This "bug" was introduced on March 24, when Copilot's abilities were expanded. Martin Woodward blamed it on a "programming logic issue" and tips have now been turned off permanently.
🧑💻 @agamtechtricks
https://fixvx.com/NASAEarth/status/2040063993188929837?s=20
Читать полностью…
Few months ago I found that Telegram Plus uses accounts that connect through their client to give themselves reaction on their Telegram channel.
I checked the logs on the app, you can see that as soon as I click download the file to update the app, a reaction is immediately sent.
18_12_2025_19_52_01.391 D/tmessages: create load operation fileName=4_5920320703357263724.apk documentName=beta_plus-armHockey-12.2.10.1-21908.apk size=67.4 MB position in queue 0 account=0 cacheType=1 priority=65536 stream=nullЧитать полностью…
18_12_2025_19_52_01.393 D/tmessages: send request org.telegram.tgnet.TLRPC$TL_messages_sendReaction@2db04cd with token = 4849
18_12_2025_19_52_01.412 D/tmessages: start loading file to temp = /storage/emulated/0/Android/data/org.telegram.plus/cache/4_5920320703357263724.temp final = /storage/emulated/0/Android/data/org.telegram.plus/cache/4_5920320703357263724.apk priority65536
The Nekogram developer accepts the fact that his app indeed sends users phone number.
He then argues that the bot does not have a data collection function.
In another words, "Trust me bro, we don't collect. The app just sends it to fulfill its own inner wishes."
Bug fixes by other unofficial telegram clients are now on speedrun 🫡
https://github.com/arsLan4k1390/Cherrygram/commit/56d2337179a6ae2f967498a48fe9cc69e9f1de07
Follow @TechLeaksZone
The telegram scene for the next week is gonna be like "yeah so our slopgram doesn't steal data like goygram, we are a secure fork of ligmagram and have been vetted 69 times by the devs of cringegram which is our biggest competitor, and one of them is also in the navy"
Читать полностью…
Please do your part by reporting Nekogram to Google 🙏
Since the Google Play version also contains this malicious code, it is vital to report it so Play Protect can flag and disable the app on all user devices. (thx @RomashkaTea for confirming)
https://play.google.com/store/apps/details?id=tw.nekomimi.nekogram - App in Play store, you can report it here also
https://support.google.com/googleplay/android-developer/contact/takedown - Takedown page
Follow @TechLeaksZone
EXPOSED: Source Code Evidence of Nekogram Phone Number Harvesting
1. Exfiltration Logic: The function uo5.g() (reconstructed as logNumberPhones) silently collects the UserID and Phone Number of every account logged into the app (up to 8 accounts).
2. Transmission: Data is sent via Inline Queries to the bot @nekonotificationbot. This is done programmatically, so no message appears in your "Sent" history.
3. Target Bots: Three bots embedded in the client's obfuscated code:
@nekonotificationbot: Receives the automated phone number uploads.
@tgdb_search_bot and @usinfobot: : An OSINT bot mentioned in the obfuscated classes.
4. Security Token: The app uses a hardcoded secret key 741ad28818eab17668bc2c70bd419fc25ff56481758a4ac87e7ca164fb6ae1b1 as a prefix for the stolen data, likely to authenticate with the bot's backend.
5. The image shows that Nekogram always wants to get the "reg date".
Unfortunately the Google Play Store version is also affected!!!
Follow @TechLeaksZone
The Artemis II crew tossing around their iPhones, floating in Zero gravity
https://fixvx.com/OwenSparks/status/2039530455108608234?s=20
LinkedIn is secretly injecting code and scanning 6,000+ browser extensions without consent
Everytime a user visits LinkedIn, malicious JavaScript is injected which scans the browser for installed extensions, without any notice and consent. This information is then stored at their servers and also sent to HUMAN Security, an American-Israeli cybersecurity firm.
The code downloads list of 6,222 extensions and detects each one of them. This has affected approx. 405 million people. Every extension is then matched to the (logged in) user. This is not mentioned anywhere in their privacy policy or any public document.
LinkedIn scans for:
• 762 LinkedIn-specific tools
• 209 sales & prospecting competitors
• 509 job search extensions
• VPNs, ad blockers, security tools
• Religious & Political extensions
• Disability & neurodivergence tools
LinkedIn knows which organization is using what tools by detecting what tools are installed by employees of that organization.
🔗 BrowserGate | Response
🧑💻 @agamtechtricks
YouTube removed NVIDIA DLSS 5 trailer due to copyright!
La7, an Italian television channel has used footage from Nvidia DLSS 5 Trailer and then sent a copyright strike to every YouTube video that supposedly used “their footage”, including Nvidia themselves. YouTube then simply took down Nvidia’s own DLSS 5 announcement video.
The Content Detection System of YouTube is so broken that anyone can simply claim ownership of any video on YouTube and the company would still issue a copyright notice to the original maker
Follow @TechLeaksZone
> My Cat died
> Feline companion transitioned to their next chapter of growth
😭😭😭
Telegram's AI Editor is really good. Just don't use the "corp" style 💀
Читать полностью…
So the ColorOS 17 screenshots are just fake images, made by designer on Weibo
That's a relief now.
#ShotOniPhone
That's an amazing opportunity for Apple to market iPhones for being used in space to take pictures. Also those pictures have been taken from the front camera even 🫡
This is done only in channel versions to have some statistics about downloads and installations, and verify that updates are working as expected. You can install Play Store release to avoid this.
Anyway, we can add an option to disable/enable this behavior so you can decide if you want to collaborate with this statistics or not
NASA’s mission to orbit the Moon through Artemis II is being interrupted by Outlook (New) and Outlook (classic) as they both refuse to open 😂
Microslop never fails to entertain us, be it on Earth or in Outer Space.
Follow @TechLeaksZone
GitHub PoC Proves Nekogram Collects Your Private Number
Mystic Leaks have built a PoC (Proof of Concept) using which you can see that Nekogram does indeed collect your phone number
To validate this, we made a PoC: an LSPosed module that replaces the bot ID and username to ours so all requests are going to it. That way, we confirmed that the phone numbers are being collected EVERY LOGIN.
Nekogram developer has started damage control by banning people in his chat and the GitHub issue has been closed after being accused of phone number harvesting
https://github.com/Nekogram/Nekogram/issues/336
Follow @TechLeaksZone
Nekogram appears to be using the TgDB Search Bot in an automated manner (without our knowledge; this is not a partnership), likely to search for usernames.
However, this is unrelated to their obfuscated scraping of phone numbers; we do not receive any data from Nekogram and are in no way affiliated with them.
BREAKING: Nekogram is secretly transmitting your telegram account phone number to the developer
According to SOTA,
"The backdoor is hidden in the http://Extra.java file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace. The same file implements account 'doxing' via several bots; it is possible that the leaked data is used to populate their databases."
Additionally, the creator of the Nekogram client, (presumably a Chinese national) was previously known for conducting DDoS attacks and unethical online behavior (including death threats against acquaintances).
Apparently, in the early versions of the client, de-anonymization was applied only to Chinese phone numbers, which could have been used for political surveillance;. However, it is now applied to all users.
Follow @TechLeaksZone
It looks like the reddit post about "My son pleasured himself on Gemini Live and Entire family's Google accounts banned" was also an april fools post 🥀
Читать полностью…