- Zoom abuses the installer flow on MacOS to bypass permissions dialogs (source)
- Zoom sends identifying device info to Facebook, even when users don't have a Facebook account (source) (fixed)
- A bug in Zoom sent identifying information (including email addresses and profile pictures) of thousands of users to strangers (source)
- Zoom claims that meetings are end-to-end encrypted in their white paper and marketing materials, but meetings are only encrypted in transit, and are available in plaintext to Zoom servers and employees. (source)
zoomAutenticationToolcan be used to escalat
| #!/bin/sh | |
| set -e | |
| root_disk() { | |
| diskutil info -plist / | |
| } | |
| apfs_volumes_for() { | |
| disk=$1 | |
| diskutil apfs list -plist "$disk" |
Percentage:
<img src="https://user-images.githubusercontent.com/16319829/81180309-2b51f000-8fee-11ea-8a78-ddfe8c3412a7.png" width=50% height=50%>
Pixels:
<img src="https://user-images.githubusercontent.com/16319829/81180309-2b51f000-8fee-11ea-8a78-ddfe8c3412a7.png" width="150" height="280">
| KEYMAPOPTS="us us" | |
| HOSTNAMEOPTS="-n alpine" | |
| INTERFACESOPTS="auto lo | |
| iface lo inet loopback | |
| auto eth0 | |
| iface eth0 inet dhcp | |
| hostname alpine | |
| " | |
| TIMEZONEOPTS="-z UTC" |
Lima (Linux virtual machines, on macOS) installation guide for M1 Mac.
Sep. 27th 2021 UPDATED
Now we can install patched version of QEMU via Homebrew (thank you everyone for the info!). Here is the updated instruction with it:
Used M1 Mac mini 2020 with macOS Big Sur Version 11.6.
| /graphql/30bHSx-YYMzaygsBwfhftA/AddRemoveUserFromList | |
| /graphql/xIZJPQBK0Zz62_BDLNLHKw/AddSuperFollowPrivacy | |
| /graphql/R1ks8NLVisD-416R3mAk_w/AllSubscribedListsTimeline | |
| /graphql/nxtTgq_TxeEDm0gmsGqK_Q/ArticleTweetsTimeline | |
| /graphql/zacmhLyVLzFAKvH-yia8OA/AudiospaceAddSharing | |
| /graphql/IZ1drq74xph2Gym7gGgtRw/AudiospaceBrowseSpaceTopicsQuery | |
| /graphql/N80MQ7fkrpuq1-kCWVSvzQ/AudiospaceByRestId | |
| /graphql/PTAe3LYPhlCcPJtwpyyx-w/AudiospaceDeleteSharing | |
| /graphql/NiYfwFZDe-90MSqpGEI16w/AudiospaceGiveawayTickets | |
| /graphql/g1mB1D5y3z_NkFsN-FwZdA/AudiospaceIsSubscribedQuery |
💡 NOTE: MacOS higher than version 12 requires a CPU with AVX2 instruction support
- Download a MacOS Ventura .iso Download OR create your own https://youtu.be/JFMvUpdCMwo
- Download VMware Workstation Player Download
- Download MacOS Unlocker for VMware Workstation Download
- Install VMware Workstation Player, accepting the defaults
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k