• 3 Posts
  • 11 Comments
Joined 11 months ago
cake
Cake day: June 5th, 2025

help-circle





  • https://gofile.io/d/PDl7oC (You can watch it without downloading it) Here is a video about Chrome, Chromium, and Brave. I really should test this across multiple user accounts, since I’ve read that this can also expose data from other user accounts. In any case, for the demonstration, I used a string to perform a targeted search. After the browser was closed, the cache should have been cleared, but that didn’t happen.

    (Windows users can ask ChatGPT: “How can I create a memory dump from my browser in Windows and search it for strings?” it should be easy too without thirdparty tools )

    (On Linux, simply run
    sudo gcore $(pidof BROWSERNAME)
    strings core.* | grep STRING

    Replace BROWSERNAME and STRING)

    PS: Please excuse my typos in the video—it’s still early in the morning. 🤣







  • They just chuckle to themselves and think: “These idiots have forgotten about things like SS7 and mobile networks in general… or triangulation… and that methods like UXDT still exist.” The safe way to handle any Android device is to assume it’s compromised from the start and not trust it at all—everything else is just a smokescreen. Why do you think cryptophones are being taken off the market, but pure software solutions are still allowed… What about the hardware… undocumented instruction sets, etc., etc. You can’t trust either the software or the hardware… Oh yeah, the devs say everything’s fine… but users completely forget about possibilities like NDAs…