Warning: preg_grep(): Compilation failed: quantifier does not follow a repeatable item at offset 31 in /var/www/tg-me/post.php on line 75 Nexus Kernel | Updates | Telegram Webview: NexusKernel/125 -
Changelog: - Upstream to v4.14.236 - net: wireguard: upstream to 1.0.20210606 - Added KCAL color control - fs: Import sdFAT driver - mm : Always overcommit memory by default - Optimized as much as I can - Lots of misc fixes
Note: Booted on OSS vendor
🤝 Credits: Thanks to Irawan's for source Thanks to All Tester's By: Prashant
Changelog: - Upstream to v4.14.236 - net: wireguard: upstream to 1.0.20210606 - Added KCAL color control - fs: Import sdFAT driver - mm : Always overcommit memory by default - Optimized as much as I can - Lots of misc fixes
Note: Booted on OSS vendor
🤝 Credits: Thanks to Irawan's for source Thanks to All Tester's By: Prashant
The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.
A project of our size needs at least a few hundred million dollars per year to keep going,” Mr. Durov wrote in his public channel on Telegram late last year. “While doing that, we will remain independent and stay true to our values, redefining how a tech company should operate.