Changelog: • Android 12 encryption is now supported • Build supports erofs and f2fs compression (for the latter you must use a compatible Lineage recovery to wipe, but it supports mounting and handling these partitions, just not wiping) • Upstreamed to latest A11 blobs • Now using VantomKernel 4.14.284 instead of old micode kernel
Notes: • Only A12 support has been tested, earlier versions might not work • roms using FBEv1 encryption, erofs and F2FS compression are fully supported, others might not work • Many thanks for Adi for the base tree and Vantom for the kernel sources & builds
Changelog: • Android 12 encryption is now supported • Build supports erofs and f2fs compression (for the latter you must use a compatible Lineage recovery to wipe, but it supports mounting and handling these partitions, just not wiping) • Upstreamed to latest A11 blobs • Now using VantomKernel 4.14.284 instead of old micode kernel
Notes: • Only A12 support has been tested, earlier versions might not work • roms using FBEv1 encryption, erofs and F2FS compression are fully supported, others might not work • Many thanks for Adi for the base tree and Vantom for the kernel sources & builds
You guessed it – the internet is your friend. A good place to start looking for Telegram channels is Reddit. This is one of the biggest sites on the internet, with millions of communities, including those from Telegram.Then, you can search one of the many dedicated websites for Telegram channel searching. One of them is telegram-group.com. This website has many categories and a really simple user interface. Another great site is telegram channels.me. It has even more channels than the previous one, and an even better user experience.These are just some of the many available websites. You can look them up online if you’re not satisfied with these two. All of these sites list only public channels. If you want to join a private channel, you’ll have to ask one of its members to invite you.
Newly uncovered hack campaign in Telegram
The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.