Telegram-Trilateration
hosts
Our great sponsors
Telegram-Trilateration | hosts | |
---|---|---|
9 | 306 | |
541 | 25,463 | |
- | - | |
0.0 | 9.5 | |
about 2 years ago | 5 days ago | |
Python | Python | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Telegram-Trilateration
- Telegram Trilateration
- Telegram Trilateration: Abusing “People Near Me” and tracking people's location
-
Hacker News top posts: Mar 13, 2022
Telegram Trilateration: Abusing “People Near Me” and tracking people's location\ (18 comments)
- Telegram Trilateration: PoC abusing “People Near Me” & tracking people location
- POC for abusing Telegram “People Near Me” feature and tracking people's location
- Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
-
Security Analysis of Telegram (Symmetric Part)
Besides cryptographic issues they are also other issues compared to Signal Mtproto seems like the old man out in terms of cryptographic protocols also Mtproto dosen't seem to scale for multiple users. In earlier iterations of Mtproto there key-things missing like MAC, and etc. To be fair the paper does show in some sense the Mtproto is "secure" at protocol level (assuming your using the official client and the server is trusted) still it looks like it's fragile and pretty bad. Linked below are some more serious holes found in Mtproto's game.
hosts
-
Does PiHole block porn?
Not by default but a blocklist can be found here https://github.com/StevenBlack/hosts
-
Steven Black DNS blocklist blocked gstatic.com
While it is now unblocked, the Steven Black list has been blocking a lot of innocent CDNs.
jQuery: https://github.com/StevenBlack/hosts/issues/2520
-
Open Source Ad Blocker for Mac, Windows, and Linux
How does this compare to using a hosts file with known ad servers?
like: https://github.com/StevenBlack/hosts
-
Show HN: YouTube banned adblockers so I built an extension to skip their ads
I use the Hosts file to block a ton of ads and that works really well. https://github.com/StevenBlack/hosts Something worth considering if your ad blocker isn't working well.
-
Big things are happening with RaspAP's Ad Blocking 🛑 Users will soon have more blocklist sources to choose from
The no-tracking project used by RaspAP is shutting down, so we took the opportunity to search for open source blocklist alternatives. Among the best is Steven Black's hosts list: https://github.com/StevenBlack/hosts
-
Radar Maps: $0.50 per 1K map loads
No idea, api.radar.io is on the block list since January 2020.
The commit's comment is "major update from adaway.org"
https://github.com/stevenblack/hosts/commit/4fa0470
-
Browser extensions spy on you, even if its developers don't
You can also use a declarative adblocker like uBlock Origin Lite [1], which only provides the browser with a list of elements to filter, but doesn't have any permissions to read content or perform requests. Or simply use your hosts file to apply OS-wide filtering with no browser add-ons needed: https://github.com/StevenBlack/hosts
Be aware that if you use these "passive" blocking methods, there are some sites like YouTube where you will see ads, because in these cases it's necessary to actually manipulate page content to hide them. What you can do is use a traditional adblocker but enable it only for these few sites where the declarative approach is not enough, take a look at [2] for more details.
[1] https://github.com/uBlockOrigin/uBOL-home
[2] https://seirdy.one/posts/2022/06/04/layered-content-blocking...
-
I installed Firefox + uBlock Origin like everyone suggested in my previous post, but this pop-up still appears, now with a 5 sec timer.
https://github.com/StevenBlack/hosts if you want to do it on your PC.
- “We have nothing to do with ads ” (2021)
-
[Paid Release]CCAdsBeGone - Customized Ads Blocking At Your Fingertips
When I select my custom hosts file, it basically breaks internet. However, if I choose a custom hosts file that is a copy of the dev's default, or if I just add a few lines to it, it will work. If I add too many lines, or use a different hosts file altogether (like the ones recommended by the dev), all connectivity breaks. Of course the latest official LetMeBlock is installed and mDNSResponder killed/restarted. I'm using Dopamine on A12+.
What are some alternatives?
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
blitz-app-adblock - Simple and quick patcher that blocks ads/trackers on the Blitz.gg desktop application.
bleachbit - BleachBit system cleaner for Windows and Linux
shallalist - DISCONTINUED!!! - Unpacked ShallaList Repo
breaking-telegram - Simple PoC script that allows you to exploit telegram's "send with timer" feature by saving any media sent with this functionality.
uBlock - uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean.
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
easylist - EasyList filter subscription (EasyList, EasyPrivacy, EasyList Cookie, Fanboy's Social/Annoyances/Notifications Blocking List)
avatar - Self-hosted service for creating random avatars
Pi-hole - A black hole for Internet advertisements
VulnWhisperer - Create actionable data from your Vulnerability Scans
hosts-blocklists - Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage