whatsapp

Back Open Paginator
29.01.2026 03:55
lavanyadeepak (@lavanyadeepak@mastodon.social)

Mysuru Silk...
A queue begins at 4 AM — and it’s not for freebies.

It’s for pure silk sarees* , priced from ₹25,000 to ₹2.5 lakh.
One saree,,, one woman.
Token in hand. Patience in heart.

Sorry, but we are a dead economy... says Pappu...

Infographics Credits:





Show Original Post


29.01.2026 03:41
echo_xc (@echo_xc@mastodon.social)

Okay cooool!!
But where's the code?

Github link?





Show Original Post


29.01.2026 02:38
lavanyadeepak (@lavanyadeepak@mastodon.social)

ஹிட்லர் பதிலளித்தார்: “வாக்காளர்களும் இப்படித்தான். நான்கரை ஆண்டுகளுக்கு நாம் அவர்களின் இறகுகளைப் பிடுங்குகிறோம். பிறகு, கடைசி ஆறு மாதங்களில், அவர்களுக்குச் சில தானியங்களைத் தூக்கி எறிகிறோம். அந்தச் சில தானியங்களுக்காக, வாக்காளர்கள் நாம் நான்கரை ஆண்டுகளாகச் செய்த அத்தனை அநீதிகளையும் மறந்துவிட்டு—மீண்டும் நமக்கே வாக்களிக்கிறார்கள்.”

Nice Read from




Show Original Post


29.01.2026 01:35
i47i (@i47i@hachyderm.io)

Lawsuit Alleges That WhatsApp Has No End-to-End Encryption

A lawsuit filed in San Francisco alleges that #WhatsApp's end-to-end encryption contains backdoors allowing #Meta employees to access user messages in real-time.

According to the complaint, internal tools allow engineers to view chats by User ID without a separate decryption step, bypassing the Signal Protocol protections the app claims to use.

The lawsuit cites £whistleblowers who claim that workers can request access to specific accounts via internal tasks, gaining unlimited temporal scope to a user's history, including deleted messages. Meta has labeled these claims false and absurd.

Technical experts note that while the Signal Protocol itself is mathematically secure, the integrity of end-to-end encryption relies entirely on the security of the endpoints. Potential vulnerabilities in WhatsApp include unencrypted cloud backups, metadata collection, and the fact that the client software is closed-source.

Without the ability to audit the code or verify public keys through an independent directory, users must trust that the application is not exfiltrating plaintext data before it is encrypted for transit.

The legal action highlights the ongoing tension between corporate privacy marketing and the technical reality of centralized messaging platforms. If the allegations of an internal "widget" for message access are proven true, it would represent a fundamental breach of the encryption standards Meta has advertised since 2016.
it.slashdot.org/story/26/01/27

#WhatsApp #Meta #Privacy #CyberSecurity #Encryption #DataPrivacy #E2EE #TechNews #Lawsuit #Whistleblower #DigitalRights #Messaging #InformationSecurity #SignalProtocol




Show Original Post


29.01.2026 00:02
pablo (@pablo@mastodon.cl)

Tenía que compartir este mensaje del grupo de wsp de mi edificio 👔 Me hizo la tarde 🤣

#whatsapp #vecinos





Show Original Post


28.01.2026 22:32
techbot (@techbot@social.raytec.co)

Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

A sophisticated Android spyware campaign targeting individuals in Pakistan has been uncovered, using romance scam tactics as a lure. The malicious app, named GhostChat, poses as a chat platform with fake female profiles, requiring hardcoded passcodes to access. Once installed, it enables covert surveillance and data exfiltration. The campaign is part of a broader spy operation, including a ClickFix attack compromising victims' computers and a WhatsApp device-linking attack gaining access to victims' accounts. These related attacks used websites impersonating Pakistani governmental organizations. The threat actor employs multiple tactics across mobile and desktop platforms, blending social engineering, malware delivery, and espionage techniques.

Pulse ID: 697a54c83114b3a03ef8a8cd
Pulse Link: otx.alienvault.com/pulse/697a5
Pulse Author: AlienVault
Created: 2026-01-28 18:26:16

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Android #CyberSecurity #Espionage #Government #ICS #InfoSec #Malware #OTX #OpenThreatExchange #Pakistan #RAT #Romance #SocialEngineering #SpyWare #WhatsApp #bot #AlienVault




Show Original Post


28.01.2026 20:40
post (@post@mander.xyz)

WhatsApp will now charge AI chatbots to operate in Italy

mander.xyz/post/46387283




Show Original Post


28.01.2026 20:34
post (@post@mander.xyz)

WhatsApp Launches Strict Account Settings for High-Risk Users

mander.xyz/post/46386981




Show Original Post


28.01.2026 20:18
maexchen1 (@maexchen1@nrw.social)

@ehtron

Die hunderten von Kontakten kommen nicht von alleine in die Kontaktliste.

Für den Kindergarten, Kleingartenverein etc. hätte man ohne #whatsapp niemals alle Mitglieder ins eigene Telefonbuch geschrieben.

Mit #whatsapp muss man das, sonst weiß man nicht wer was schreibt

@forthy42 @Ruhrnalist




Show Original Post


28.01.2026 20:10
maexchen1 (@maexchen1@nrw.social)

@forthy42

Ich habe regelmäßig Kontaktlisten für #whatsapp gesehen die mehrere 100 Einträge haben.

Diese wurden nicht eingetragen weil diese zum Nächsten Bekanntenkreis gehören die sowieso in der Telefonliste stehen.

Diese Telefonnummern mussten Aktiv eingetragen werden.

Wie bei Email ja auch.

Bei #XMMP muss man auch Aktiv die #XMMP Adressen eingeben.

Ich sehe darin keinen Unterschied.
Das geht per #QRcode oder durch Einladung.

@ehtron @Ruhrnalist




Show Original Post


28.01.2026 19:48
llvm (@llvm@fosstodon.org)

Rust at Scale: An Added Layer of Security for WhatsApp engineering.fb.com/2026/01/27/ #WhatsApp




Show Original Post


28.01.2026 19:38
Plan23 (@Plan23@troet.cafe)

Keine vergessenen Termine mehr: So hilft die WhatsApp-Terminerinnerung in Ihrer Zahnarztpraxis

Wer macht den sowas. 🤨

#whatsapp #messenger #arzt #termin #DSGVOkonform #privatsphare #bloedsinn

goroger.com/wissen/wissenswert




Show Original Post


1 ...166 167 168 169 170 171 172 173 174 175 176 ...497
UP