Prospering with Fungible, private, SOUND MONEY 3.0 & HEALTH for Everyone!
78 subscribers
21.5K photos
5.65K videos
464 files
47.5K links
It's THE Home Of Innovation and Elevation, wherever it is… Precognitive, Highly Curated research with a public daily digest, years proven, with long term, high accuracy prepositioning...DIRECT, LIVE, AS IT HAPPENS MONEY 3.0 + HEALTH 3.0, simultaneously!
Download Telegram
University of Minnesota security researchers apologize for deliberately buggy Linux patches

The abashed University of Minnesota researchers apologized for their blunders, but the issues are far from resolved. And, Linus Torvalds briefly addresses the fouled up Linux patches.

Last week, some University of Minnesota (UMN) security researchers kicked a hornet nest, when it was revealed that they'd tried to insert deliberately buggy patches into Linux. Greg Kroah-Hartman, the well-respected Linux kernel maintainer for the Linux stable branch, responded by banning not only them but any UMN-connected developers from contributing to the Linux kernel. Now, the researchers have sort of, kind of, apologized for their mistakes: "We sincerely apologize for any harm our research group did to the Linux kernel community."

https://www.zdnet.com/article/university-of-minnesota-security-researchers-apologize-for-deliberately-buggy-linux-patches/

https://lore.kernel.org/lkml/CAK8KejpUVLxmqp026JY7x5GzHU2YJLPU8SzTZUNXU2OXC70ZQQ@mail.gmail.com/T/#u

#opensource #security #minnesota #university #trolling #apologize
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the Resource Index


Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version

Security and Counter-Surveillance - Information Against the Police State
https://t.me/RevToolboxRedux/2559

What To Do When You're Arrested
https://t.me/RevToolboxRedux/2585

Surveillance Self Defense in Public Spaces
https://t.me/RevToolboxRedux/2755

Movement Defense Means All of Us - A guide to building resilient movements and countering repression.
https://t.me/RevToolboxRedux/2070

No Badjacketing - The State Wants To Kill Us, Let's Not Cooperate (important article)
https://t.me/RevToolboxRedux/2915

Why Misogynists Make Great Informants
https://t.me/RevToolboxRedux/2916

Digital Communication Protocols Beyond Telegram
https://t.me/RevToolboxRedux/3338

Police Infiltrators - the ultimate betrayal
https://t.me/RevToolboxRedux/2502

Privacy/Security Resource list
https://t.me/RevToolboxRedux/12

Some tips on staying secure online
https://t.me/RevToolboxRedux/157

Elicitation - subtly soliciting information
https://t.me/RevToolboxRedux/167

Telegram tips for group/channel admins (old)
https://t.me/RevToolboxRedux/198

Breaking News Consumer's Handbook
https://t.me/RevToolboxRedux/209

Antifascism is Self Defense
https://t.me/RevToolboxRedux/264

Digital security resources for activists
https://t.me/RevToolboxRedux/267

Know Your Rights - A Crashcourse 4 Protesters (Don't Shoot PDX)
https://t.me/RevToolboxRedux/273

Best Practices for Signal Threads
https://t.me/RevToolboxRedux/280

The Riot is One Night But Metadata is Forever
https://t.me/RevToolboxRedux/293

Never Talk to the Cops
https://t.me/RevToolboxRedux/294

Before Posting Ask Yourself - does this pose a risk?
https://t.me/RevToolboxRedux/295

Surveillance Self Defense (EFF)
https://t.me/RevToolboxRedux/309

How To Make It Harder for Cops to Do Their Jobs
https://t.me/RevToolboxRedux/310

Beating FBI Surveillance
https://t.me/RevToolboxRedux/319

How To Find Hidden Cameras
https://t.me/RevToolboxRedux/334

DIY Faraday Bag (untested)
https://t.me/RevToolboxRedux/327

Guide to IMSI Catchers (Fake Cell Towers)
https://t.me/RevToolboxRedux/337

Covering Cameras w/ Umbrellas
https://t.me/RevToolboxRedux/369

Getting Started - Telegram Anonymity
https://t.me/RevToolboxRedux/370

Tails OS Leaflet
https://t.me/RevToolboxRedux/378

Car Brigade Techniques
https://t.me/RevToolboxRedux/407

Beware Swoopers
https://t.me/RevToolboxRedux/431

Spread Good Info! S.A.L.U.T.E.
https://t.me/RevToolboxRedux/436

Anarchist Direct Actions - A Challenge for Law Enforcement
https://t.me/RevToolboxRedux/462

What To Do If You Are Stopped by the Police
https://t.me/RevToolboxRedux/465

Criptica. Resistencia Digital (espanol)
https://t.me/RevToolboxRedux/467

Which Apps Are Secure and End-to-End Encrypted?
https://t.me/RevToolboxRedux/495

When the Police Knock on Your Door
https://t.me/RevToolboxRedux/517

Dress for Success - Disguise without Bloc
https://t.me/RevToolboxRedux/518

Look Out for Fascist Entryism
https://t.me/RevToolboxRedux/520

What to Do If You Receive an Unsolicited Message
https://t.me/RevToolboxRedux/528

PDX Decentralized Comms Ruleset
https://t.me/RevToolboxRedux/536

Only Networks Can Defeat Networks - decentralized digital struggle
https://t.me/RevToolboxRedux/607

The Basics of Firearm Safety
https://t.me/RevToolboxRedux/643

Assertive Intervention and Deescalation Tools and Tips
https://t.me/RevToolboxRedux/646

Faraday Bag from CLDC
https://t.me/RevToolboxRedux/652

How to Lock Your SIM Card
https://t.me/RevToolboxRedux/683

How to Spot NYPD Unmarked Cars
https://t.me/RevToolboxRedux/685

Digital Safety at Protests
https://t.me/RevToolboxRedux/687

Crossing the U.S. Border - crimethinc
https://t.me/RevToolboxRedux/742

Gentleman's Guide to Forum Spies and Spooks
https://t.me/RevToolboxRedux/750

Atlas of Surveillance - Documenting Police Tech
https://t.me/RevToolboxRedux/784

2 Twitter Alternatives
https://t.me/RevToolboxRedux/786
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the Resource Index

If You Don't Need to Say It, Don't Say It (discussion
https://t.me/RevToolboxRedux/797

A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/814
https://t.me/RevToolboxRedux/931 - PDF

Survival Guide for Popular Resistance
https://t.me/RevToolboxRedux/824

Know Your Rights - ACLU MN
https://t.me/RevToolboxRedux/862

Towards A Citizen's Militia: Anarchists Alternatives to NATO and the Warsaw Pact (1980)
https://t.me/RevToolboxRedux/890

Three Criticisms of Livestreaming [at protests]
https://t.me/RevToolboxRedux/934

Remote Uprising Support Team (RUST) Zine
https://t.me/RevToolboxRedux/937

Consent Culture - basic security culture tips
https://t.me/RevToolboxRedux/960

Protest Safety Guide - Across Frontlines
https://t.me/RevToolboxRedux/1012

NYC ICE Watch - ICE Patrols
https://t.me/RevToolboxRedux/1039

Know Your Rights when ICE or Feds are at the door
https://t.me/RevToolboxRedux/1055

SAFETY & SECURITY GUIDELINES
https://t.me/RevToolboxRedux/1058

Build a Wall of Resistance - Don't Talk to the FBI (picture)
https://t.me/RevToolboxRedux/1094

List of Informative Guides for Street Conflicts
https://t.me/RevToolboxRedux/1114

A thread how to protect your privacy via phone safety at demonstrations--before, during, and after the protest
https://t.me/RevToolboxRedux/1115

S.A.L.U.T.E. Guide
https://t.me/RevToolboxRedux/1117

How to Easily Harden Signal
https://t.me/RevToolboxRedux/1118

the Data Detox Kit - Fistful of Privacy Tips
https://t.me/RevToolboxRedux/15

IT COULD HAPPEN HERE - preparing for political crises and far right violence
https://t.me/RevToolboxRedux/1172

Protest Safety Basics - Black Bloc
https://t.me/RevToolboxRedux/1175

EarthFirst! Opsec Story
https://t.me/RevToolboxRedux/1204

Taking Ourselves Seriously - Digital Harm Reduction discussion by RadioFragmata
https://t.me/RevToolboxRedux/1288

Don't Speak without a Lawyer Present
https://t.me/RevToolboxRedux/1292

If You Get Arrested: DON'T SPEAK (infographic)
https://t.me/RevToolboxRedux/1297

Party Protips
https://t.me/RevToolboxRedux/1298

What to Do If You're Marked by Police with color UV mace/dye
https://t.me/RevToolboxRedux/1338

Comrades Don't Livestream Comrades
https://t.me/RevToolboxRedux/1339

How To Set Up an Anonymous Burner Phone
https://t.me/RevToolboxRedux/1340

How to Build a Paper Trail - for tenant struggles
https://t.me/RevToolboxRedux/1357

Cops are Petty - They WIll Remember You
https://t.me/RevToolboxRedux/1376

Spotting a hidden handgun
https://t.me/RevToolboxRedux/1385

The Fascist Infiltration of Subculture
https://t.me/RevToolboxRedux/1387

Security Culture - A Handbook for Activists
https://t.me/RevToolboxRedux/1401

Trainstopping - Intervening with Rail Transport through blockade and sabotage
https://t.me/RevToolboxRedux/1436

How to Find Hidden Cameras
https://t.me/RevToolboxRedux/1465

Security Alert - Hardening your Telegram
https://t.me/RevToolboxRedux/1503

PSA to all comrades with radios
https://t.me/RevToolboxRedux/1546

An Activists Guide to Informational Security (2016)
https://t.me/RevToolboxRedux/1570

Curated List of Digital Tools for Activism
https://t.me/RevToolboxRedux/1577

Security Reminder w/ Links
https://t.me/RevToolboxRedux/1578

If An Agent Knocks - What To Do
https://t.me/RevToolboxRedux/1625

Was My Friend a Spy-Cop? A Guide to Investigating Suspicions and Providing Emotional Support
https://t.me/RevToolboxRedux/1631

List of Printers with Tracking Dots
https://t.me/RevToolboxRedux/1693

Metadata Kills - Anti-Google
https://t.me/RevToolboxRedux/1700

Privacy Alternatives to Social Networks
https://t.me/RevToolboxRedux/1711

HackBack! A DIY guide to rob banks
https://t.me/RevToolboxRedux/1770

Talking To Cops is Never Safe (good infographic)
https://t.me/RevToolboxRedux/1789

Web Security and Web Hacking for Beginners (video series)
https://t.me/RevToolboxRedux/1797

Grand Juries & Grand Jury Resistance
https://t.me/RevToolboxRedux/1810

#directory
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the Resource Index

Some Guides to Interacting With the FBI
https://t.me/RevToolboxRedux/1828

Fuck Off Google! - Invisible Committee
https://t.me/RevToolboxRedux/1843

Police At the Door - What to do
https://t.me/RevToolboxRedux/1865

Digital Safety Story
https://t.me/RevToolboxRedux/1867

STOP TALKING Before It's Too Late!
https://t.me/RevToolboxRedux/1868

Doxcare - by Crimethinc
https://t.me/RevToolboxRedux/1879

EXIF Cleaners for Clean Image Files
https://t.me/RevToolboxRedux/1935

How To Protect Your Privacy at a Protest (video)
https://t.me/RevToolboxRedux/1939

Attending a Protest - Surveillance Self Defense
https://t.me/RevToolboxRedux/1945

Ten Rules of the Protester - translated from Russian
https://t.me/RevToolboxRedux/1951

Overview/Comparison of different messaging apps
https://t.me/RevToolboxRedux/1985

Wessel's Opsec Guide
https://t.me/RevToolboxRedux/1997

Become Anonymous - a video guide
https://t.me/RevToolboxRedux/2017

Ten Ways to Secure Your Telegram
https://t.me/RevToolboxRedux/2029

Warrior Crowd Control and Riot Manual
https://t.me/RevToolboxRedux/2037

A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/2057

S.A.L.U.T.E. Spread Info Not Panic (original)
https://t.me/RevToolboxRedux/2114

How Long It Will Take to Crack Your Password
https://t.me/RevToolboxRedux/2118

Black Bloc Tactics - Crimethinc
https://t.me/RevToolboxRedux/2119

Ozimandias Direct Action and Sabotage Handbook
https://t.me/RevToolboxRedux/2122

Guide to Communications and OSINT for 2020 protest movements
https://t.me/RevToolboxRedux/2123

WTO Seattle Logistics Zine (1999)
https://t.me/RevToolboxRedux/2127

PDX Hivebloc Guides
https://t.me/RevToolboxRedux/2128

Confidence Courage Connection Trust - A Proposal for Security Culture
https://t.me/RevToolboxRedux/2131

The Riot Is One Night, But Metadata Lasts Forever
https://t.me/RevToolboxRedux/2132

Digital Safety Kit (committee to protect journalists)
https://t.me/RevToolboxRedux/2133

Stingray Trackers - what you need to know and how to protect yourself
https://t.me/RevToolboxRedux/2134

T-Shirt/Ninja Bloc
https://t.me/RevToolboxRedux/2135

Anti-Surveillance Toolkit - Photography and Video
https://t.me/RevToolboxRedux/2142

The Riot Is One Night, But Metadata Lasts Forever (alt)
https://t.me/RevToolboxRedux/2143

How to Protect Yourself and Others from Police Agitation
https://t.me/RevToolboxRedux/2196

How to Identify Police Surveillance (video, EFF)
https://t.me/RevToolboxRedux/2203

DIY Occupation Guide and Squatters Resources
https://t.me/RevToolboxRedux/2218

Didn't See Nothin' Don't Know Nothin', A Social Media Field Guide
https://t.me/RevToolboxRedux/2238

Resources, Tips, Communiques for Direct Action and CCTV Sabotage
https://t.me/RevToolboxRedux/2241

Resist State Oppression (art)
https://t.me/RevToolboxRedux/2255

The Red Flags of Rogue URL's
https://t.me/RevToolboxRedux/2256

Anonymize Your Online Footprint
https://t.me/RevToolboxRedux/2257

Earthfirst! Direct Action Manual for Monkeywrenchers
https://t.me/RevToolboxRedux/2306

Flyer for Livestreamers and Journalists
https://t.me/RevToolboxRedux/2310

What to Do In the Upcoming Days - for protesters in Burma
https://t.me/RevToolboxRedux/2321

If ICE Agents Show Up At Your Door
https://t.me/RevToolboxRedux/2328

A Recipe for Nocturnal Direct Actions! (zine)
https://t.me/RevToolboxRedux/2330

US Army FM 3-24 - Insurgencies and Countering Insurgencies
https://t.me/RevToolboxRedux/2350

Ecodefense: A Field Guide to Monkeywrenching
https://t.me/RevToolboxRedux/2355

Front-ends for evil sites/platforms
https://t.me/RevToolboxRedux/2408

How To Watch YouTube Without App/Website
https://t.me/RevToolboxRedux/2411

Use Your Right to Report Responsibly
https://t.me/RevToolboxRedux/2446

Protest Reporting Toolkit
https://t.me/RevToolboxRedux/2451

The Cops Don't Play Fair, Be Prepared
https://t.me/RevToolboxRedux/2457

No Face, No Case
https://t.me/RevToolboxRedux/2487
https://t.me/RevToolboxRedux/2519

#directory
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the Resource Index

Video on How to Handle a Detective Visit
https://t.me/RevToolboxRedux/1823

What Is Autonomous Action?
https://t.me/RevToolboxRedux/2512

Some Protest Basics
https://t.me/RevToolboxRedux/2513

Guides for Police Provocateurs and FBI Agents
https://t.me/RevToolboxRedux/2537

Don't Become the State's Eyes (image)
https://t.me/RevToolboxRedux/2538

Digital Security Guidelines - CLDC Digital Security Program
https://t.me/RevToolboxRedux/2557

Protest Safety Planning
https://t.me/RevToolboxRedux/2596

Pittsburgh: Reflections on Leadership and Collective Autonomy
https://t.me/RevToolboxRedux/2618

Basic Guide to Protesting Safely
https://t.me/RevToolboxRedux/2689

When the Police Knock on Your Door
https://t.me/RevToolboxRedux/2711

Anti- and Counter-Surveillance Techniques for Intelligence Officers
https://t.me/RevToolboxRedux/2768

Telegram 101: How to communicate securely in Telegram?
https://t.me/RevToolboxRedux/2808

Black Bloc, Grey Bloc, and Debloc
https://t.me/RevToolboxRedux/2928

No Face No Case, 1312
https://t.me/RevToolboxRedux/2953

Reinforce Rights Not Racism (image)
https://t.me/RevToolboxRedux/2971

FM 34-2-1 Reconnaissance and Surveillance and Intelligence Support to Counterreconnaissance (1991)
https://t.me/RevToolboxRedux/2974

Hitchhikers Guide to Online Anonymity
https://t.me/RevToolboxRedux/2975

Burner Phone Best Practices
https://t.me/RevToolboxRedux/2976

Counterinsurgency in Modern Warfare (2008)
https://t.me/RevToolboxRedux/2992

Army Support to Military Deception, FM 3-13.4
https://t.me/RevToolboxRedux/2993

All Cameras Are Breakable
https://t.me/RevToolboxRedux/3000

Watch Out For Snitches (poster)
https://t.me/RevToolboxRedux/3017

Holistic Security: A Strategy Manual for Human Rights Defenders
https://t.me/RevToolboxRedux/3054

Never Turn Off The Phone: A new approach to security culture
https://t.me/RevToolboxRedux/3055

Rebel Alliance Tech Manual
https://t.me/RevToolboxRedux/3056

Secrets and Lies (story about informal organization)
https://t.me/RevToolboxRedux/3057

Digital Harm Reduction - Taking Ourselves Seriously article 1
https://t.me/RevToolboxRedux/3058

The Invisible Ground: honoring each others security needs
https://t.me/RevToolboxRedux/3059

Recording or taking photo's at a protest can be unwise (image)
https://t.me/RevToolboxRedux/3076

List of found physical surveillance devices
https://t.me/RevToolboxRedux/3086

Things I Wish I Did Before Being Raided by the Police
https://t.me/RevToolboxRedux/3087

Defend Dissent - Digital Suppression and Cryptographic Defense of Social Movements
https://t.me/RevToolboxRedux/3090

LOCKING DOWN SIGNAl (article)
https://t.me/RevToolboxRedux/3091

How To Prevent Facial Recognition Technology from Identifying You
https://t.me/RevToolboxRedux/3159

Doxxing Prevention Harm Reduction Training
https://t.me/RevToolboxRedux/3161

Damage Control - the story of how one activist group kept ourselves safe and strong in the face of movement infiltration
https://t.me/RevToolboxRedux/3162

Security and Counter-Surveillance: Information Against the Police State
https://t.me/RevToolboxRedux/3225

ANARCHIST SURVIVAL GUIDE FOR UNDERSTANDING GESTAPO SWINE INTERROGATION MIND GAMES
https://t.me/RevToolboxRedux/3230

Untitled, or What to Do When Everyone Gets Arrested
https://t.me/RevToolboxRedux/3232

The Art and Science of Billboard Improvement
https://t.me/RevToolboxRedux/3238

Basic Recon Skills (zine)
https://t.me/RevToolboxRedux/3239

COMMUNICATION EQUIPMENT FOR REBELS - Skills for Revolutionary Survival #5
https://t.me/RevToolboxRedux/3308

Your Greatest Weapon Against the State is Anonymity (image)
https://t.me/RevToolboxRedux/3328

Some useful rules for social media
https://t.me/RevToolboxRedux/10

#directory
Forwarded from Enter in IT
How to find out who tried to unlock your smartphone 📱

Even if you have the most reliable password in the world, someone can try to pick it up unnoticed during your absence. In this case, it will be interesting to find out who exactly cares about your personal data.

The Lockwatch app will help you find out who tried to unlock your 📱by taking a picture from the front camera with each incorrect password entry and sending images to the specified email. In addition, you will receive the coordinates of the device if location transmission is enabled on it.

After installation, the application must be given permission to track attempts to unlock the screen, and then add a personal email and choose after which input attempt to take a picture. If the 📱 is unlocked within 10 seconds after entering an incorrect password, the message with the photo will not be sent.

#security #app
Forwarded from Enter in IT
What Is a Secret Chat In Telegram And How To Use It?

If you prefer keeping the sensitive content of your chats limited to yourself and avoiding it from being intercepted by a hacker or the authorities in your country or region, this Telegram trick is for you.

Secret Chats provide user-to-user encryption. These chats are meant to be short-lived and not stored on Telegram’s servers.

🔹You can set a self-destruct timer of duration varying from one second to one week.
🔹You or the other person cannot forward messages from a Secret Chat.
🔹 Taking screenshots (or screen recordings) is completely blocked.
🔹A Secret Chat is limited between only 2 people.

To start a Secret Chat, you can tap on the option in the hamburger menu and select a contact to start the chat. Alternatively, you can go to an existing chat, tap on the top bar for the user’s information and scroll down to find the “Start Secret Chat” option.

#security #telegram
Forwarded from Enter in IT
How to find out who leaked your documents or photos to the network

Imagine a situation: you send someone or upload a document containing personal information to any service, and then you discover that it has leaked to the network. How to find the source of the leak?

LeaksID is a service that allows you to mark confidential documents with invisible labels. In case of a leak (even in the form of a screenshot or printout), the service will analyze and calculate the source of the leak.

You can use it as just an online document converter, and get a protected PDF with invisible markings at the output.

Additional functions - document storage inside the platform and the ability to perform any necessary manipulations: download, view, print, share a link to a file. Supports all popular formats. It is free for private users (add up to 50 pages, up to 10 documents).

Will you try it?

#security #srevice
Forwarded from Enter in IT
How to access blocked sites without a VPN

If you need to visit a blocked site quickly or surf the Internet anonymously, but a VPN is not installed - the search for a reliable VPN service can take a long time.

There is a good alternative - the Startpage search engine. On request, you will get the same search results as Google, but without surveillance. You can also anonymously access any sites without leaving any traces. Just like with a VPN.

To visit the site anonymously, click on the mask icon next to the sites from the search results. A page with a secure connection will open in a new tab. Startpage works on mobile devices 📱 and PCs 💻.

#security
Forwarded from Enter in IT
How to choose the most secure and appropriate browser

Everyone has their own criteria for choosing a browser, but for everyone security will be one of the most important.

The searchengines.party project was created to facilitate your choice. It is an aggregator of search engines that focus on privacy. The browser catalog contains a small summary of their security according to various criteria.

Search engines are compared here by such characteristics as logging, availability of secure protocols, the ability to disable JS support, third-party trackers, etc. The blocks are painted in different colors: from safe green 🟢 to critical red 🔴.

Study it!

#security
Forwarded from Enter in IT
Apps to Hide Your Secret Photos

You asked - here you are!😊

Private Photo Vault protects your photos in a PIN or pattern protected folder. It also includes security features in case your 📱 ever get stolen, like break-in reports that will automatically take a photo of a thief and send their location via GPS.
This app uses a fake password to open decoy folders - so if you have to deal with someone poking around, they'll only see stock images. It is available on iOS and Android for free.

Best Secret Folder is a password-protected app which lets you record videos and save them directly to your secret folders.The app will snap a picture of an intruder (after 4 failed login attempts) and send you their location. It is free for iOS.

Try It!

#security
Forwarded from Enter in IT
ProtonMail introduced Tracking Protection feature

Secure email provider ProtonMail launched a new protective feature called Tracking Protection. The feature aims to protect users of the service better against tracking attempts.

It will block pixel trackers in ✉️ and hide the IP addresses of recipients.

For user accounts that use the web interface of the service, this feature will be activated by default.

Do you use or did you try ProtonMail?

#security #news
Forwarded from ITeach
How to find hidden cameras indoors.

With a phone with a special sensor, you can try to find hidden cameras, microphones, computers, etc.

The Hidden Camera Detector application (available only on Android) will help us with this. If the phone is able to locate the camera, you will see a flashing red icon in the direction in which it is located.

But beware: scanners may be looking for other hardware as well, so look at the number in the middle of the screen. If it exceeds 100, it means that the phone has detected the camera.

#security