Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "phone hackers"
-
So today (or a day ago or whatever), Pavel Durov attacked Signal by saying that he wouldn't be surprised if a backdoor would be discovered in Signal because it's partially funded by the US government (or, some part of the us govt).
Let's break down why this is utter bullshit.
First, he wouldn't be surprised if a backdoor would be discovered 'within 5 years from now'.
- Teeny tiny little detail: THE FUCKING APP IS OPEN SOURCE. So yeah sure, go look through the code! Good idea! You might actually learn something from it as your own crypto seems to be broken! (for the record, I never said anything about telegram not being open source as it is)
sources:
http://cryptofails.com/post/...
http://theregister.co.uk/2015/11/...
https://security.stackexchange.com/...
- The server side code is closed (of signal and telegram both). Well, if your app is open source, enrolled with one of the strongest cryptographic protocols in the world and has been audited, then even if the server gets compromised, the hackers are still nowhere.
- Metadata. Signal saves the following and ONLY the following: timestamp of registration, timestamp of the last connection with the server (both rounded to the day so not on the second), your phone number and your contact details (if you authorize it) (only phone numbers) in HASHED (BCrypt I thought?) format.
There have been multiple telegram metadata leaks and it's pretty known that it saves way more than neccesary.
So, before you start judging an app which is open, uses one of the best crypto protocols in the world while you use your own homegrown horribly insecure protocol AND actually tries its best to save the least possible, maybe try to fix your own shit!
*gets ready for heavy criticism*19 -
Once upon a time in Devland, there were two best friends @Alice and @Michelle and they worked together at The DevCo company as developers.
After a tough day handling an @-ANGRY-CLIENT-, they thought that they had to go and @RantSomewhere and so they went to a café. At the café, they ranted about some stupid clients, and @theItalianGuy at the third floor of their office building who never picked up calls, and @thatJavaGuy from the second floor who, they thought, was @notarealDev, and the usual stuff about their work. Somewhere in between, @Alice thought it would be @funvengeance to @hack @theNSA; “@karma is coming to get them”, said @Michelle.
To do this, they knew they’d have to take help from none other than @Gandalf who lived in a nearby @cave. So, the next day, taking a leave from work, @Alice and @Michelle embarked on journey to meet @Gandalf. After about an hour’s drive, they reached @Gandalf’s @cave. @Michelle went ahead to knock on @Gandalf’s rusty cave door. Being a lazy @necromancer, he magically opened his door 2 minutes later. “Who is't dares to disturb me in mine own catch but a wink?” shouted a voice from the back; “We’re two developers from DevCo and we need your help in our mission to @hack @theNSA”, shouted @Michelle. After a few seconds, he replied, ”Hmm… N'rmally I wouldst sendeth thee to mine own cousin @Hagrid, but in thy case, I sayeth thee shouldst visiteth the detective who is't goeth by the nameth @S-Holmes”. @Alice replied back, “Thank you, Sir @Gandalf, we’ll get help from this @S-Holmes, I’ve heard that he’s an @exceptionalGuy”; “Mine own pleasure, Farewell!” said @Gandalf, and the door closed shut.
So, @Alice and @Michelle went back to their car, and that time @Alice raised a question, “How are we gonna find this @S-Holmes? We don’t have a phone number or anything so we could contact this guy.”
“We should call @thatJavaGuy from work, I’ve heard he is a man of resources, he must know how to contact @S-Holmes”, said @Michelle.
And it was true, after a call with @thatJavaGuy, they were able to obtain @S-Holmes’s phone number.
“Howdy, this is @S-Holmes, what can I diddily ding dong do you for?”
“Hi, I’m @Alice, I’m from DevCo and I was hoping that I could get your help in our mission.”
“What kind of mission?”, asked @S-Holmes.
“We want to @hack @theNSA.”, replied @Alice.
“Okay… I think I might be able to hel-diddly-elp you! There’s an old and abandoned laberino noodly-near @stacked Street. It was made in @1989 and since then, it houses a magical computeroo that can hel-diddly-elp you in your mission. So, you just have to connect the computeroo to the Internet and you can diddily ding dong do your programmeroo thing and then you'll have access to the the noodly-nsa diddily ding dong database!”, answered @S-Holmes.
S-Holmes continued, “But I shall warn you, there's a riddly-rumorino that the laberino was abandoned because of an @electric-ghost that lurks there, but I bel-diddly-elieve it is just a computeroo program that was diddily ding dong designed to try to @stop hackers from accessing the top secret stuff!".
“Okay, thanks for your help! I bet we can handle whatever this @electric-ghost thing is, so… Goodbye!”, replied @Alice.
“Goodbye!”, said @S-Holmes and that ended their conversation.
Luckily, the @stacked Street was just a couple of miles away from them, so they reached the lab quickly.
As they got close to the lab they saw something that really surprised them…
--------
To be continued in part two...
(Do you want a part two? :/)
My first ever story is a little special because it is kind of dev related at it has "cameos" by various devranters, as you might have noticed.
How many did you count?
More in Part Two.
Thank you for reading and please, any feedback is welcome. Did you like it?
I haven't really revised it once, it is straight out of the keyboard.
Should I drop the "@" ?
But then it would impossible to spot some of the devRanters .
Let me know.
PS
What should be the title?
1)Alice in DevLand?
2)Adventures of Alice and Friends: Hacking the NSA?
You decide..(or maybe I'll pick the second one :D)21 -
Man, what a way to start the week. Our mailserver went nuts (something about a Shellbot virus, I don't know) and we were forced to migrate to a new one. Clients calling in panic and threatening to sue us and shit. I was the one tasked to fix the problem (I am a developer mind you, my sysadmin knowledge is limited to google searching and contacting support). At the same time, Turkish hackers attacked our other server and forced me to fetch backups and clear spamming scripts. And to top it all, I was forced to answer the phone calls and respond to the threats. Man, I must have been a complete prick in my previous lifetime to deserve this.4
-
When i started to get into computers i didn't know a shit about Linux, i had the typical idea that is for hackers. Now i see how things that we use everyday like the phone uses it.
#againstignorance3 -
I was helping a client launch a new website. We met in a restaurant to do the final launch work. I mentioned I use VPN software to protect my computer on public WiFI and taught him what it means. He said it sounds hackerish and untrustworthy and I had a hard time explaining how it’s actually a countermeasure to hackers.
The next day he calls and says his cell phone is acting up and wants to know what my VPN software might have done to cause that.
How do some people get dressed in the morning?2 -
At a previous job I bumped heads with the IT person a lot because he would spread misinformation about technology so the owners would never replace him. This was conversation with the VP:
VP: Hey I just got a new security setup at my house and I can monitor everything with my phone.
Me: That's cool.
VP: I'm rethinking it because [IT guy] said it was very dangerous to have, what do you think?
Me: ....? What did he say was dangerous about it?
VP: He said hackers could then gain access to cameras and plan the perfect time to rob me since it's in the cloud.
Me: I seriously doubt anyone is planning an Ocean's 11 heist to steal your TV.
VP: Yea I thought it sounded weird when he told me.3 -
My boyfriend had been deleting all messages every time for the last couple of days from his phone and he did not know that i was peeping him, but when I asked him why he was deleting all messages from his phone but he always replied that his phone memory was full and needed more space. I searched for a hacker who can recover deleted data and information on my boyfriend's phone and luckily for me i came across this reliable ethical hacker group, this hacker did the work for me and provided results and i discovered my boyfriend has been deceiving me. He was simply deleting all pictures, call logs, chats and text messages between him and his secret girlfriend so i wont be able to see what he has been up to behind my back. Thank God for this reliable group of hackers who are ready to help. I must say am really impressed with the services I got from Maestro Encrypter Financier and am here to say a very big thank you: contact maestroencrypter (@) financier. com . And I also can testify that hackers can often recover deleted data by accessing the remnants left in storage devices using specialized software.9
-
Fucking christ this year is a fucking shitfest:
- wpa2 krack
- "DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions"
- "Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites"
- "Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe"
My fucking router didn't yet get patched, my fucking phone is outdated and I can't change to my patched one because devrant just shits the bed in extended desktop mode. Windows 8.1 loses support in 3 months, rendering my last chance of using it on my surface pro done, making me use windows 10 with its fucking shit ass not optimized tablet interface. I have just fucking constant paranoia what else could be hacked tomorrow, nothing is fucking safe anymore for fucks sake. I even went as far as implement 3 step auth and intrusion detection on my shitty ass VPS nodes, fucking give me a break you fucking assholes.5 -
Fuck the feelings of powerlessness and helplessness. when a friend comes crying for you for help with their hacked account and you keep asking them about what they did to protect it in the first place and they reply with nothing, no recovery email, no recover phone, no secondary verification, NOTHING. and you can do nothing but stand there and watch them cry while you can literally do nothing because there literally nothing you can do to retrieve their stolen accounts. FUCK BLACK HAT HACKERS.3
-
I got so many concerns/questions about the EU chat control and the future. Sorry for my long rant lol:
1) What about projects that are on life support and no active development?
2) What about chat application in video games or the chat service on the website of a local shop
3) What about false flags? Like that parent who got into legal trouble for sharing a picture of his kid with a doctor to get a medical opinion on some skin condition. (might misremember the details)
4) What about false flags like instagram banning accounts and forwarding it to the police department and over-exhausting the resources of the police (accidental 'DDOS' of their personel)
5) What if the content shared in country A is legally OK but not in country B. What if you then travel there? Or if your participant is from that country B.
6) What about content that is taboo but should be OK to discussed? Like puberty or hormonal discussions online? Some subreddits like "stopsmoking" is now also regional banned by Reddit in the UK to avoid any unneeded risks. That is bad. YouTube had some problem where adult content existed on their platform but labeled as educational.
7) What if you encrypt messages before sending it. Will you be banned just in case? What if you need support with an app and you send an encrypted application crash log that came from your computer, will you now be banned just in case?
8) What if you like privacy and have those apps for innocent purposes. Is having those apps now illegal
9) What if criminals use apps from Asia or Africa or somewhere where this law is not present/enforced. Or what if they create a simple app with this encryption. It is not difficult to make one.
10) Before 2001, airport security was very lax but then 9/11 happened and the security increased. It never went back to the state before. Since they have or will have this check, what will them stop it from expanding it after the next disaster of an unrelated accident (like terrorist attack).
11) What if those services miss a case? Will the company that allows this to be send now have legal trouble?
12) What if users are using metaphors or practice self-censorship to avoid flagged words? We see it with monetization in social media (like murder or killing is replaced with "unaliving")
13) It will be just an other problem to start a new company with limited budget. So start-ups will just have a bit harder time to break into the market.
14) this might just push users away from mainstream options
15) it's just an other attack vector for hackers to use
16) Do we want to have private companies be able to scan our messages because they are contracted by the government? They can have their own bias to satisfy their shareholders. What if they are invested by the Big Oil so critic towards the Big Oil is altered? How certain can you be this won't happen now or in the future. Reddit Admin did that before so who knows at this point.
17) Anonymity will disappear.
18) Different companies verify users and store this data so this seems like a major cyberrisk and identity theft waiting to happen
19) fragmentation of users. it is now annoying that some family or friends don't use whatsapp but use telegram and the other way around. You might need +5 chat application to keep contact and lose social relationships.
20) Is AI detected messages even legal proof in court?
21) What if you talk about video games and flag the AI system this way? Or use abbreviation from a niche community that also overlaps with flagged words (like checkpoint being abbreviated as CP) or just the language with poor support or use a 'dialect' in your chat that trips up the software.
22) What if your phone is stolen and they send those messages in your name or this is done remotely.
23) What if you are sharing old family pictures and there is 1 and only 1 odd picture that just barely trips up the system.
24) Games like 'Beyond human' also has gameplay that hurts a fictional child which fits the storyline and acts as shock value. Will this be banned
25) The newer population will see this as normal so what will they find acceptable if they can now vote7 -
Enter one word in terminal and hack fucking government's, CIA's, NSA's, websites, database and servers, just like hackers in movies do.
If I failed to achieve this, would love to hack Sony's website and post a message on all their websites
"We make terrible mobile phone" -
That moment you setup 17 domains on sparkpost as a email delivery system
make your account secure with 2 factor authentication like a good infoSec enthusiast
Go on with your life
Having a Phone crash but nothing to worry because you made them backupz
Restore backupz
once again go on with your happy life.
Having to setup a different bounce action on sparkpost
logging in to sparkpost to make the adjustments
opening google authenticator
realising the backup you restored was before you added the sparkpost entry
mailing sparkpost asking to deactivate 2factor authentication
Having them tell me that they have no access to Google authenticator so they can't help me and all they can do for me is delete my account if i answer their 7569357 questions that i entered a year ago ..
--
You have access to your database yes ? You can delete my account but you can't adjust a fcking Boolean column from true to false? #@?#&!
Why even offer a feature where you have apparently no control over. Stuff like this happens all the time and almost no one saves that fcking authenticator secret.
Make people use authenticators to keep the hackers out, forces them out instead.4 -
Hire the Best Hacker At Mighty Hacker Recovery.
It was a normal morning when I realized my wallet was missing. Panic immediately set in as I frantically searched through my apartment, hoping to find it tucked away somewhere. But it was nowhere to be found. I retraced my steps from the previous day, but the wallet was still missing. I knew I had to act fast. My wallet contained my pharse key, which gave me access to my cryptocurrency wallet. And in that wallet, I had 4.8 million AUD worth of cryptocurrency. It was a fortune that I had worked hard for, and I couldn't afford to lose it. As I sat on my couch, racking my brain for any clues or leads, my phone rang. It was an unknown number. I hesitated to answer, but something told me to pick up. And I'm glad I did because on the other end was a representative from Mighty Hacker Recovery. At first, I was skeptical. How did they know about my missing wallet? But they assured me that they had a team of skilled hackers who could help me recover it. They explained that my wallet's pharse key was encrypted and that only a skilled hacker could access it. With nothing to lose, I agreed to meet with them. They were professional and had a wealth of knowledge about cryptocurrency. They assured me that they would do everything in their power to recover my wallet. And they did. After days of hard work and numerous attempts, they finally cracked the encryption and retrieved my pharse key. I couldn't believe it. I was overjoyed and grateful beyond words. I couldn't thank them enough. Thanks to Mighty Hacker Recovery, I was able to access my wallet and retrieve my 4.8 million AUD worth of cryptocurrency. They saved me from a financial disaster, and I will forever be grateful to them. I couldn't believe how lucky I was to have crossed paths with them. They were truly a team of mighty hackers, and their skills were unmatched. I made sure to spread the word about their services, and I even saved their number on my phone, just in case. From that day on, I made sure to keep my pharse key safe and secure, knowing that Mighty Hacker Recovery was just a phone call away if I ever needed them again. And I was at peace, knowing that my fortune was in safe hands. WhatsApp +1 845 699 5044.
-
HIRE A HACKER TO SPY ON A CHEATING PARTNER. CONTACT BEST RECOVERY.
My partner has frequently been deleting all messages for the last couple of days from his phone and he didn’t know I was peeping at him, then I asked him why he was deleting all messages from his phone but he claimed that his phone memory was full and needed more space. Immediately I went in search of a hacker who could get me deleted information and contents from my partner’s phone and luckily for me, I came across this reputable ethical hacker Best Recovery, this hacker got the job done for me and provided me with results and I saw that my partner has been lying to me. He was deleting all pictures, call logs, chats, and text messages between him and his secret lover so I won't get to see what he has been doing at my back. Thank God for reputable hackers who are ready to help. I am impressed with the services I got from Best Recovery and am here to say a very big thank you: contact him on Gmail. bestrecovery890 @gmail com3 -
After trying a few spyware programs for several productive hours, I eventually came across a recommendation for Recovery Nerd, a group of expert hackers, who performed an outstanding job. I will never again have to search the internet for hackers. But you might be wondering if your spouse is doing something behind your back. You believe your husband or wife is deceiving you. Discover the truth and find mental tranquility with these amazing hackers. Reach them via email at recoverynerd @ mail . com, or by SMS, phone, or WhatsApp at +6 488 893-280.3
-
GRAYHATHACKS CONTRACTOR HELPED ME GET PROOF THAT MY HUSBAND WAS HAVING AN AFFAIR
Hi there. You know, the kind of situation where you're not sure if you're making the right decision, but you know you need answers. That's where I was a few months ago. My husband had been acting so distant, so suspicious, and so overprotective of his phone. The gut-wrenching feeling of not knowing what was happening was eating me up inside. I'd catch him smiling at his screen when he thought I wasn't looking, and then he'd quickly switch it off when I walked into the room. The whispers and secret calls were just too much to bear.
That's when I stumbled upon Grayhathacks Contractor. At first, I was skeptical, but desperation can make you consider things you never thought you would. I reached out to them, and from the get-go, they were so understanding and professional. They made me feel like I wasn't alone, like I was doing the right thing for my peace of mind. And boy, did they come through for me!
The process was surprisingly simple. They had me send over my husband's phone details, and they got to work right away. Within a week, they sent me a detailed report that had me floored. It was like they had peeled back the layers of deceit and laid bare his infidelity. The damning data they harvested from his phone and laptop was overwhelming. They found text messages, emails, and WhatsApp chats that left no doubt in my mind. He was having an affair with a colleague from work. The conversations were explicit, filled with lovey-dovey language and promises that should've been reserved for me. There were dates, times, and even hotel bookings that coincided with nights he claimed to be working late. And the photos! The raw pain of seeing those images of him with someone else is something I'll never forget.
The thing that really got me, though, was the voice memos. Hearing his voice, saying things to her that he hadn't said to me in years, was devastating. But it was also the proof I needed to finally confront him. And when I did, he couldn't lie his way out of it. The evidence was right there, cold and clear. Their spyware was top-notch. It was undetectable, and it gave me access to everything: his calls, messages, emails, social media, and even his location history. It was like having a pair of invisible eyes and ears. They even helped me understand the technical side of things, guiding me through the process of checking the data they had collected.
If you're in the same boat I was, I totally get it. The thought of hiring a hacker is daunting, but sometimes you just need to know the truth. And let me tell you, Grayhathacks Contractor will give you that truth. They're not just hackers; they're detectives of the digital age, helping people like you and me uncover the painful realities that are often hidden in plain sight.
I'm not saying what they do is pretty, but sometimes you have to get a little dirty to find the truth. And when you do, you can start to rebuild your life, piece by piece. It's been a tough journey, but thanks to Grayhathacks Contractor, I'm on the path to healing. I now know exactly what happened, and I can make informed decisions about my future.
So, if you're feeling lost and need answers, don't hesitate to reach out to them. And who knows, maybe one day you'll be writing a review like this, sharing your own story of how they helped you get your life back.
-
Is my iPhone hacked or bugged? [GrayHat Hacks Review] Remove spyware
A few weeks ago, I had noticed my wife acting increasingly suspicious and secretive, and it was as if she knew my every move. I realized that my laptop had become annoyingly slow and would randomly redirect me to unfamiliar websites on its own. My phone would sometimes light up with notifications that I hadn't received. I'm not the most tech-savvy person, but even I knew that something was off. That's when I stumbled upon the term 'spyware' and the horrifying reality of how it could be used to invade someone's privacy.
Desperate to know the truth, I found myself in a dark corner of the internet, searching for a way to get to the bottom of my suspicions. That's when I came across a review for GrayHat Hacks Contractor, a team of ethical hackers well versed in hacking and spywares. I sent them an email detailing my situation and the signs that had led me to suspect my wife. To my surprise, they responded within minutes, offering a free consultation and assuring me of their confidentiality.
They explained their process and the tools they would use to scan my devices for any signs of intrusion. They were incredibly thorough, explaining the different types of spyware that could be planted and the ways they could be hidden. The actual process of detection and removal was done remotely. They provided clear, step-by-step instructions on how to give them secure access to my iPhone and laptop.
The results were shocking. Within a few hours, they had found and removed not one, but multiple instances of spyware on both my phone and computer. The extent of the violation was staggering. My wife had been tracking my location, reading my messages, and even listening in on my calls. I was devastated, not just because of the betrayal, but because I had been living under constant surveillance in what I had thought was a sanctuary of privacy.
Armed with the evidence, I approached my wife with a heavy heart. Through tears and anger, she admitted to installing the spyware, driven by her own insecurities and suspicions. She confessed to an affair that had been going on while I was away on business, a classic case of projection. Turns out that she was the one that was cheating. GrayHat Hacks Contractor not only removed the spywares but also taught me how to protect my devices and privacy in the future.
Our relationship is now a work in progress, filled with healing and rebuilding trust. The pain of her infidelity still lingers, but with the truth out in the open, we can begin to move forward. If you ever find yourself in a situation where you suspect your privacy is being invaded, I urge you to consider contacting GrayHat Hacks Contractor.
-
Soft wear tech is a platform designed to help you recover lost coins, wallets, and cryptocurrencies.
When thieves stole a staggering $900,000 worth of Bitcoin from my digital wallet, I was devastated. As an experienced cryptocurrency investor, I had always taken pride in my security measures, believing my assets were safe. Nonetheless, these skilled hackers breached my defenses and made off with my hard-earned digital coins, leaving me not only with a significant financial loss but also with a feeling of violated trust and security.
Refusing to let the criminals get away with their actions, I took immediate steps to address the situation. I reported the theft to the authorities, fully aware that tracing cryptocurrency transactions is notoriously difficult. However, I was determined to pursue every avenue available. That’s when I discovered the innovative services offered by SOFT WEAR TECH, a company specializing in tracking and recovering stolen digital assets.
The dedicated team at SOFT WEAR TECH quickly sprang into action, meticulously analyzing the blockchain transaction data to follow the money trail. Thanks to their exceptional investigative skills and cutting-edge tools, they were able to pinpoint the location of my stolen Bitcoin and initiate the recovery process. It was a long and arduous battle, with the thieves attempting to cover their tracks and move the funds. Yet, the SOFT WEAR TECH team remained resolute, outsmarting the criminals at every turn.
After weeks of relentless effort, they successfully reclaimed my $900,000 in Bitcoin and returned it to me. I was overjoyed—not only was my investment restored, but I also felt a sense of triumph over those who thought they could escape unscathed. This experience has heightened my vigilance and commitment to security in cryptocurrency investing, and I am deeply grateful to have had the SOFT WEAR TECH team fighting to protect what belongs to me.
For inquiries, feel free to reach out via
Email: softweartech5@gmail.
Email: softewar.tech@yandex
Phone : +1 9594003352 -
I FOUND OUT ABOUT MY WIFE’S INFIDELITY USING GRAYHATHACKS CONTRACTOR
I was in a situation that I never thought I'd find myself in. My wife and I had been together for five years, and I had noticed some changes in her behavior lately. She was distant, secretive, and always had her phone glued to her hand. I tried talking to her, but she'd just brush me off, saying it was work stress. I knew deep down it was more than that. I couldn't just ignore the gut feeling that something was off.
So, I did what any desperate, confused, and heartbroken person would do - I started looking for answers. That's when I stumbled upon the world of hackers and investigators. I first came across the Beviant Group of Hackers. They promised me the moon and stars, but all they delivered was a bunch of empty promises and a lighter wallet. I was about to give up hope when my cousin, who had been a silent witness to my pain, suggested I try Grayhathacks Contractor.
It's no exaggeration that it was the best decision I ever made. I was skeptical at first, I'll admit. I mean, I had just been burned by another group, so how could I trust them? But something about their approach was different. They were professional, empathetic, and above all, discreet. They assured me that they'd help me find the truth without invading my wife's privacy any more than necessary.
They set up a plan to track her movements, intercept her calls, and read her messages and emails. The first few days were nerve-wracking, but then the information started to trickle in. It was like they had a map of her life laid out in front of them. They were so precise with their work, it was unbelievable. They pinpointed her location down to the minute, showed me the calls she was making, and even provided me with transcripts of her chats.
What they uncovered was like a punch in the gut. My wife had been fooling around with a coworker, someone she claimed was just a friend. They had planned vacation trips together, all under the guise of work. The nerve of her. But here's the kicker - she had been using our joint account to fund these little escapades. The betrayal was unreal.
The confrontation was hard, but with the solid proof in my hand, I couldn't deny the truth anymore. It was a mix of anger, sadness, and relief, really. I finally had the answers I needed to move forward. And even though it's been a tough road, I'm starting to pick up the pieces of my life, thanks to Grayhathacks Contractor.
If you're in a similar situation, I can't recommend them enough.
-
I faced an unimaginable nightmare. My phone was attacked by a virus that compromised my Binance wallet, allowing hackers to drain all of my Ethereum and Bitcoin, which amounted to around $525,000. I was completely caught off guard, not understanding how this could happen, and was desperate to find a way to recover my stolen funds. I immediately tried to reach out to Binance’s support team, but after several attempts, I realized I couldn’t get through to anyone. My situation felt hopeless, and I had no idea what to do next. In a last-ditch effort, I went to my local police station to file a report, hoping they might be able to help. Unfortunately, they told me they didn’t have the capacity or expertise to deal with cryptocurrency-related fraud, especially one involving a virus. I left the station feeling more defeated than ever. It seemed like my $525,000 was gone for good. Just when I thought there was no hope left, a gentleman approached me at the station. He handed me a business card for Trust Geeks Hack Expert , a company that specializes in recovering lost or stolen cryptocurrency, particularly in cases involving hacking and viruses. Though I was initially skeptical aware of the scams that often plague the crypto world I decided to contact them support E m a i l : Trust geeks hack expert @ ast ser vi ce.. com And Te le gr am. Trust geeks hack expert . My situation was desperate, and I had to at least try. I reached out to Trust Geeks Hack Expert and shared all of the details of the incident, including the fact that my phone had been infected by a virus. I provided them with the transaction details, wallet addresses, and any other relevant information they requested. To my amazement, within just 72 hours, I received a letter from Trust Geeks Hack Expert confirming that they had successfully recovered all of my funds. Not only did they retrieve the $525,000, but they also traced the virus and identified the individuals responsible for the attack. The experience was eye-opening. Losing cryptocurrency due to a virus attack on your phone can feel like an irreversible blow, but it’s not always the end. With the right help, recovery is possible. Trust Geeks Hack Expert proved that there are trustworthy professionals who specialize in cases like mine. If you find yourself in a similar situation, I highly recommend reaching out to Trust Geeks Hack Expert.3
-
🚀 “I Wanted GitHub Copilot in My Pocket — So I Built It Myself”
For years, I’ve had this weird habit of coding from random places — cafés, buses, hospital waiting rooms, you name it. But every time inspiration hit, I found myself thinking the same thing:
“Man, I wish I could just use Copilot on my phone.”
It’s 2025. We’ve got AI writing novels, generating music, and summarizing 500-page research papers in 2 seconds — yet somehow, GitHub Copilot still refuses to leave the comfort of VS Code on desktop.
So I decided to fix that.
💡 The Idea
It started as frustration — a “wouldn’t it be cool if” moment. I was halfway through an idea for a small project on a train, and my brain screamed:
“Why can’t I just ask Copilot to finish this function right now?”
VS Code was sitting at home, my laptop was dead, and all I had was my phone.
That night, I scribbled this into my notes app:
“Bridge Copilot from VS Code → phone → secure channel → no cloud.”
At the time, it sounded insane. Who even wants to make their life harder by reverse-engineering Copilot responses and piping them into React Native?
Apparently — me.
🧩 The Architecture (aka “How to Lose Sleep in 4 Easy Steps”)
The system ended up like this:
VS Code Extension <-> WebSocket <-> Discovery API (Go + Redis) <-> React Native App
Here’s how it works:
The VS Code extension runs locally, listening to Copilot’s output stream.
A Go backend acts as a matchmaker — helping my phone and PC find each other securely.
The mobile app connects via WebSocket and authenticates with a 6-digit pairing code.
Once paired, they talk directly. No repo data leaves your machine.
It’s like a tiny encrypted tunnel between your phone and VS Code — only it’s not VPN magic, just some careful WebSocket dancing and token rotation.
🛠️ The Stack
Frontend (Mobile): React Native (Expo)
Backend: Go + Redis for connection brokering
VS Code Extension: TypeScript
Security: JWT + rotating session keys
AI Layer: GitHub Copilot (local interface)
🧠 The Challenges
There’s a difference between an “idea” and a “12-hour debugging nightmare that makes you question your life choices.”
Cross-Network Discovery:
How to connect phone and desktop on different networks?
→ A lightweight Redis broker that just handles handshakes.
Security:
I wasn’t making a mini TeamViewer for hackers.
→ Added expiring pairing codes, user-approval dialogs, and local-only token storage.
Copilot Response Streaming:
Copilot doesn’t have a nice public API.
→ Hooked into VS Code’s Copilot output and streamed it over WebSocket.
(Yes, 2% genius and 98% madness.)
UX:
The first version had a 10-second delay.
After optimizing WebSocket batching and Redis latency, it’s now near-instant.
🤯 The “Holy Sh*t, It Works” Moment
The first time my phone sent a prompt — and my VS Code actually answered with Copilot’s suggestion — I legit screamed.
Like, full-on victory dance in the middle of the night.
There’s something surreal about watching your phone chat with your desktop like they’re old coding buddies.
Now I can literally say:
“Copilot, write me a REST API,”
and my phone responds with fully generated code pulled from my local VS Code instance.
No VPN. No cloud syncing. Just pure, geeky magic.
⚡ The Lessons
The hardest problems aren’t technical — they’re psychological.
Fighting “this is impossible” is the real challenge.
Speed matters more than perfection.
Devs don’t want beauty; they want responsiveness. Anything over 1s feels broken.
Security must never be an afterthought.
I treated this like a bank tunnel between devices, not a toy.
Build for yourself first.
I didn’t make this for investors or glory — I made it because I wanted it.
That’s the best reason to build anything.
🧭 The Future
Now that it’s working, I’m turning this experiment into something shareable.
The dream: an app that lets every developer carry Copilot wherever they go — safely and instantly.
Imagine debugging on your couch, or editing code in bed, or just whispering to your AI assistant while waiting for coffee.
Phones today are more powerful than early NASA computers.
Why shouldn’t they also be your code editor sidekick?
So yeah, that’s my story.
I built VSCoder Copilot — because I wanted to code from anywhere, and I refused to wait for permission.
If you’ve ever built something just to scratch your own itch, you already know this feeling.
That mix of frustration, caffeine, and late-night triumph that reminds you why you fell in love with coding in the first place.
Because at the end of the day, that’s what we do:
We make ideas real — one ridiculous hack at a time. 💻🔥9 -
SURVIVING THE BYBIT HACK HOW CRYPTO RECOVERY CONSULTANT SECURE MY ASSETS
It was the kind of morning that left my heart pounding in my chest. My phone buzzed with a series of alerts—emails, messages, all talking about one thing: Bybit had been hacked. North Korean hackers had breached the exchange, and the total losses were over 1.5 billion dollars in cryptocurrency, Ethereum to be precise. My stomach churned as I read, realizing I was one of the many affected. I had been an avid Ethereum investor, with a substantial amount of my savings tied up in the coin. The idea of losing it all was unbearable. But panic was no help, so I immediately began searching for solutions. That’s when I stumbled across a company that specialized in crypto recovery and securing your asset, CRYPTO RECOVERY CONSULTANT. Their website promised to assist with situations just like mine. Skeptical but desperate, I reached out, hoping for a miracle. To my surprise, a representative called me within minutes. They explained that they had experience securing wallets from compromised exchanges and securing coins during massive hacks like the Bybit breach. After a brief consultation, they assured me they could secure my Ethereum by implementing a stronger security system that would block any unauthorized access. They guided me step-by-step, helping me transfer my assets to a more secure wallet and setting up additional layers of protection that I never even knew existed. Thanks to their swift action and expertise, I felt a weight lift from my shoulders. The hackers wouldn’t be able to touch my Ethereum now. My coins were safe, protected by multi-signature authentication, cold storage, and state-of-the-art encryption. Without CRYPTO RECOVERY CONSULTANT, I would have lost everything. Their quick thinking and advanced security measures saved my assets from the grasp of cybercriminals. I couldn’t be more grateful. Now, I sleep soundly, knowing that my Ethereum is safe, all thanks to them. cryptorecoveryconsultant312[@]zohomail,,,com cryptorecoveryconsultant[@]cash4u,,,com
1 -
The majority of information on the internet may be added to, removed, altered, and so on, and they can be useful to you in a number of ways. As a group of skilled hackers, we put your needs first. You can be confident that we will protect your privacy!.
Among the services we offer are the following ones:.
*. Consulting Services.
*. Recovery of Email Passwords.
*. Hacking Email.
*. Database Access.
*. Credit Repair [tradelines for installments and revolving loans].
*. Payment of student loans.
*. Bug bounty (penetration testing).
*. Hack a phone to snoop on anyone, including a spouse who is unfaithful.
*. Criminal record clearance.
*. Recovering lost money from capital investments and binary options.
*. Improvement of School Grades... and much more.
If your particular job isn't on the list, you can still get in touch with us, and we'll be pleased to assist you.
We also offer blog posts on hack news/updates, hack tutorials etc.
BLOG: hackburgblog . noblogs . org
WEBSITE: hackburg . co
CONTACT us: hackburg @ cryptolab . net3 -
HIRE A PHONE HACKER AT GEARHEAD ENGINEERS
It is not easy for a man to admit to himself that his wife is a serial cheater. Well, that’s my current situation. My wife of 10 months has been cheating on me with multiple men and this came to me as a complete shock. I ignored all the red flags from the beginning, particularly the way we met, a one night stand at a friend’s place after she begged me to sleep with her. At that time I thought it was strong chemistry but it turns out it’s a habit. I was so blinded by love and desire for attention that I ignored all her negative characters. My delusional self began suspecting her after noticing she is always protective of her phone. So I got a hacker at gearheadengineers dot org to get the job done. I still have ptsd from all the things I found in her phone since the hackers gave me access to all her phone functions. Guys, please do thorough research on the person you decide to spend the rest of your life.1 -
Are you looking for a reliable Hacking Service?
RECOVERY NERD renders the best hacking service on the web. They are the most professional team of hackers in the dark web.
RecoveryNerd offers tons of services:
1. Remote phone hack
2. Crypto Recovery
3. Upgrade gpa
4. School Grades Change
5. Increase credit score
6. Database hack
7. Facebook, Whatsapp hack
8. Remote phone Hack .
9. Remove criminal records.
They also sell high grade techs and hacking chips and gadgets if you are interested in Spying on anyone. They sell software, programs, apps for hacking services.
Interested parties should contact : RECOVERYNERD @ MAIL DOT COM7 -
HIRE TECHNOCRATE RECOVERY PROFESSIONAL CYBER HACKERS
I’ve always been cautious with online security, especially in the crypto world. I changed my Bitcoin wallet password monthly, thinking it was the best way to stay safe. However, I went a bit overboard one time, creating a password so complex I couldn’t remember it. When I locked myself out, panic set in. After countless failed recovery attempts, I reached out to TECHNOCRATE RECOVERY, a trusted name in the crypto community. They worked quickly and professionally, recovering my funds in days and giving me peace of mind. They also helped me set up a more practical, secure password strategy. Lesson learned: Security is important, but simplicity matters too. Thanks to TECHNOCRATE RECOVERY, I’m now more secure and sleep easy knowing my assets are safe.
Contact below details for urgent help
Phone Contact: +1573 3563 708
Send a Message: technocratrecovery@contractor.n et1 -
The majority of information on the internet may be added to, removed, altered, and so on, and they can be useful to you in a number of ways. As a group of skilled hackers, we put your needs first. You can be confident that we will protect your privacy!.
Among the services we offer are the following ones:.
*. Consulting Services.
*. Recovery of Email Passwords.
*. Hacking Email.
*. Database Access.
*. Credit Repair [tradelines for installments and revolving loans].
*. Payment of student loans.
*. Bug bounty (penetration testing).
*. Hack a phone to snoop on anyone, including a spouse who is unfaithful.
*. Criminal record clearance.
*. Recovering lost money from capital investments and binary options.
*. Improvement of School Grades... and much more.
If your particular job isn't on the list, you can still get in touch with us, and we'll be pleased to assist you.
CONTACT us: hackburg @ cryptolab . net1 -
was in urgent need of a hacker to help recover my lost files and hack my partner phone. I met a hacker who scammed me of my money. I was scared of hiring another hacker not until i saw good recommendations about ( spyrecovery36) of his good works. i gave him a try cos i was desperate to get my files back and hack my partner phone, Good to see there are still great hackers like ( spyrecovery36 @ gm ail com ). i got my job done and can recommend him to anyone else. He also offer services like delete criminal record, recover wallet, track GPS, facebook recovery and many more...
-
CONTACT US; HACKERSPYTECH@ GMAIL COM
We are professional hackers
Do you need to access a computer remotely, phone hacking, Gmail, Yahoo, Hotmail account, Hacking a Social Media account Whether you need a Facebook, Instagram, Twitter, WhatsApp, Snapchat, TikTok or any other account hacked, and without being detected?
You have lost access to your Bitcoin, Litecoin, Ethereum or other type of wallet and you no longer know what to do to recover your capital. We have developed very powerful wallet recovery solutions that have already given very good results.
As for smartphones and web-servers, everything is vulnerable and the human factor is always in play. Using phishing, hacking networks or installing malware, we will help you achieve your goal.
110 -
Tired of hiring a hacker online with so much disappointments and no responds . I needed an hacker to help recover my lost funds from a fake investment company, i decided to hire a hacker and he got away with my money, i gave up hiring a hacker after my 3rd trial not until i got introduced to this expert hacker ( remote spy hacker @ g m ail ) who offers phone hack , crypto recovery , snapchat hack and many more services. i tried this hacker and was expecting same disappointment like other hackers but this expert got me surprised , he helped me recover my lost funds from the investment company . Anyone in same situation like i was should hire this expert .
-
GET THE BEST HACKING SERVICE‼️ contact -: hackrontech gmail com, They are group of talented hackers who have been Hacking in secret for almost a decade now. Here Are List Of Hacking Services We Offer-: ▪️Phone Hacking & Cloning ▪️ m ail Hakcing ▪️Soc -; ial Me (dia) recovery (Facebook, Instagram e.t.c) ▪️Computer Hacking ▪️Deleted Files & Documents Recovery ▪️Breach Detection ▪️Website Hacking ▪️Tracking using GPS and Spyware ▪️Deleted Mails and Text messages Recovery OTHER SPECIAL HACKING SERVICES ▪️Binary Option Recovery ▪️Scam Money Recovery ▪️Bitcoin Multiplication ▪️Change Of Grades In Universities/Colleges ▪️Phone Calls Monitoring ▪️And lots more... For more enquiry, reachout via: hackrontech gmail com All Right Reserved.
I recommend professional expert Email: hackrontech @gmail com for Recovery Funds/ Cryptocurrency/ Recovery of Stolen Bitcoin / Bitcoin Mining/ Increase of Credit score/ MOBILE SPY REMOTE CONTROL ACCESS AUTHORIZATION. Removing Bad Records from Both Public and Private database.
-
THE BEST HACKER
Finally i am so happy i found this honest, recommended and reliable hacker before now I have been ripped off by fakes who claimed to be professional hackers until i came by "ULTRATECHPROSOLUTIONS at gmail (dot) COM" a legit hacker across the internet who helped spy on my fiance phone to save my dying relationship exposing chat evidences on my spouse cheating with friend. being ripped off. I appreciate the good hack services Webhacker provides, does all sorts of cyber hacks like phone spy monitoring calls, sms, Whatsapp, Viber, Instagram, Kik, Hangout, Snapchat, Facebook it will be done fast honest and reliable i promise will provide result always and won't expose your confidential data to anyone. The only Ethical hacker i guarantee to talk about employ instead of being victims the expertise as world class, also helped recover all the funds i was ripped off.2 -
Sometime earlier this year i had worked with too many hackers who i thought will help me out with hacking into my wife cell phone but later end up getting ripped off my cash.. not until one of my close friend got me introduced to Williams the best when it comes to hacking i’d say. Right after i hacked into her cell phone and saw too many texts with her lover.. I was not settled at all, so i had to run a DNA test on our only child who is just 3 years old and to my greatest surprise she wasn’t mine. Thanks to this supper trusted hacker because without them i won’t have realized all about this. contact them … Email: williamscyberghost @gmail. com
Call, Text, or Signal +1(602) 456 1862 @williamscyber.02
Tell them Adrian referred you1 -
Hey guys,
I just want to say it was great working with CYBER SPACE and how much hope they have restored in my life. Getting to view my partners messages directly on my phone was like a dream that will never be true. I had unsuccessfully used other hackers with no results and no feedback, but in only a few hours of working with cyber space I have been able to view every content on her phone remotely and even deleted messages from 6 months back. My relationship is now in its best form because i know where i stand . you can also reach him via this email : cyberspacehacker911 at gmail DOT com1 -
You may be suspecting that your wife is cheating on you. The doubts linger, causing anxiety and sleepless nights. In a desperate search for the truth, he turns to TrustGeeks Hack Expert, a renowned digital forensics company known for its expertise in uncovering hidden information. And so, the curious case begins. TrustGeeks Hack Expert embarked on a mission to unveil the hidden messages that held the potential to confirm or dispel the husband's suspicions. Using their arsenal of expert techniques, they began the intricate digital investigation process. The first step involved collecting all the necessary details, such as the communication platforms used, usernames, and any available passwords.
With the information in hand, the team at TrustGeeks Hack Expert delved deep into the digital realm, employing cutting-edge forensic tools to recover deleted messages and uncover hidden conversations. Once the messages were retrieved, they underwent a meticulous examination, deciphering the content and ensuring their authenticity for future use. The final step involved presenting the uncovered messages to the client, providing him with the concrete evidence he needed to confront his wife and make informed decisions about his relationship. Thanks to the wizardry of TrustGeeks Hack Expert, the truth was uncovered, and the husband was equipped with the knowledge he sought. A selection of services designed especially to unearth the truth behind messages from an unfaithful spouse are provided by TrustGeeks Hack Expert. Their team of professionals is proficient in data recovery, digital forensics, and meticulous tracking methods. With their help, people can obtain the proof they require to validate their suspicions and make wise choices regarding their relationships. Even though there may be a lot of grounds for suspicion, it's crucial to conduct the inquiry in an ethical manner. TrustGeeks Hack Expert is aware of how delicate these circumstances can be, and they take care to make sure that all of their procedures follow moral and legal guidelines. Their mission is to give people the information they need while protecting their right to privacy and secrecy. TrustGeeks Hack Expert proficiency in digital forensics and data recovery is just one of their many skills. They have the ability to retrieve erased emails, messages, and other digital traces that might contain information about the secrets of an unfaithful spouse. They are able to resurrect material that has been concealed and offer it as proof by employing sophisticated strategies. TrustGeeks Hack Expert is aware of the significance of social media surveillance in this day and age, as these platforms play a big part in communication. They are able to monitor messaging apps, keep tabs on online activities, and even offer phone tracking services. People can use their knowledge to better understand their partner's interactions, which enables them to make defensible decisions. Remember, while discovering a cheating spouse can be a painful experience, having access to expert techniques like those offered by TrustGeeks Hack Expert can provide the clarity and evidence needed to move forward. Trust in their expertise and let them guide you through the process, armed with wit, personality, and a dash of digital magic.
Communicate with TrustGeeks Hack Expert through:
whats App +1 406- 218- 6900
Telegram User: @ Trustgeekshackexpert
Best Wishes
