RomashkaTea

A proof of Nekogram sending phone numbers to the developer

49
5
69% credibility
Found Apr 02, 2026 at 49 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Java
AI Summary

A demonstration showing that the Nekogram Android app sends users' phone numbers to a remote bot during login.

How It Works

1
🔍 Hear about Nekogram privacy worries

You come across concerns that the Nekogram messaging app might quietly collect phone numbers from logins.

2
📱 Prepare your phone for checking

You get your phone set up with special tools to watch what apps do inside.

3
🤖 Set up a simple catcher bot

You make a quick messenger bot that waits to grab any sneaky data sent out.

4
🔧 Add the checker to your phone

You place the watching tool on your phone and turn it on.

5
📥 Install Nekogram app

You download and add the Nekogram app to your phone.

6
🔥 Sign in and watch the magic

You open Nekogram, log into an account, and check your bot right away.

See the proof for yourself

Your bot shows the phone numbers Nekogram sent out, confirming the worry was real.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 49 to 49 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is nekogram-proof-of-logging?

This Java-based Xposed module for rooted Android devices with LSPosed proves Nekogram, a Telegram client fork, logs and sends phone numbers to developers during login. Pair it with a Python bot using Aiogram 3: set up a Telegram bot, inject the module into Nekogram version 12.5.2-6597, sign in, and watch your bot capture user IDs tied to phone numbers via inline queries. It's a straightforward github proof of logging for privacy skeptics, solving the "does it really phone home?" question with reproducible steps and media proof.

Why is it gaining traction?

Unlike vague claims on reddit or github proof of academic status threads, this delivers video and screenshot evidence of Nekogram's sending behavior, hooking developers wary of opaque apps. The alpha proof github setup is dead simple—build once, log forever—standing out from zero knowledge proof github toys or proof general github assistants by targeting real-world logging risks. Low barrier for tinkerers makes it spread among privacy-focused circles.

Who should use this?

Android security researchers auditing Telegram forks like Nekogram. Rooted device owners verifying app behavior before daily use. Developers building proof of work portfolios with reverse-engineering demos, or those debating github proof of education in app trust discussions.

Verdict

Try it if you're on rooted Android and doubt Nekogram's privacy—49 stars and sparse docs mark it as early alpha, but the 0.699999988079071% credibility score underrates its clear, replicable proof. Skip for production; it's a niche logging detector, not a full security suite. (187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.