Thursday, January 31, 2019

Google has announced its timeline for closing its social network Google+, and the process is starting very soon. For example, if (for some reason) you were thinking of signing up to experience the ailing social network before it's gone for good, you'll have to do it before February 4, when Google will remove the ability to create new profiles, pages, communities and events. 
The Google+ comment feature will disappear from Blogger on February 4, and Google+ comments on all sites will begin vanishing into the ether on April 2. Google+ sign-in buttons will also vanish from sites over the coming weeks (being replaced by regular Google login buttons in some cases). 
You can download your own Google+ data using Google Takeout, which lets you grab your personal information from all of Google's sites and services. If you're a community owner or moderator, you'll also be able to grab the author, body text and photos for every community post from early March.
On April 2, the doors will close for good, with all accounts and pages shutting down. Google will begin deleting content from accounts, including photos and videos from users' Album Archive and Google+ pages. Anything you've backed up to your Google Photos account will be safe.

Insert heading here

Google announced the impending demise of Google+ in October 2018, seven years after it first launched.
The decision followed a catastrophic data breach, which left the personal data of 500,000 users exposed to third-party app developers. The bug was patched in March 2018, but after the discovery of another security flaw later in the year, the company decided to shut the service down.
Despite the bugs, Google has said that it found  “no evidence that any developer was aware of this bug, or abusing the API” and that is has “found no evidence that any Profile data was misused”. 
If you are using a free VPN,THEN YOU ARE NOT SAFE

The reason is simple – many of them simply sell your data to 3rd party advertisers.

And this defeats the whole purpose of having a VPN in the first place.

But there’s more:

1. Many free VPN services are not transparent about how they make money from you using their services; in most cases, when you’re not being sold a product you are most likely the product.

2. Most free VPNs simply sell your data to affiliated/partnered companies or to the third party who is willing to pay the most.

3. Some free VPNs have gotten caught using shady practices like injecting ads, referring affiliate traffic and more (more info can be found on the CSIRO research and FTC complaint against a free VPN).

9 Popular Free VPN Services That Can Sell Your Data

The following free VPNs can sell your data to 3rd parties (according to their privacy policy)

Hola
Betternet
Opera VPN
HotSpot Shield
Psiphon
Onavo Protect
ZPN
FinchVPN
TouchVPN
There are probably more as many free VPNs aren’t really upfront about how they make money. Below are the ones that admit selling or sharing your data (or aggregated data sets) to third parties:

1. Hola (Free VPN, 10+ Million Users)

“We may share “Anonymous” information with third parties…”
“We may share your email with our marketing partners…”
“You may be a peer for Luminati network…”

Hola VPN shares your data with 3rd parties
Unlike other free VPNs, Hola gives you unlimited data without displaying ads — no wonder 152 million people use their service. Unfortunately, like mom told you, if it sounds too good to be true, it most probably is.

A group of security researchers discovered multiple flaws in Hola and found that they aren’t as noble as they claim.

Besides the fact that Hola turns your computer into an exit node, they also sell access to your computer and network to third-parties through their commercial brand, Luminati. How do you opt out of this? There’s only one way: by subscribing to their premium subscription (proving once again that nothing good comes free).

It even gets worse: it was proven that Hola can be exploited to allow anybody to execute programs on the computers of its users.

In Hola’s defense, they were at least upfront in their privacy policy. They even made it clear that they may share your email with their marketing partners.

HOLA VPN sharing your info

They also make it clear in their TOS that by using Hola you become a peer on their paid Luminati network — in other words, access to your computer could be sold to people paying to use their services:

Hola VPN uses you as a peer

Here’s exactly how Hola makes money on you:

They share your email with their marketing partners.
They sell your traffic to users of their business arm, Luminati.
They can share your “anonymous” information with third parties.
They sell access to your computer and network – making it serve as an exit node through which other users (including people paying them) can access the Internet – although they didn’t indicate this on their website, it has been widely reported (since 2015) by reputable media publications.
2. Betternet (Free VPN, 38 Million Users)

“Advertisers may also place cookies in your browser that may allow them to collect certain information about your browsing history…”

Betternet adds advertisers cookies
If you’ve done more than a few minutes of research about free VPNs, you’ve probably come across Betternet. This VPN service recently came out of nowhere to become one of the leading free VPN service providers. They now boast over 38 million users. They make it clear that they make money by offering free sponsored apps and by displaying video and other ads. They also allow advertisers to track and log information of users of their free VPN:

Worse, the CSIRO research paper on free VPN apps found that Betternet has the highest number of tracking libraries of all free VPN services (14 in total).

Here’s exactly how Betternet makes money on you:

By allowing advertisers to track and log your data – basically giving them carte blanche access to as much of your information as they need.
By allowing advertisers to include cookies in your browser.
By displaying ads, including sponsored apps, videos, and other types of ads.
3. Opera VPN (Free VPN)

“Our services include third-party technology or code that may use the collected data. We may share anonymized data and/or aggregated sets of data with our partners…”

OperaVPN shares your data with 3rd parties
Opera’s free VPN is a free VPN service that comes embedded in the Opera browser: you install the browser and have access to the free VPN service.

On the surface, the “catch” of the free VPN seems to be simple: to drive adoption of Opera’s browser. We wish it were that simple!

Research shows that Opera’s free VPN actually engages in other practices to make money off their free VPN user. Their privacy policy makes it clear that they share your data with third-parties and allow third-party services to monitor your data.

Here’s exactly how Opera VPN makes money on you:

By sharing your data with third-parties and marketing partners.
By allowing advertisers and marketing partners to track your data.
4. HotSpot Shield (Free VPN, 500+ Million Users)

Can share your information with their “ad partners”

Hotspot shield data selling policy
With over 500 million users, Hotspot Shield is undoubtedly the most popular free VPN service.

When you have that many users, you have data that is a potential goldmine for advertisers… and Hotspot Shield is certainly not just being charitable by providing free VPN to hundreds of millions of people.

They make money off users in a lot of ways:

While Hotspot Shield makes it clear in its terms of service that it displays ads to users of its free VPN service, it is not very upfront about the fact that it makes money off users through other unscrupulous means.

Less than a year ago, The Center for Democracy and Technology issued a complaint to the FTC claiming that Hotspot Shield not only shares data of its free VPN users, but it also redirects their traffic to third-party affiliate sites.

Here’s how Hotspot Shield makes money on you:

May share your data with 3rd parties.
By redirecting your traffic to affiliate partners (FTC Complaint in 2017).
By displaying advertisements in front of apps and websites you use.
By setting you a data cap of 500Mb/day.
5. Psiphon (Free VPN, 1+ Million Users)

“We may use technology such as cookies and web beacons. Our advertising partners’ use of cookies enable them and their partners to serve ads based on your usage data…”

Psiphon data sharing policy
When it comes to the free VPN game, Psiphon is no newbie. They’ve been offering their free VPN service since 2008, which is a long time in the Internet age. However, they support their ability to offer this free VPN by sharing your data with advertisers and letting advertisers track your data usage.

While they generally defer to their advertising partners’ privacy policies, the policies of these partners show that they do use and share your data. With annual revenue estimated to be over $2.2 million, Psiphon sure seems to be making some money!

Here’s exactly how Psiphon makes money on you:

By sharing your data with their advertising partners.
By allowing their advertising partners to track your Internet usage.
By displaying ads to you.
6. Onavo Protect (Free VPN)

“We may share (or receive) information, including personally identifying information, with our Affiliates…”

Onavo Protect policy
Onavo Protect is a VPN service owned by Facebook. Facebook has been in the middle of several scandals relating to how they collect and use user data, so it won’t be surprising to find that Onavo has the same issue — they were recently in the news due to their data usage practices. Onavo makes it clear from the get-go that they do log user data and share this information with third-parties:

Here’s exactly how Onavo Protect makes money on you:

They share your information with affiliates and third-parties.
They use your information for several purposes including advertising and marketing purposes.
They display ads to you.
7. ZPN (Free VPN, 8+ Million Users)

 “May share, sell and rent your personal information with affiliated companies/people..”

How ZPN sells/shares your data
With more than 8.2 million users, ZPN is certainly not a free VPN service you can ignore. The 10GB monthly data they offer is generous compared to what is offered by other VPN services.

According to them, they won’t share your data with “non-affiliated” companies unless under conditions including…

Read that again.

What about “affiliated” companies?

According to their Privacy Policy, they seem to do that…

Here’s exactly how ZPN makes money on you:

There’s a high possibility of sharing your data with their partners.
By limiting your monthly data to 10GB per month in order to get you to upgrade to a paid plan.
By limiting your bandwidth in order to get you to upgrade to a paid plan.
By disabling P2P (and torrenting) and limiting your access to five locations in order to get you to upgrade to a paid plan.
8. FinchVPN (Free VPN)

“We may share with third parties certain pieces of aggregated information…”

FinchVPN data sharing policy

FinchVPN seems more secure than most free VPN services. They have a generous 3GB monthly data and seem to take user privacy more seriously than most free VPN services. However, they limit the number of servers you can access in order to get you to upgrade.

They may also share data of user activity with third parties.

Here’s exactly how FinchVPN makes money on you:

They may share aggregate data of users with third-parties.
They limit your monthly data to 3GB and restrict the number of servers you can access in order to get you to upgrade to a paid plan.
9. TouchVPN (Free VPN)

“We may share your “anonymous” information with third parties, for additional purposes, including marketing…”

TouchVPN data sharing policy

touchvpn marketing
TouchVPN is another shady, free VPN that adds Cookies, Pixel Tags, and Web Beacons to your browser while you use their service.

Though they are some-what upfront about sharing your “anonymous” data with third parties for marketing purposes.

Sadly, they don’t elaborate much on “anonymous data”.

10. Private Pipe VPN (Free VPN)

“We may share “personal data” and “anonymized information” with affiliated and non-affiliated third parties…”

Private Pipe VPN promises “a simple, no nonsense, VPN” that offers completely free service, unlimited data, and malware protection without requiring its users to have any technical knowledge. However, in their privacy policy, they do not hide the fact that they make money by sharing/selling user data:

privatepipevpn privacy policy 1

Now, while they claim that personal identifiers are removed in data they share/sell, another part of their privacy policy indicates that they may share “personal data” with affiliates — whatever that means!:

Privatepipevpn priacy policy 2
Image from: https://www.privatepipevpn.com/privacy-policy-us.html
Here’s exactly how Private Pipe VPN makes money on you:

By selling/sharing your data with advertisers.
By displaying targeted ads when you browse websites using their app.
11. #VPN by Apalon (Free VPN)

“We may share “aggregated information”… with third parties, including advisors, advertisers, and investors…”

With over 5,000 ratings on the Apple store, #VPN is one of the more popular free VPN services available to Apple device users. It promises multiple virtual locations and unlimited data to enable you access websites and apps privately. However, besides the fact that ads and in-app purchases are offered to users of #VPN, they also make it clear that they may share your information with third-parties:

#VPN by Apalon privacy policy

Now, while they claim they only share aggregate information, they collect so much more information that it’s worrisome. #VPN collects the following information:

your timestamp
device information
location data
service provider information
hardware device information
they may also collect your movement data.
That’s more than is necessary for a free VPN app!

Here’s exactly how #VPN makes money on you:

By sharing your information with advertisers and third-parties
By displaying ads to you
By offering in-app purchases to you
12. Tuxler (Free VPN)

“We also share “technical data” that we collect about your browsing habits and your device…”

“Here at Tuxler, your privacy is our business – not someone else’s,” Tuxler boldly states on its homepage. But really?

While Tuxler touts the fact that users of its free VPN service can choose from “millions of locations,” we had to dig deeper to see what the catch is. We didn’t have to dig too long. It’s right there on their privacy policy page: they share data about your browsing habits and your device with advertising companies in order to allow them target ads to you.

Tuxler privacy policy

Here’s exactly how Tuxler makes money on you:

By sharing your data with advertisers and third-parties.
By displaying advertisements to you.
13. GO VPN (Free VPN)

“We also cooperate with a third party in various ways to utilize data collected, processed and handled…”

If you’ve tried looking for a free VPN app on the Google Play Store before, you’ve most likely come across the GO VPN app offered by the VPN Master team. Like almost every other free VPN, this app promises unlimited data with no registration or settings. All you need to do is “install and push the ON” button.

Unfortunately, our investigation revealed that there is something sinister going on: The high number of permissions required should be the first red flag. This app requires the following permissions:

Access to your device and app history
Access to read your phone status and identity
Access to read, modify and delete your phone media
Access to read your phone status and identity
Access to check your Google play license
Access to prevent your device from sleeping
We believe that’s too much access for a VPN app, but some extra digging makes clear why: The GO VPN app is offered by Talking Data, a Chinese big data company that sells data and information to willing buyers, and their privacy policy makes it clear that when you use their apps you are giving them permission to share/sell your data to their partners, and that they will use your information to build their data database:

Talking Data privacy policy
Here’s exactly how GO VPN makes money on you:

By selling/sharing your data with third parties for marketing purposes.
By displaying advertisements to you when you use their free VPN.
14. Hexatech (Free VPN)

Hexatech promises 100 percent free unlimited VPN access to users — and with over 1 million installs there must be a catch!

Hexatech was created by Betternet, one of the major data abusers on our list. Don’t let the fancy name deceive you, though! Hexatech is governed by the same principles and privacy policies as Betternet, and the same rules apply: they allow advertisers to track and log your data and do with it whatever they please.

Here’s exactly how Hexatech makes money on you:

By allowing their advertisers to track and log your data — and to use your information however they deem fit.
By displaying ads — including sponsored apps, videos, and other types of ads.
We Don’t Recommend Using FREE VPNs

Besides the obvious, using you as a product, free VPNs often go an extra mile to get more money from you.

Despite advertising themselves as “free VPNs”, they often set a very low data cap (bandwidth) so you can only use their service a few hours a month. Common data caps are 250mb/day, 500mb/mo, 2GB/mo and 10GB/mo.

Many free VPNs like TurboVPN and Betternet also include additional ads in your browsing activity.

Last, but not least, the vast majority of free VPN servers are overwhelmed with other folks who make your browsing (or streaming) activity extremely slow.

Free VPNs also tend to leak your DNS and keep your log files.

In a nutshell, if you want to stay secure and safe, free VPNs aren’t the best option. You’d be better off relying on your ISP instead of a sketchy, money-hungry VPN provider

Is our privacy over technology advancement guaranteed here in africa?

Are Africans who use internet or technological equipments secure?THE REALM OF CYBER SPYING IN AFRICA
Many african governments have resorted to cyber surveillance equipments in trying to tame their opponents or for sovereign security but the employment of these technologies put citzens at a risk of loosing their privacy.
Lets look at some scenerios .
Report identifies some European companies as having supplied Ethiopia with advanced cyber surveillance technology used to target Ethiopians at home and abroad.
According to international reports Ethiopia appears to have acquired FinFisher surveillance software from the United Kingdom and German-based Gamma International – as well as Italy-based Hacking Team’s Remote Control System.
Such tools provide security and intelligence agencies with access to files, information, and activity on the infected target’s computer. They can log keystrokes, passwords, and turn on a webcam or microphone, essentially converting a personal computer into a microphone or other monitoring device.other countries that supply Ethiopia with suveillance equipment and software is china through its ZTE corporation provide the Ethiopian gorvenment with equipment to monitor telecommunications activities.
The tel aviv Company called NICe and the milan base Hacking team company hve been involved in contracts to sell survaillance equipments and software to african states.this software provides interception tools for police and security officers. In july 2018 a group of hackers leaked millions of the two companies emails exposing the companies' secrets explained intheir own words how they used the malware and vulnerability to create a spy Ware that could get nearly into any computer. The hackers exposed that the hacking team company and nice company exchanged nearly 3000 emails with code names used in those mails and it was discovered those two companies were doing busness in uganda,mexico,finland,colombia and israel.
The contracts being discussed would provide those countries with Hacking Team's Remote Control System, which allows governments to use so-called zero days, a unknown vulnerability in software that hackers can exploit to infect the phones of anyone in their country, as well as monitor emails, record keystrokes, and snoop on their phone and computer cameras and microphones.
After the assassination of kashoggi the phone spyware suite called Pegasus has come to the limelight.lets first get to how it works.
To monitor a target, a government operator of Pegasus must convince the target to click on a specially crafted exploit link, which, when clicked, delivers a chain of zero-day exploits to penetrate security features on the phone and installs Pegasus without the user’s knowledge or permission. Once the phone is exploited and Pegasus is installed, it begins contacting the operator’s command and control (C&C) servers to receive and execute operators’ commands, and send back the target’s private data, including passwords, contact lists, calendar events, text messages, and live voice calls from popular mobile messaging apps. The operator can even turn on the phone’s camera and microphone to capture activity in the phone’s vicinity.Suspection of NSO Pegasus infections associated with 33 of the 36 Pegasus operators were identified in 45 countries: Algeria, Bahrain, Bangladesh, Brazil, Canada, Cote d’Ivoire, Egypt, France, Greece, India, Iraq, Israel, Jordan, Kazakhstan, Kenya, Kuwait, Kyrgyzstan, Latvia, Lebanon, Libya, Mexico, Morocco, the Netherlands, Oman, Pakistan, Palestine, Poland, Qatar, Rwanda, Saudi Arabia, Singapore, South Africa, Switzerland, Tajikistan, Thailand, Togo, Tunisia, Turkey, the UAE, Uganda, the United Kingdom, the United States, Uzbekistan, Yemen, and Zambia.findings are based on country-level geolocation of DNS servers, factors such as VPNs and satellite Internet teleport locations can introduce inaccuracies.Are we safe?
Other countries have been making requests on information about facebook users.The countries involved in these requets of citzens information on facebook include:
Nigeria that made more than 16 requests, botswana 21,Egypt 35,south Africa 33,kenya 8,tunisia5,senegal 9,ivory coast 8,uganda 5
All these requests are made so as to know or curtail some information or data some people share on facebook.
The most profound cyber spying in Africa is done on mobile network operations
For example the gorvenment of Senegal asked orange for data of up to 30000 customers and cameroon is the worst in Africa holding over half of all data request of telecommunications customers. The countries in africa you have to fear the most when using a mobile phone are Nigeria and Cameroon.

WILL RWANDESE STOP OR BE STOPPED FROM COMING TO UGANDA?



I think to many who know Rwanda and the magnitude of the daily influx of rwandese in uganda,and the openness of the ugandan boarders plus the freedom of travelling and working Rwandese get here in uganda, then the answer is NO.Yesterday evening i listened to news over RBA,of a one Cyemayire Emmanuel who was allegedly deported by CMI operatives and how he compelled Fellow rwandese never to rush back to uganda again,citing that its very dangerous for rwndese to work in uganda now.I woke up in the morning to go and check at the bus terminals to real see if the number of rwandese entering buses or disembarking was reduced!! It is shocking that even today the number of rwandese who board buses to kampala,mbarara,toro,bunyoro...is ever increasing.The leaders in rwanda have bittery been saying and compelling rwandese not to rush to Uganda but its impossible. Many rwandese especially in districts that neighbouring uganda even sneak into uganda without proper documentation.For example in kisoro,they usually sneak into uganda on mondays in disguise of coming to the market.many who do not have proper documents are transported up kampala and at bus terminals refered to as ABAJAPANI and they are forced to pay more transport fares.Again,what am sure of is that as Rwandan authorities claim that uganda harrasses its citzens who enter uganda,actually what i can say is that uganda has atleast been fair to the low class citizens who come to look for low earning jobs.If CMI was to conduct what they black mail it to be doing,then many Rwandese in Bunagana,kisoro,kasese,mbarara,kabale,ntungamo,kibale and pallisa would not survive deportation because many of them dont have documents that permit them to be or work in uganda.
Back to Cyemayire Emmanuel's saga,according to what he told the press,he alleges that he was arrested on January 4th from mbarara where he had an electronics shop worth 20m ug shs.He continued to say that his arrest was instigated by a fellow Rwandese pastor of the agape Pentecostal church in mbarara,Rwandan authorities confirm pastor Deo nyirigira to have connection with and to kayumba nyamwasa's RNC.
Cyemayire alleges that he was detained at Makenke military barracks where he was interrogated by CMI chief in mbarara Afande major Fred mushambo.Really if  CMI was harsh the way the allege it to be;how many of you Rwandese would be forced out  of here? Or may be you think that CMI are very dull not know that some of you are here without documentation?? What i can tell you is that ,Rwandese here must know that CMI is a humane proffessional force.
However, Despite all this,what i advise Rwandese is to always come to uganda with proper documentation otherwise if Uganda authorities were to conduct a mass clean out of all rwandese illegally staying in Uganda, am sure many of them would be deported.
Why do rwandese like coming to uganda?
In September last year i discussed this question with a rwandese i met at bunagana boarder and in november i also had good talk with another Rwandese in kasese.one happily told me that uganda is the USA of Eastern Africa, that its the dreamland of the region,that its easy to start a busness with the smallest amount unlike in Rwanda where he said that even if he was to go back to Rwanda with more money he cannot easily start busness without government limits.
Another one in kasese told me that it povert and joblessness that forces them out of the country.Then i sarcastically told him that its globally know that Rwanda is on positive progress towards development and he replied"utaragera ibwami abeshwa menshi"
Finally,i would compel the security sector in uganda to establish a Rwandese temporary immigrants desk because many rwandese are entering Uganda without documentation and this influx will not stop despite all the politics. And if such who try to illegally enter uganda are harassed by unknown  criminals,Rwanda may claim it is CMI.There should be maximum check at the boarders especially at chanika,bunagana,katuna,nyagatare...etc.i recently had that immigration office at the boarder points were going to be headed by arm officers and i was happy about this for it will stop bribery and corrupting officers in the present immigration offices.Again,there must be check points to smoke out those who sneak into uganda in buses that ferry them to Kampala....

For God and my country
WHO IS TOM VOLTAIRE OKWALINGA?WHY HAS THE UGANDAN GOVERNMENT FAILED TO GET HIS REAL IDENTITY
For nearly 8 years Ugandans and the government of Uganda hqve been wondering about TVO,a character on Facebook that has been spilling and exposing sensitive information about the government. He has frustrated the government to the extent that one day,a one by the name of shaka robert was arrested and jailed in anticipation that he was thetrue identity behind the Facebook's TOM voltaire okwalinga(TVO).there has been lotsa speculation about who this TVO may be or how he gets information. Many people refered to TVO as:
Charles Rwomushana:i think that, this man can never be TVO.
Tamale Mirundi:The fearless motor mouthed journalism legend can never be TVO.what i like about tamale is straightforwardness and the hatred he has for the mafias in government and with this hatred for them,they would work had to unearth him so that museveni goes against him.i think he also canot afford to hide for all the 8years for he may forget and tell m7 that "he is the real TVO".
Others speculated to be TvO included kizza besigye,ssejjussa,,amama mbabazi,kayihura,ssekandi,kainerugaba muhozi...its shocking that others believe that he/she is a GHOST,OMUCHWEZi and " software "!!! Despite all the above speculations, the mysterious man or woman remain unknown to the government.
Many have been saying that the gorvt failed to get him but to me its like the girvenment has been failed to get this TVO.the bigget question to the government should now be:how does he get the information. There was a post where he stressed that he has informants who use specialized technological equipments for spying but i do not think this true for he only wants to divert the government from coherent investigations about him.he only must be having big and rich people within the government system who provide him with the info.with the present bribery,corruption and love for money in Uganda, why couldn't anyone who supply him with the info surrender his identity for a much pay from government? The clean answer for this is that TVO deals with Rich and influential people in the government.
Again,from how i see his profile, it was created mainly to dispose government info and he knew the repercussions behind that,and thats why he hide all his contacts like email and phone number.TVO profile was not created using ugandan phone numbers, if it was so,the phone number would have been scrutinized and got,and would be matched with the profiles through the " recover my account" link,this option may also not be fully useful even if it was to be since most Ugandan numbers are not always registered in their real names and i think a character like TVO would have not used a simcard registered in his real names.most importantly, the case of lawyer Muwema versus facebook on the TVO case globalised the awareness of Facebook's administration on the privacy and security of TVO after citing the conditions Robert shaka underwent when he was arrested in anticipation that he was TVO and as of now TVO's facebook account is highly protected from any sort of attack.
I have always been wondering at the likes of Andrew mwenda and titus seruga who once said that they had unearthed TVOs real identity. Do these guys think they are better than the government?if TVO was known physically, the government would have got him using the sophisticated systems it has now.if Uganda has managed to track down Bashir Mukulu,how would it have failed to get TVO?it only some goons in government hindering the ability to get his identity. The government may be anticipating alot of people who may be real TVO or who give him info but the government cannot rush to avoid the same saga as that of Robert Shaka.
Lastlt,if you look at TVO followers between 2014-2017,he witnessed rapid increase in his followers but by mid2017 the increase in his followers,those who liked,commented on his posts had reduced drastically.this was because he nolonger had sensitive timely information, the unreality of the proclaimed "april revolution". He even lost relevancy when he started a crash with the one he termed" ESO boy" who also refered to him as capital lettered guy.many followers especially those with mature political mind started looking at it as a fight for followers and wondering if really there were ready for the change they talk about.The recent break away of Mugisha muntu from FDC and TVO's merciless attack on him made many wonder if TVO himself was a serious political ideologist or a museveni hater.the coming of other social media personalities like Stella nyanzi,Charles rwomushana,tamale mirundi,bobi wine,seruga titus who all were against museveni or injustices in gorvenment took away the attention from TVO.in the next two years TVO may loose relevency on social media but it will still be impossible for the government to get him


Wednesday, January 30, 2019

Are ugandans using MTN and Airtel safe?


Facebook vulnerabilities
I have heard that Facebook is determined to have a new development in the incorporation of both instagram,messenger and whatsapp in a sort of intergrated messaging procedure but before you do this i wanna alert you on and of some holes in your social media platforms..these holes may be carried on and it may end up affecting all the applications.
One is the authentication and verification of a phone number associated with a given account on some of the social mediaccount e.g especially those created using an email account as   . . a login id ,these accounts are usually compelled to add a phone number which must be verified but on such accounts one can temporary use a phone number without verification for a couple of weeks or more month because on the three facebook accounts iam testing iam and gave been able to use one phone number to login to three different facebook profile accounts;where one is originally verified and associated with a different account while the two others are temporarily using it,a phone number verified to be a login id of another different facebook account can be added and used as a phone number on another account meaning that one phone number can be used to log in to more than two different accounts.this is possible on some browsers and Facebook pplication on some chinese made phones especially those running on spreadtrum micro chips,the most common browser which is a culprit to this is the NOKIAJAVA ME running on small Techno and airtel phones......plus most techno and airtel smartphones with other browsers are also prone to this however it should be noted that the opera mini browser doesnt allow a such for when i tested it on all the chinese phonebe it techno ,airtel and others it always showed that a phone number is associated with a facebook thus i concluded that on opera mini its had to add a phone associated with another account to act as a login number to another different account,i again noted that;an email associated with another facebook account cannot be used as a second login number to another account unlike phone numbers.now what worries is and what am asking myself is why has facebook managed to make sure that an email that is verified with another account cqnnot be used on another account,why can't they do it on phone numbers.Again,why does a phone number has to be kept pending for more than a year?one can add such a number and he/she doesn't verify it yet it still can be used as a login id for that account,this means that there is a problem with facebook's database.however i have come to prove that this phenomenon is mainly common on browser that are inbuilt on chinese phones or on facebook applications inbuilt on chinese made phones...!!!!thus am compelling the facebook development team to revise their database and make sure that one single phone number must be used " only and only" on one facebook account.
Which official phone numbers from facebook are allowed to send password reset messages to us?
I think many may be not aware that some phone numbers which aren't official facebook's number do send reset codes to our phone numbers associated qith our facebook accounts.they end up even sending facebook links for reseting our passwords which are phish.in some countries where telecommunication companies aren't serious, i think government security bodies can force them to surrender facebook users' numbers and some times can divert messages to their numbers so as to interfere with their works on facebook.i have also a belief that these governments have used the ss7 exploit to divert messages to phone numbers of facebook accounts that they think is a threat to them.i have had many scenarios where certain phone numbers from some african country owned by some people have been sending password reset messages and reset links whenever one tries to reset his or her account password!! Its really shocking how local number can send one a message if he or she tries to reset his or her password.this messaging from localphone numbers also does occur on Instagram.why does facebook send a message via another number not their own official number?are there local phone numbers that are suppossed to send such messages?if facebook is aware of this or not,then facebook must know that it is very dangerous to someones security and privacy more especially here in africa where governments try all means to interfere into people's privacy...what facebookand instagram must do is to make sure that phone numbers registered with profile accounts are the ones which must recieve reset messages and such messages from their web database must not pass via any diverted number.i think facebook has much changes to do and implement on its database.
The biggest and graveous threat here is that"as we all know that a reset code sent has some designed time until when it becomes invalid if its not used" but what i have discovered is that such phone numbers that pretentiously send these codes on behalf of facebook even resend a reset code that was earlier sent even after 8hours or more and this reset code can be used to change a password of the facebook account!!! I know its hard to believe this but what am sure of is that such numbers especially here in most african states have deliberately been established by the some authorities or certain foreighn States or cyber criminals or neighbouring states that want to carry on espionage to crack down people whom they think aren't pro their gorvenment.this puts some many of us at a risk and all Ugandans using telephone numbers to access facebook,instagram,twitter,whatsapp are at high risk of falling to this threat and am sure that all Ugandans using ugandan phone numbers to access social media are under this threat!!!!
For example,in uganda Some of the examples of these numbers that send these reset codes are +256771952364,+256773120478,+256772423645 and are registered in names of gerald adiga,fahad ssebbi,juliet birungi............and many others..i appeal to all ugandans to be extra cautious for they facebook accounts and instagram accounts may succumb to international or nationahackers

Monday, January 28, 2019

ARe we really safe on facebook? Is our privacy guaranteed?


Facebook vulnerabilities
I have heard that you are about to have a new development in the incorporation of both instagram,messenger and whatsapp in a sort of intergrated messaging procedure but before you do this i wanna alert you on and of some holes in your social media platforms...
One is the authentication and verification of a phone number associated with a given account on some of the social mediaccount e.g especially those created using an email account as   . . a login id ,these accounts are usually compelled to add a phone number which must be verified but on such accounts one can temporary use a phone number without verification for a couple of weeks or more month because on the three facebook accounts iam testing iam and gave been able to use one phone number to login to three different facebook profile accounts;where one is originally verified while the two others are temporarily using it,a phone number verified to be a login id of another different facebook account can be added and used as a phone number on another account meaning that one phone number can be used to log in to more than two different accounts.this is possible becaustoon some browsers and Facebook pplication on some chinese made phones,one can add such a number and he/she doesn't verify it yet it still can be used as a login id for that account,this means that there is a problem with facebook's database.however i have come to prove that this phenomenon is mainly common on browser that are inbuilt on chinese phones or on facebook applications inbuilt on chinese made phones...!!!!thus am compelling the facebook development team to revise their database and make sure that one single phone number must be used " only and only" on one facebook account.
Which official phone numbers from facebook are allowed to send password reset messages to us?
I think many may be not aware that some phone numbers which aren't official facebook's number do send reset codes yo our registered phone numbers.they end up even sending facebook links for reseting our passwords which are phish.in some countries where telecommunication companies aren't  indipendent, i think government security bodies can force them to surrender facebook users' numbers and some times can divert messages to their numbers so as to interfere with their works on facebook.i have also a belief that these governments have used the ss7 exploit to divert messages to phone numbers of facebook accounts that they think is a threat to them.i have had many scenarios where certain phone numbers from some african country owned by security agencies have been sending password reset messages and reset links whenever one tries to reset his or her account password!! Its really shocking how local number can send one a message if he or she tries to reset his or her password.this messaging from localphone numbers also does occur on Instagram.why does facebook send a message via another number not their own official number?are there local phone numbers that are suppossed to send such messages?if facebook is aware of this or not,then facebook must know that it is very dangerous to someones security and privacy more especially here in africa where governments try all means to interfere into people's privacy...what facebookand instagram must do is to make sure that phone numbers registered with profile accounts are the ones which must recieve reset messages and such messages from their web database must not pass via any diverted number.i think facebook has much changes to do and implement on its database.

Are all simcards registered?

Has any one ever wondered onthis issue?