Sunday, March 24, 2019

Turkey blames Saturday bombs by the alshabab in somalia

Close to 20 people among them a deputy minister were killed in multiple bombing attacks in Mogadishu and its environs.

Al-Shabaab militants drove into the Ministry of Labour office block leaving in its wake at least ten dead and ten others injured. Deputy Labour Minister Saqar Ibrahim Abdalla was among those killed in the 11 am bombing.

According to some tabloids,police sources said that about ten bodies had been retrieved from the building which also houses the ministry of public works in Shangani area.

Ambulance service Aaamin Ambulance said it had ferried ten injured people to various city hospitals.


The entrance to the Ministry of Labour building damaged when an explosives laded vehicle rammed into it.
An explosives loaded vehicle rammed into the building followed by heavy gunfire as security forces engaged the militants in gunfire. Three explosions went off within a span of 15 minutes.

Police said all the militants had been killed.
 three other bombings hit various parts of the city today killing a total of 9 people and injuring five. Separate blasts hit  Ex-Control Afgooye area killing 7 people while in Warshadaha street in Daynile district two people were killed in a blast.

The fourth blast hit Hawlwadaq district but there were no casualties reported.

Turkey has today condemned the terror attacks on Saturday in the Somalia capital Mogadishu that killed almost to 20 people including a deputy minister and wounded eleven others.

The Turkish Foreign Ministry said in a statement: “We strongly condemn the terrorist attacks perpetrated against the Ministry of Labor and Social Affairs and the Ministry of Public Works in Mogadishu.”

“We wish Allah’s mercy upon those who lost their lives, a speedy recovery to the wounded and convey our condolences to the friendly and brotherly Government and people of Somalia,” the statement read.

Somali-based al-Qaeda affiliated terrorist group Al-Shabaab has claimed the responsibility of the attacks.

Tuesday, March 12, 2019

Android Q developer beta may be launched today

Android Q , the next version of the mobile operating system, could be launching its developer preview later today, thanks to speculation over a date filter in Google’s bug tracker.
A template explaining how to file bug reports for Android Q Beta was spotted by XDA Developers Editor-in-Chief Mishaal Rahman.
The sample (which reportedly could be found here but has since been removed) seemed to be directed at OEMs, and advises reporters to check if the issue has already been filed by clicking a link ( https://goo.gl/qL5TjA , still working as of publication) leading to a repository – which only lists bug tickets created on or after March 11, 2019.
Apple invites went out for its March 25 event, where it might announce a streaming service
Samsung: use the fingerprint scanner , not facial unlocking, for more security
"I took selfies with the Huawei Mate X foldable and it's a game-changer"
Expanding beta
This comes hot on the heels of another
revelation that Google will add more phone companies to the Android Q beta, as Iliyan Malchev from Google's Project Treble team said on the Android Developers Backstage podcast.
Adding more phonemakers to the early testing process could help get their devices on newer versions of Android more rapidly. Project Treble itself is dedicated to making it easier for manufacturers to push the latest version of Android to their devices, so this seems like one move in the holistic effort to get the mobile OS’ ecosystem up-to-date more rapidly and in greater numbers.
What will come in Android Q is still a mystery, but an early dev build acquired by XDA Developers suggests a system-wide dark more, more refined permissions and Face ID-style logins could be coming with the next OS version.

Thursday, March 7, 2019


Researchers at Kaspersky Lab have uncovered a new strain of malware spreading via The Pirate Bay torrent tracker site.
Named after the classic Russian doll , PirateMatryoshka aims to infect users ’ computers with adware and tools that spreads further malware onto the device . It carries a Trojan -downloader disguised as a hacked version of legitimate software used in everyday PC activity.
Torrent services are a popular target for cybercriminals looking to distribute malicious code, not least because users in search of illegal content often disconnect their online security solutions or ignore system notifications in order to install the downloaded content .
PirateMatryoshka is spread using established seeders with no known history of malicious activity. The latter makes for an effective distribution process , because due to the good reputation of the seeder , potential victims have no reason to doubt that the file to be downloaded is safe .
Once the installer is run it shows the victim a copy of The Pirate Bay page that is in fact a phishing page , asking them to enter their credentials to continue the installation . Later this malware uses these credentials to create new seeders distributing more copies of PirateMatryoshka . Kaspersky’ s research shows that so far , the phishing link has been accessed around 10 , 000 times .
Even if user credentials aren ’t entered the infection still proceeds . The malware unpacks further malicious modules including a malicious clicker that , among other things can check the ‘ agree ’ box that triggers the adware installer , flooding a victim ’s device with unsolicited software . About 70 percent of installed programs are adware such as pBot, and 10 percent are detected as malware that can bring other malware onto the PC , such as another Trojan downloader .
“Multi-layered malware is a very common occurrence , and we have found many cases of malicious installers who are installing more than one program on a person ’s device ,” says David Emm , principal security researcher at Kaspersky Lab UK . “ When it comes to PirateMatryoshka , however , this process is much more sophisticated. The malware that reaches a victim ’s computer can then introduce additional installers, which in turn spreads even more malware . This is a very advanced type of malware , considering it is an un -targeted, mass attack that carries a phishing component for wider onward distribution . ”

Wednesday, March 6, 2019

The Gmail Smart Compose feature is a nifty time-saving service that uses AI and machine learning to suggest words and sentences while you compose emails. Those that use it find it to be fairly accurate and legitimately helpful.
However, those that have been using it have been Google Pixel 3 owners, as Smart Compose has only been available on that device. Not anymore, though!
Starting now, Smart Compose is rolling out to everyone, regardless of your smartphone’s make or model. Simply fire up the Gmail app and, assuming you’re on the latest version, you should see the following pop-up:

For reference, that appeared on my phone
Now, when you are typing an email, you should see suggestions here and there that will help you autocomplete your sentence
If for some reason you don’t want this feature, that’s OK: Google allows you to turn Smart Compose off. Just open Gmail, open the flyout menu, scroll down to Settings, choose the appropriate account, and then uncheck “Smart Compose.” Repeat these steps for any other accounts in your app.
If for some reason you don’t see Smart Compose in your Gmail app yet, you can always sideload the latest version from APKMirror. However, it shouldn’t be too long of a wait if you want to tough it out.

TWRP for Samsung s9 and s9+ is now officially available

Many of Samsung's phones, including its flagship Galaxy S and Note series, ship with different processors depending on where they are sold. Some models have the company's own Exynos chips, while others have Snapdragon processors. Almost one year after the phone's release , the TWRP custom recovery now has official builds for the Snapdragon Galaxy S9/S9+.
The recovery image is specifically for the SM-G9600 (S9) and SM-G9650 (S9+) models, which are sold in Hong Kong and Latin America. Those of you with a United States S9 are still out of luck, since Samsung doesn't allow bootloaders on those phones to be unlocked.
Recovery images for the Galaxy S9 ( starqltechn ) and S9+ ( star2qltechn ) are available from TWRP's website
Kagame’s insanity: Rwanda asks Museveni to kick out top tycoon.
By: sadabkk@observer.ug
There are many reasons argued publicly and privately by officials on both sides of the conflict for the current border standoff between Rwanda and Uganda, but government insiders have nailed it down to one: Kampala’s outright refusal to turn against a very prominent Rwandan businessman hugely invested in this country.
Two weeks before Rwanda closed its borders with Uganda on Wednesday last week, the Rwandan high commissioner to Kampala met President Museveni and communicated several requests for action against particular dissidents.
A well-placed government of Uganda source has told The Observer that Maj Gen Frank Mugambage reportedly arrived with, among others, a request that Uganda should close businesses owned by Tribert Rujugiro Ayabatwa, a very wealthy Rwandan national running a string of enterprises in Uganda. The Rwandan government believes Rujugiro is pumping money into subversive activities being carried out on Ugandan soil against Kigali.
Rujugiro is the man behind the Meridian Tobacco Company, a $20 million (Shs 72 billion) operation which opened in the West Nile town of Arua last year. The Arua plant is a subsidiary of Pan-African Tobacco group, the manufacturers of Supermatch cigarettes.
But with Kampala not responding positively to the message delivered by Mugambage, tensions quickly mounted between the two countries. By Monday evening, Rwandan troops were seen deploying along hilltops near the common border. Days earlier, their Foreign Affairs minister Richard Sezibera accused Uganda of torturing and harassing Rwandan nationals here, while at the same time harbouring subversive elements plotting to topple the government in Kigali.
Security sources tell The Observer that Rujugiro switched some of his investments to Uganda in 2013 after he fell out with Rwanda president Paul Kagame. A former close associate, Rujugiro was part of the 12-man presidential advisory council Kagame named in 2009, headed by former British prime minister Tony Blair. The government source said that Museveni demanded for proof from Mugambage that this businessman was indeed fanning activities designed to destabilise Rwanda.
“The president of course asked for credible evidence to prove their claim because we can’t simply close his businesses without a basis,” the source said.
“The president also asked Mugambage what assurance [Rwanda] had that if we close his [Rujugiro’s] businesses, he will not find another channel [of funding the alleged activities] because he is an international businessman.”
Concerned about the 352 direct jobs which Rujugiro has created in Arua, and the 15,000 smallholder farmers plus another 1,600 occasional workers such as transporters doing business with Meridian, Museveni reportedly declined to grant Rwanda’s request. Instead, he reportedly told Mugambage that he needed time to engage Rujugiro.
Museveni is also understood to have said that he would either advise Rujugiro to find a buyer of his choice to take over the tobacco factory, or ask him to relocate the plant to another country. Kigali believes that a retired senior Ugandan military officer (names withheld), with very close links to a high office, holds a 15 per cent stake in the Arua tobacco factory.
The other request Mugambage is said to have brought to the meeting was for Museveni to get an unnamed cattle keeper with a ranch in Bukomero, Kiboga district sent back to Rwanda. The said ranch is said to be stocked with over 1,000 head of cattle.
“If you participated in the NRA liberation war, and you know how cattle keepers and other peasants aided the war, you are right to lose sleep over such a rancher,” the security source said.
Also on Mugambage’s shopping list was a request that the owner of a bus company which plies the Dar-es-Salaam – Nairobi – Kampala – Kigali route be repatriated. Interviewed on Monday, government spokesman Ofwono Opondo declined to speak about the Rujugiro case.
“We don’t discuss particular individual cases, but Rwanda has been engaging the ministry of Foreign Affairs and security agencies with a list of low and high-profile people, some of whom came here as refugees, whom they say are involved in subversive activities,” Opondo said.
But given its adherence to UN protocols on refugees, Opondo said, Uganda has always worked with the UN to facilitate their relocation to other countries such as Canada. Rujugiro himself relocated from South Africa to Canada.
THE FALLOUT
Rujugiro first spoke about his fall-out with Kagame on November 20, 2013 on the Straight Talk Africa show hosted by Voice of America’s Shaka Ssali. According to The News of Rwanda, a Kigali-based publication, Rujugiro’s point of departure with Kagame came after his arrest in London following an arrest warrant issued by the South African prosecution office over alleged tax evasion.
The tycoon allegedly expected Kigali to intervene on his behalf. But when no help came through, he turned against Kagame, linked up with Rwanda Defence Forces (RDF) deserters like Lt Gen Kayumba Nyamwasa and the late Patrick Karegeya to form the Rwanda National Congress (RNC). The RNC is one of the groups Kigali says is involved in clandestine activities against it from Uganda.
That same year, the Rwandan government confiscated Rujugiro’s properties as accusations of trying to topple Kagame’s government and tax evasion increased against him. Two years ago, in September 2017, the Rwandan government through Rwanda Revenue Authority, auctioned Rujugiro’s prestigious shopping mall in Kigali. Kigali Investment Company bought the mall at $8 million, $12 million lower than the amount Rujugiro claims to have spent constructing the building.
BUSINESS CHAIN
According to an article published on January 1, 2019, by Forbes Magazine, an American business magazine, Rujugiro owns Africa’s biggest tobacco company that has footprints in Burundi, Democratic Republic of Congo, South Africa, Tanzania, Nigeria, South Sudan and the United Arab Emirates.
The magazine describes him as Africa’s largest indigenous producer of cigarettes and other tobacco products, and puts his annual revenue at more than $200 million, with more than 7,000 employees.
Voice of America in 2013 also reported that besides cigarettes, Rujugiro is into tea processing, manufacture of plastic shoes and cement with factories in ten African countries. The radio also said he is trading in 27 African countries and the Middle East.
Rujugiro’s business dealings can be traced to as far back as 1978 in Burundi where he lived as a refugee.
sadabkk@observer.ug

Sunday, March 3, 2019

Arrested for selling a gun

The Chieftaincy of Military Intelligence is holding an armour man at Kampala Central Police station for selling police guns.
Sgt Hannington Mugungira is being detained at CMI manned Special Investigations Division in Kireka after police guns went missing in February this year.
It is reported that during the audit, guns we discovered missing and further probe discovered that Mugungira had sold two pistols.
A source at Kampala CPS told one tabloid, that the suspect admitted that he sold the pistols which further led CMI operatives to the arrest of a one Akampulira from Maestro Security Company who is the buyer of the said guns.
Luke Owoyesigire the Kampala Metropolitan deputy police spokesperson when contacted for a comment said the matter was being handled by CID headquarters in Kibuli.
Owoyesigire referred this online newspaper to SP Vicente Sekate the CID spokesperson for more details but could not be reached by the time of press.
Six Police officers were in 2017 arrested at Kampala Central Police station (CPS) over a break-in at the station’s armory.
The police officers are said to have been guarding the station when unknown thugs raided the station and took off with two AK47 guns and 60 bullets.
The stolen guns and bullets were later recovered in Iganga district.
Details indicated that the guns had been hired out to criminals.
It is alleged that some policemen connived with the officer in charge of the armory to secure the guns and hire them out to criminals at unknown amount. The criminals were expected to return the guns after their mission.
However, the guns were discovered missing on a Sunday when some officers on duty were supposed to use them. Upon realizing that they were about to busted, the implicated officers tried to break the armory lock to make it look like a break-in but it was too late.

Are you safe with your huawei phone?

Cyber-espionage has been going on for years. In one famous example in 2012, it emerged that China had hacked UK defense firm BAE Systems to steal data about a $264 billion F-35 Joint Strike Fighter (JSF) jet. And it wasn’t the first time the country had been accused of stealing military jet plans.
But recently, the focus has moved to Chinese companies, particularly those that manufacture network equipment as 5G services start to roll out. So, why is all the focus on Huawei, and how secure is it to use its products and services?
Founded in Shenzhen, Guangdong, in 1987 by Ren Zhengfei, a former People's Liberation Army officer, the firm is owned by 80,000 of its 180,000 employees. Like its rivals Nokia and Ericsson, Huawei has manufactured mobile network equipment for years.
During the last decade or so it has stormed into the consumer market as a smartphone manufacturer and now owns 16% of the market. At Mobile World Congress (MWC) this week, it became the latest to announce a folding smartphone with the launch of the Mate X.
The story so far
There is growing concern about Huawei from governments around the world. So much so, that many have blocked telecoms companies from using Huawei gear in next-generation 5G mobile networks.
So far, the US and Australia have banned Huawei from providing equipment for their 5G networks, while Canada’s relationship with the firm is under review. There is also concern among European telecoms network operators, with some considering removing Huawei’s equipment. BT, for example, has
removed Huawei equipment from key parts of its 4G network.
At the same time, the UK has expressed concerns, with the National Cyber Security Centre (NCSC) asking Huawei to fix issues that could pose a new risk to the network.
The US is particularly concerned about Ren’s military background. And the State Department's top cyber official, Robert Strayer, certainly thinks there is an issue.
"A country that uses data in the way China has - to surveil its citizens, to set up credit scores and to imprison more than 1 million people for their ethnic and religious background - should give us pause about the way that country might use data in the future," Strayer said, according to The Washington Post . "It would be naive to think that country, [given] the influence it has over its companies, would act in ways that would treat our citizens better than it treats its own citizens."
Meanwhile, the daughter of Huawei’s founder,
Meng Wanzhou was last year arrested by Canadian authorities, after the US government alleged that she was assisting Huawei in dodging US sanctions on Iran. She and the firm deny any wrongdoing.
Are Huawei phones safe?
Last year, Huawei phones were banned by networks including Verizon and AT&T after being labelled a security threat. Meanwhile, tech site Tech.Co interviewed Timothy Heath, senior international defense research analyst at the RAND Corporation, who believes it is entirely plausible that the firm’s phones could be used to spy:
“The threat is legitimate, given the murky links between Huawei and Chinese authorities. The Chinese state has the authority to demand tech companies like Huawei turn over useful information or provide access to the communications and technologies owned and sold by Huawei.
"Chinese authorities can use this information and access to facilitate espionage or cyber attacks over Huawei communications technologies. Consumer tech devices like phones that rely on Huawei technologies will be easier for Chinese authorities to penetrate and exploit for these reasons.”
He added: “Tech companies play a critical role in developing the dual use technologies that the PLA needs to fight a hi-tech war against world class militaries like that of the United States.”
What about Huawei network equipment?
As an equipment vendor, it is technically possible for Huawei to conduct espionage through the network, or even for it to disrupt communications with disastrous consequences. As more devices are connected to the internet, including autonomous vehicles and electrical grids, this threat becomes all the more real.
The risk becomes bigger with 5G because the way the networks are designed and run makes it harder to monitor security, according to the head of the UK's intelligence service MI6, Alex Younger.
However, many of the UK providers including EE, Vodafone and Three have been working with Huawei to build their 5G networks. They are currently waiting for the UK government to decide whether they will be permitted to carry on doing so, with a decision coming in Spring this year.
China's National Intelligence Law passed in 2017 says organizations should "support, co-operate with and collaborate in national intelligence work".
But a Huawei spokesperson says: “We are a private company owned by employees and comply with applicable laws and regulations. If we are forced to maliciously violate the trust of our customers, we would rather shut the company down. We are committed to developing the most innovative and secure technology, to bring digital to every person, home and organization for a fully connected, intelligent world. We will make all sacrifices – at any cost – to defend security without hurting any country, any organization, or any individual. This is our highest agenda.”
What does Huawei say?
It’s Mobile World Congress this week so what better place for Huawei to hit back at recent comments from the US? During his keynote
Huawei chairman Guo Ping denied that the firm spies on behalf of its country’s government. It has "no evidence, nothing", he said, adding that the vendor had never planted backdoors in its equipment and would not permit third parties to meddle with its kit. Guo said, according to Business Insider : "Carriers are responsible for the secure operations of their own networks. Carriers can prevent outside attacks."
He also hit out at the US government for its new law allowing it to demand data stored with Amazon, Microsoft, or other cloud providers.
What should you do?
First, don’t panic. Ian Thornton Trump, head of cyber security at AMTrust international, points out: “If nation states are going to hack, they are going to hack. This has very little to do with security; this has everything to do with market protectionism and vendettas against companies that don’t bend to the will of the US.”
He therefore thinks security is a side show “being used as leverage and FUD to promote someone else’s products and services”. He says: “There has been no public mention of a security issue with Huawei and you can bet an indictment that if it did have a back door this would be blasted to the media.
“The indictment of Huawei is about intellectual property theft – allegedly and perhaps not even an American company – and selling to Iran using front companies. How a Chinese company is subject to American law is of course the big and larger question.”
Huawei is certainly producing some innovative phones and it’s been working on network equipment for years. Of course, intelligence personnel will know a lot more about what’s happening behind the scenes, so it’s important to be wary. But at the same time, much of this is about political posturing: Do we really think Huawei has manufactured a folding phone so it can tap all our calls and take over the network? Probably not.

This week at Mobile World Congress (MWC) in Barcelona Spain, Huawei's chairman Guo Ping deflected recent criticism his firm has received over security flaws and backdoors in its products. Guo immediately turned his ire to America and the National Security Agency (NSA) and its program called PRISM. This NSA program allowed the agency to access highly sensitive stored documents, emails, photographs, and data from major companies. Further, it was discovered that leading social media platforms like Google , Facebook , Yahoo, YouTube, Skype, PalTalk, etc. all provided the NSA with direct access to their users’ information in exchange for immunity from future prosecution. Ping rightfully denied that Huawei ever had backdoors in its products. He suggested these allegations were due to the company’s tremendous investment in 5G R&D, arguing that Huawei should get a pass. When it comes to security, though, nobody gets a pass. Further, recent arrests of key employees, including Huawei's founder’s daughter (and CFO), has increased scrutiny and speculation about the company’s nefarious intentions.
For countries, proactive incident response helps mitigate overall risk
All countries have spy agencies and those organizations rely on data and intelligence to be effective. Reverse/social engineering, malware/viruses, phishing schemes are all useful tools for agencies to target specific users and gain access to sensitive data or critical infrastructure.  Exploiting backdoors and packet sniffing is much more difficult and tends to produce random results. That said, from a cyberwarfare perspective, a top goal for most nation-states is to have a "killswitch" to stop security incidents and Internet traffic from hostile nations they conflict with. Ukraine is an excellent example of what happens when a country is ill-equipped to stop
cyber-aggression . It is virtually impossible to build a hack-proof network; however, organizations can employ practices to mitigate damage caused by hackers during a breach.  Case-in-point, network equipment vendors have a responsibility to deploy solutions that are secure and uphold industry standards for data protection and integrity—such as the Network Equipment Security Scheme (NESA) spearheaded by the GSMA and 3GPP. Carriers and service providers have even more responsibility to deploy proactive security measures to safeguard the flow of traffic through their networks. Even if there are security vulnerabilities in the networking equipment, a proactive incident response program can reduce the threat and attack-plane.
Is there such a thing as "manageable risk" in cybersecurity?
Claims and subsequent action by the United States and other countries have put Huawei, Supermicro, and ZTE under a negative spotlight and the effects have been damaging from a revenue, brand, and loyalty perspective. Although the UK's National Cyber Security Centre (NCSC) deemed Huawei as a "manageable risk," these companies will be challenged to regain their credibility and reputations in the security industry. Although it is nearly impossible to prove the claims against each company, it does force every equipment vendor to determine which side of the fence they are on and perhaps incentivize the industry to make meaningful long-term changes and safeguards—especially as 5G becomes a reality. While these companies are on their heels, rivals like Cisco, Ericsson , Nokia , etc. have a healthy competitive opportunity to grow market share. However, as a wise person once said, “what comes around, goes around” it will be easier for the industry to take care of itself before clueless bureaucrats and politicians do it for them. Since Huawei has established itself from a 5G perspective, it could also take a market leadership role in de-stigmatizing the security of Chinese-made equipment. Additionally, it could work with the industry to set meaningful standards for security before someone does it for them. This will not only help Huawei, but its Chinese counterparts and the industry as a whole.

Saturday, March 2, 2019

F35 is a turd with wings...?

 the F35 is a turd with wings...?
Its not like the General Accounting Office (GAO) created a report citing "111 Category 1 and 855 Category 2 deficiencies". . .
Its not like it will 'fall out of the sky' if it is disconnected from Autonomic Logistics Information System (ALIS) for a short amount of time. . .
It is not like the F35B variant 'shook apart under stress-testing' and has to have its tyres changed in less than 10 landings. . .
Its not like the guns on the F35 are "consistently missing ground targets" and are showing a bias “long, and to the right”. . .
The Lockheed Martin F-35 Joint Strike Fighter was supposed to be four times more effective than older, legacy fighters in air-to-air combat, Eight times more effective in air-to-ground combat, And three times better at reconnaissance and suppression of enemy air defences.
All 3 versions of the F35 (A, B & C) are zesty yellow turds. Not only has the project extremely over promised and extremely under delivered, The F35 program is the most expensive undertaking by the US government. In 2012 the project had already cost $320 Billion (USD) and in 2014 it was estimated to "have operating costs 79 percent higher than the aircraft it was to replace". There are so many better things that you can operate for between $25,000 and $35,000 USD per hour.
It is such a heap of shit, That it cannot out manoeuvre or out fly the 20 year old fighter that it is supposed to replace. In fact, Not only is it a physical heap of shit, I would hate to see all of the security vulnerabilities that this 'winged disaster' has, let alone all of the data that is going to be collected by Lockheed Martin via (ALIS & any 'man in the middle').
Lockheed Martin's excuse is that the F35 is so 'selthy' that it doesn't need to out fly the enemy, because it will 'sneak up undetected and kill them first'. YEAH, GOOD LUCK WITH THAT. . .
After all of that, Australia is committed to purchase 72 of these flying shit sandwiches, Too bad Australian Consumer Law (ACL) does not apply in this case. . . They are no where near 'As described and without defects'

Bitcoin developer ,jameson lopp explanations on how to be secure on Bitcoin

More people are thinking about online privacy and protecting their data these days, but how hard is it to close every potential data leak and keep your personal information secure? On a recent episode of Epicenter , Casa CTO Jameson Lopp explained the extreme measures he takes to protect his privacy in an increasingly digital world.
‘They Don’t Know My Real Name’
After discussing why online privacy is so important in the age of social media, Lopp was asked to explain the tradeoffs of trying to close up all of the potential security holes in his daily life in the aftermath of a swatting incident in 2017 . Lopp gave examples of some of the extreme measures he has taken, including the use of a fake name when interacting with the people who live near him.
“They don’t know my real name,” said Lopp. “They don’t know what I do. They just know that I’m a programmer. I’m a boring old programmer.”
Lopp added that he interacts with most of his friends remotely via the internet, and he doesn’t have “crypto friends” in the area where he lives. Having said that, he does have non-crypto friends who spend time with Lopp doing non-crypto things.
“It’s kind of like living a double life almost,” said Lopp. “Sometimes that feels kind of like James Bond spy-type stuff, and other times it’s just plain annoying.”
Seeking Privacy Can Be Annoying
In terms of specific annoyances related to his search for privacy, Lopp pointed to the fact that he has to drive pretty far away to pick up his mail at a private mailbox or sign up for any kind of membership that requires personal identification.
“I don’t want my name in any databases that are tied to location,” added Lopp.
According to Lopp, there are also services available that make it easier to sign up for things in a pseudonymous manner, which has been helpful. However, when Lopp cannot sign up for something pseudonymously, the costs of retaining his privacy can be expensive because he basically has to hire a lawyer to act as a proxy on his behalf.
In terms of being recognized in public as a Bitcoin personality, Lopp said he’s only been recognized in the real world once, and he thinks it was mostly due to the large beard he had at the time.
“Most of the time when I’m out and about [now], I keep it pretty low key and I just look like another guy,” said Lopp.
It is Lopp’s intention to prevent any of his personal information from falling into the wrong hands, which means he needs to limit the locations and companies where that data is stored.
“Information wants to be free. Any service you give your data to, over a long enough period of time, it’s almost inevitable that that data is going to leak,” said Lopp.