C
Throughout my writings and research reports i have presented to various blogs, websites,and as an experienced cyber security and threat intelligence analyst.I have for long time been warning all of you in East Africa of being subjective and prone to attacks from cyber criminals.I remember telling you of the behavior that show a phone or an technology equipment has been taken over by a malicious spy ware or any exterior intrusion. Some of the characters include fast draining of the battery,unfamiliar sounds in background when calling,slowness and unexpected shutdowns of internet browser and search engines.... etc.
Recently you had that president Uhuru Kenyatta's social media accounts were being intruded by unknown and anauthorised people!!!! How did it happen for a whole president with all availed technocrats. Its ridiculous however we as technologists know that it is possible. I have talked of many issues which President Uhuru Kenyatta's technocrats can put in mind,i know some of these presidents talk to fellow presidents even over the phones and social media and remember that some of your fellows are naturally "un ethical spies"... Try to read through articles on acidicsecurity.blogspot.com .
They are some features that can show that your phone haa been taken over by intrusions, these are:
You will see some unfamiliar apps installed on your phone without your knowledge. These apps include:
Load control:if this is installed on your phone,it means the one who haa remotedly installed it has a load control reciever and is able to recieve and record control data from activities taking place within and on your phone including date,time and gps coordinates.
Settings app:This is meant to provide an opening in the systems of your phone and set alternative settings on your phone that remotely replaces the activities of the original " settings " app on your phone.This rogue settings app has ability to monitor the victims phone,able to stealthily and quickly make glances over whats taki g place on the phone since it also enables PEEKING. it has permission to access to phonebook,camera,..etc as you Will see in the picture
Meter mark:This is a very dangerous app,basically and specifically is meant to take over the gps services on the phone. And because its able to have permission of access to phone storage,it downloads gps data of the phone when it is online and stores it so that it can use it when the phone is offline.it has the ability to import key hole markup language files to enable it display geographical data in all earth browsers like google earth.
Please,if you are a diplomat or a national figure who like making calls to phone numbers in a highly suspicious country, always reset your phone before you use it for other national duties
You will alao see your phone assigned queer accounts you didn't request e.gDongnao,others am not going yo reveal because am still making research on them
Some of these rogue apps can not be easily seen for many are remotely installed in the phones chip partitions.
For God And My Country
Throughout my writings and research reports i have presented to various blogs, websites,and as an experienced cyber security and threat intelligence analyst.I have for long time been warning all of you in East Africa of being subjective and prone to attacks from cyber criminals.I remember telling you of the behavior that show a phone or an technology equipment has been taken over by a malicious spy ware or any exterior intrusion. Some of the characters include fast draining of the battery,unfamiliar sounds in background when calling,slowness and unexpected shutdowns of internet browser and search engines.... etc.
Recently you had that president Uhuru Kenyatta's social media accounts were being intruded by unknown and anauthorised people!!!! How did it happen for a whole president with all availed technocrats. Its ridiculous however we as technologists know that it is possible. I have talked of many issues which President Uhuru Kenyatta's technocrats can put in mind,i know some of these presidents talk to fellow presidents even over the phones and social media and remember that some of your fellows are naturally "un ethical spies"... Try to read through articles on acidicsecurity.blogspot.com .
They are some features that can show that your phone haa been taken over by intrusions, these are:
You will see some unfamiliar apps installed on your phone without your knowledge. These apps include:
Load control:if this is installed on your phone,it means the one who haa remotedly installed it has a load control reciever and is able to recieve and record control data from activities taking place within and on your phone including date,time and gps coordinates.
Settings app:This is meant to provide an opening in the systems of your phone and set alternative settings on your phone that remotely replaces the activities of the original " settings " app on your phone.This rogue settings app has ability to monitor the victims phone,able to stealthily and quickly make glances over whats taki g place on the phone since it also enables PEEKING. it has permission to access to phonebook,camera,..etc as you Will see in the picture
Meter mark:This is a very dangerous app,basically and specifically is meant to take over the gps services on the phone. And because its able to have permission of access to phone storage,it downloads gps data of the phone when it is online and stores it so that it can use it when the phone is offline.it has the ability to import key hole markup language files to enable it display geographical data in all earth browsers like google earth.
Please,if you are a diplomat or a national figure who like making calls to phone numbers in a highly suspicious country, always reset your phone before you use it for other national duties
You will alao see your phone assigned queer accounts you didn't request e.gDongnao,others am not going yo reveal because am still making research on them
Some of these rogue apps can not be easily seen for many are remotely installed in the phones chip partitions.
For God And My Country
As you can see from the picture, 70% of these apps activities take place in the background and since such an app has permission to the storage, camera,phone,sms,......etc.. Then i think president Uhuru Kenyatta must not get shock as yo why,how and who infiltrate in his social media accounts.For example,if it has accessibly to cameras it can remotely take screen shots of taps one makes on the keyboard thus enabling him yo take or know our passwords.2.if it can take over the messaging syatem the A2F authentication is rendered a useless..........,since it also read contacts,it thus knows who we talk to most often!!!! I know you all are reading this and most of you as you always brand me a Museveni spy,but lets put that aside ...and make sure you take a keen interest in the security of your data over uour phone