Friday, October 4, 2019

Did you know the history of the most popular mobile phone operating system,ANDROID

Sometimes it feels like we’ve been running Google’s mobile OS on our Android devices forever. However, it’s actually been less than 10 years since the first official Android phone made its debut for consumers to buy in stores. Google’s decision to make Android an open source OS allowed it to become highly popular with third-party phone makers.
Just a few years after the launch of Android 1.0, Smartphones that had the OS installed were everywhere. Now it has become the most popular mobile OS in the world, defeating its many competitors like Symbian, BlackBerry, Palm OS, webOS, and Windows Phone. Apple’s iOS is the only platform still standing as a serious competitor to Android, and that situation doesn’t look like it will change anytime soon.
The founding of Android
In October 2003, well before the term “smartphone” was used by most of the public, and several years before Apple announced its first iPhone and its iOS, the company Android Inc was founded in Palo Alto, California. Its four founders were Rich Miner, Nick Sears, Chris White, and Andy Rubin. At the time of its public founding, Rubin was quoted as saying that Android Inc was going to develop “smarter mobile devices that are more aware of its owner’s location and preferences.”
While that sounds like the basic description of a smartphone, Rubin revealed in a 2013 speech in Tokyo that Android OS was originally meant to improve the operating systems of digital cameras, as reported by PC World . The company made pitches to investors in 2004 that showed how Android, installed on a camera, would connect wirelessly to a PC. That PC would then connect to an “Android Datacenter,” where camera owners could store their photos online on a cloud server.
Obviously, the team at Android didn’t think at first about creating an OS that would serve as the heart of a complete mobile computing system on its own. But even back then, the market for stand-alone digital cameras was declining, and a few months later, Android Inc decided to shift gears towards using the OS inside mobile phones. As Rubin said in 2013, “The exact same platform, the exact same operating system we built for cameras, that became Android for cellphones.”
In 2005, the next big chapter in Android’s history was made when the original company was acquired by Google. Rubin and other founding members stayed on to continue to develop the OS under their new owners. The decision was made to use Linux as the basis for the Android OS, and that also meant that Android itself could be offered to third-party mobile phone manufacturers for free. Google and the Android team felt the company could make money offering other services that used the OS, including apps.
Rubin stayed at Google as head of the Android team until 2013, when Google announced he would be leaving that division. In late 2014, Rubin left Google altogether and launched a startup business incubator. Earlier in 2017, Rubin officially revealed his return to the smartphone industry with his company’s announcement of the
Android-based Essential Phone.
Preparing for the launch of Android 1.0
In 2007, Apple launched the first iPhone and ushered in a new era in mobile computing. At the time, Google was still working on Android in secret, but in November of that year, the company slowly started to reveal its plans to combat Apple and other mobile platforms. It used the formation of what was called the Open Handset Alliance , which included phone makers like HTC and Motorola, chip manufacturers such as Qualcomm and Texas Instruments, and carriers including T-Mobile.
Then Google Chairman and CEO Eric Schmidt was quoted as saying, “Today’s announcement is more ambitious than any single ‘Google Phone’ that the press has been speculating about over the past few weeks. Our vision is that the powerful platform we’re unveiling will power thousands of different phone models.”
Google reportedly had at least two alpha builds of Android released internally before the company launched the public beta of version 1.0 for developers Nov. 5, 2007, around the same time it announced the Open Handset Alliance. It also developed its own internal reference handset, code-named “Sooner,” that was never released to the public. Several years later, developer Steven Troughton-Smith got his hands on one of these early reference phones and posted images and his own impressions of “Sooner.” As you can see, the overall look of this phone was more like BlackBerry’s handsets than the iPhone, at a time when many people were skeptical of “touchscreen only” devices.
In Sept. 2008, the very first Android smartphone was announced, the T-Mobile G1, also known as the HTC Dream in other parts of the world. It went on sale in the U.S. Oct. of that year. The phone, with its pop-up 3.2-inch touchscreen combined with a QWERTY physical keyboard, wasn’t exactly a design marvel. Indeed, the phone got bad reviews overall from technology media outlets. The device didn’t even have a standard 3.5 mm headphone jack, which unlike today, was pretty much a de facto phone feature among Android’s competition.
However, the Android 1.0 OS inside already had the trademarks of Google’s business plan for the OS. It integrated a number of the company’s other products and services, including Google Maps, YouTube, and an HTML browser (pre-Chrome) that, of course, used Google’s search services. It also had the first version of Android Market, the app store that Google proudly stated would have “dozens of unique, first-of-a-kind Android applications.” All of these features sound pretty primitive now, but this was just the beginning of Android’s rise in the mobile device market.
What’s with those sweet code names?
While most Android releases have candy or dessert-style code names, the first version of the OS (1.0) that was publicly released in Sept. 2008 did not have a code name at all, either internally or publicly, according to what Android engineer Jean-Baptiste Queru told Android Police in 2012. Android 1.1, released in Feb. 2009, didn’t have a public code name. However, it reportedly used the internal name “Petit four” while it was in development at Google. The name refers to a French dessert.
It was not until the launch of Android 1.5, just a few months later in April 2009, that the OS version got its first public code name: “Cupcake.” The credit for naming Android versions after sweet candy and desserts has traditionally gone to its project manager at Google, Ryan Gibson, but his specific reasons for using such a name remain unknown. When Google released Android 4.4 KitKat, it offered an”official” statement on their various code names for versions of the OS, saying, “Since these devices make our lives so sweet, each Android version is named after a dessert.”
The Android logo
The now-familiar logo for the Android OS, which looks like a combination of a robot and a green bug, was created by Irina Blok while she was employed by Google. In a chat with The New York Times in 2013, Blok said that the only directive that was given to her design team by Google was to make the logo look like a robot. She claims that the final design was inspired in part by looking at the familiar restroom logos representing “Men” and “Women.”
One thing that Blok and Google decided to do was to make the Android robot itself an open source project. Nearly every other huge company would protect such a logo or mascot from being redesigned and used by others. However, the Android robot has now been modified and used by tons of people, all because Google allows such changes under the Creative Commons 3.0 Attribution License.
Why use statues to symbolize new Android releases?
As we said previously, Cupcake was the first version of Android with a “tasty treat” public code name. When Google finally reveals its code name every year, it also places a new statue with that code name on the lawn in front of the company’s Visitor Center building in Mountain View, California.
In 2015, the Nat and Friends YouTube channel revealed that a small art team in New Jersey created the first Android statue, featuring the main mascot, along with all of the other statues that represent the various versions of Android from Cupcake to the current version, Oreo. The statues themselves are made of Styrofoam, and are then sculpted, given a hard coat of plastic, and then painted before they are shipped 3,000 miles to California for their official unveiling.
Android 1.5 Cupcake
The first official public code name for Android didn’t appear until version 1.5 Cupcake was released in April 2009 . It added quite a few new features and improvements compared to the first two public versions, including things that we now take for granted, such as the ability to upload videos to YouTube, a way for a phone’s screen display to automatically rotate to the right positions, and support for third-party keyboards.
Some of the phones that were released with Cupcake installed out of the box included the first Samsung Galaxy phone, along with the HTC Hero.
Android 1.6 Donut
Google quickly launched Android 1.6 Donut in Sept. 2009. The new features included support for carriers that used CDMA-based networks. This allowed Android phones to be sold by all carriers around the world.
Other features included the introduction of the Quick Search Box, and quick toggling between the Camera, Camcorder, and Gallery to streamline the media-capture experience. Donut also introduced the Power Control widget for managing Wi-Fi, Bluetooth, GPS, etc.
One of the phones that was sold with Donut installed was the ill-fated Dell Streak, which had a huge (at the time) 5-inch screen, and was described at the time on our own site as a
“smartphone/tablet.” These days, a 5-inch display is considered to be average sized for a smartphone.
Android 2.0-2.1 Eclair
In Oct. 2009, about a year after the launch of Android 1.0, Google released version 2.0 of the OS, with the official code name Eclair. This version was the first to add text-to-speech support, and also introduced live wallpapers, multiple account support, and Google Maps navigation, among many other new features and improvements.
The Motorola Droid was the first phone that included Android 2.0 out of the box. The phone was also the first Android-based phone that was sold by Verizon Wireless. While Google was safe to use Android as the name for its OS, the term “Droid” was trademarked at the time by Lucasfilm, in reference to the robots of the Star Wars franchise. Motorola had to get permission and pay some money to Lucasfilm, to use Droid as the name for its phone. Motorola continued to use the Droid brand for many of its phones as late as 2016.
Android 2.2 Froyo
Launched in May 2010, Android 2.2 Froyo (short for “frozen yogurt”) was officially launched. Smartphones with Froyo installed could take advantage of several new features, including Wi-Fi mobile hotspot functions, push notifications via Android Cloud to Device Messaging (C2DM) service, flash support, and more.
The first smartphone that carried Google’s Nexus branding, the Nexus One , launched with Android 2.1 out of the box earlier in 2010, but quickly received an over-the-air update to Froyo later that year. This marked a new approach for Google, with the company working closer than ever before with hardware manufacturer HTC to showcase pure Android.
Android 2.3 Gingerbread
Android 2.3 Gingerbread, launched in Sept. 2010, is currently the oldest version of the OS that Google still lists in its monthly platform version update page. As of Sept. 13 2017, Google indicated that only 0.6 percent of all Android devices are currently running some version of Gingerbread.
The OS received a user interface refresh under Gingerbread. It added support for using near field communication (NFC) functions for smartphones that had the required hardware. The first phone to add both Gingerbread and NFC hardware was the Nexus S, which was co-developed by Google and Samsung. Gingerbread also laid the groundwork for the selfie, by adding in support for multiple cameras and video chat support within Google Talk.
Android 3.0 Honeycomb
This version of the OS is perhaps the oddball of the bunch. Honeycomb was released by Google for installation only on tablets and other mobile devices with larger displays than current smartphones. It was first introduced in Feb. 2011, along with the first Motorola Xoom tablet, and included features such as a redesigned UI specifically for large screens, along with a notification bar placed on the bottom of a tablet’s display.
The idea was that Honeycomb would offer specific features that could not be handled by the smaller displays found on smartphones at the time. It was also a response by Google and its third-party partners to the 2010 release of Apple’s iPad. Even though Honeycomb was available, some tablets were still released with the smartphone-based Android 2.x versions. In the end, Honeycomb ended up being a version of Android that was not really needed, as Google decided to integrate most of its features in its next major 4.0 version, Ice Cream Sandwich.
Android 4.0 Ice Cream Sandwich
Released in Oct. 2011, the Ice Cream Sandwich version of Android brought a number of new features for users. It combined many of the features of the tablet-only Honeycomb version with the smartphone-oriented Gingerbread. It also included a “favorites tray” on the home screen, along with the first support for unlocking a phone by using its camera to take a picture of its owner’s face. That kind of biometric sign-in support has evolved and improved considerably since then.
As of July 6, Google indicates that 0.7 percent of all Android devices are currently running some version of Android 4.0, which is only marginally more than Gingerbread.
Other notable changes with ICS included support for all on-screen buttons, swipe gestures to dismiss notifications and browser tabs, and the ability to monitor your data usage over mobile and Wi-Fi.
Android 4.1-4.3 Jelly Bean
The Jelly Bean era of Android began in June 2012 with the release of Android 4.1. Google quickly released versions 4.2 and 4.3, both under the Jelly Bean label, in Oct. 2012 and July 2013 respectively.
Some of the new features in these software updates included new notification features that showed more content or action buttons, along with full support for the Android version of Google’s Chrome web browser, which was included in Android 4.2. Google Now also made an appearance as part of Search, and “Project Butter” was introduced to speed up animations and improve Android’s touch responsiveness. External Displays and Miracast also gained support, as did HDR photography.
If you attended Google I/O in 2012, you likely got the company’s Nexus 7 tablet with Android 4.1 Jelly Bean pre-installed as a gift. Versions of Jelly Bean are still very much active on many Android phones and devices. At the moment, about 6.9 percent of all Android products use Jelly Bean.
Android 4.4 KitKat
The name of Android 4.4 is the first version of the OS that actually uses a previously trademarked name for a piece of candy. Before it officially was launched in Sept. 2013, the company released hints at its Google I/O conference that year, as well as other places, that the codename for Android 4.4 would actually be “Key Lime Pie.” Indeed, most of Google’s Android team thought that was going to be the case as well.
As it turned out, Google’s director of Android global partnerships, John Lagerling, thought that “Key Lime Pie” would not be a familiar enough name to use for Android 4.4 worldwide. Instead, he decided to do something different. He contacted Nestle, the creators of the KitKat bar, and asked them if they could use the name for Android 4.4. Nestle agreed, and even released versions of its KitKat bar shaped like the Android robot mascot as part of a co-branding agreement with Google. It was an experiment in marketing that Google didn’t rekindle until the latest launch of Oreo .
KitKat didn’t have a huge number of new features, but it did have one thing that really helped to expand the overall Android market. It was optimized to run on smartphones that had as little as 512 MB of RAM. This allowed phone makers to get the latest version of Android and have it installed on much cheaper handsets.
Google’s Nexus 5 smartphone was the first with Android 4.4 pre-installed. Even though KitKat launched nearly four years ago, there are still plenty of devices that are still using it. Google’s current platform version update page states that 15.1 percent of all Android devices are running some versions of Android 4.4 KitKat.
Android 5.0 Lollipop
First launched in the fall of 2014, Android 5.0 Lollipop was a major shakeup in the overall look of the operating system. It was the first version of the OS that used Google’s new Material Design language, which made liberal use of lighting and shadow effects, among other things, to simulate a paper-like look for the Android user interface. The UI also got some other changes for Lollipop, including a revamped navigation bar, rich notifications for the lockscreen and much more.
The subsequent Android 5.1 update made a few more under-the-hood changes. This included official support for dual-SIM, HD Voice calls, and Device Protection to keep thieves locked out of your phone even after a factory reset.
Google’s Nexus 6 smartphone, along with its Nexus 9 tablet, were the first devices to have Lollipop pre-installed. At the moment, Android 5.0 Lollipop is installed and in use by about 29 percent of all active Android devices, according to Google’s platform version stats. Fun fact: Google used the code name “Lemon Meringue Pie” internally as it developed Android 5.0 before settling on the candy treat Lollipop as the official public name of the OS.
Android 6.0 Marshmallow
Released in the fall of 2015, Android 6.0 Marshmallow used the sweet treat favored by campers over a fire as its main symbol. Internally, Google used “Macadamia Nut Cookie” to describe Android 6.0 before the official Marshmallow announcement. It included features such a new vertically scrolling app drawer, along with Google Now on Tap, native support for fingerprint biometric unlocking of a smartphone, USB Type-C support, the introduction of Android Pay, and much more.
The first devices that shipped with Marshmallow pre-installed were Google’s Nexus 6P and Nexus 5X smartphones, along with its Pixel C tablet. The current stats on Android platform use shows that Marshmallow has just marginally overtaken Lollipop as the most installed OS version, accounting for 32.2 percent of all Android-based devices.
Android 7.0 Nougat
Version 7.0 of Google’s mobile operating system launched in the fall of 2016. Before Nougat was revealed “Android N” was referred to internally by Google as “New York Cheesecake.” Nougat’s many new features included better multi-tasking functions for the growing number of smartphones that have bigger displays, such as split-screen mode , along with quick switching between apps.
Google made a number of big changes behind the scenes too, like switching to a new JIT compiler to speed up apps, supported the Vulkan API for faster 3D rendering, and enabled OEMs to support its DayDream Virtual Reality platform.
Google also used the release to make a bold push into the premium smartphone market. The company’s own branded smartphones, the Pixel, and Pixel XL , along with the LG V20 , were the first to be released with Nougat pre-installed.
Android 8.0 Oreo
In March 2017, Google officially announced and released the first developer preview for Android O, also known as Android 8.0. Even before that release, Hiroshi Lockheimer, the senior vice president of Android at Google, posted a GIF of an Oreo cake on his Twitter account in Feb. 2017 . That was the first solid hint that Oreo, the popular cookie made of two chocolate wafers with a creme filling in between, would indeed be the official code name for Android 8.0.
In August, Google confirmed that Oreo would indeed be the public name for Android 8.0. It is the second time that Google chose a trademarked name for Android (Oreo is owned by Nabisco). In a break from its tradition, Google showed off the Android Oreo mascot statue for the first time in a press event in New York City, rather than showing the statue first at its Googleplex headquarters. The statue also depicts the Android mascot itself as a flying superhero, complete with a cape. A second statue was put in place at Google’s main headquarters later that day
As far as its features, Android Oreo packs in lots of visual changes to the Settings menu, along with native support for picture-in-picture mode,
notification channels , new autofill APIs for better management of passwords and fill data, and much more. Android Oreo is available as a download via Google’s Android Open Source Project, and is also available as an over-the-air update for Google’s older (and supported) Nexus and Pixel devices, along as an update for many older Android phones. Android Oreo also comes with Google’s own Pixel 2 models, as well as many other newer phones that have hit the market.
Android 9.0 Pie
Google launched the first developer preview of the next major Android update, Android 9.0 P on March 7, 2018 . On August 6, 2018, the company officially launched the final version of Android 9.0, and gave it the official code name of “Pie . It included a number of major new features and changes. One of them ditches the traditional navigation buttons in favor of one elongated button in the center, which is the new home button. Swiping up from that button brings up Overview, with your most recently used apps, a search bar, and five app suggestions at the bottom. You can swipe left to see all your recently opened apps, or you can drag the home button to the right to quickly scroll through your apps.
Android 9.0 Pie also included some new features designed to help extend your smartphone’s battery life, including the use of in-device machine learning to predict which apps you will use now, and which apps you won’t use until later. Pie also has Shush, a feature that automatically puts your phone in Do Not Disturb mode when you turn your phone screen-down on a flat surface. There’s also Slices, which provides a smaller version of an installed app inside Google Search, offering certain app functions without opening the full application
As usual, Android 9.0 Pie was available first officially for Google’s Pixel phones, but it also launched for the Essential Phone as well at the same time. It has since rolled out as an update to many other Android phones over the past several months and has been available out of the box in many new Android phones.
Refreshing the brand: Android 10
Google launched the first official developer preview of the next version of Android, which it called Android Q,
on March 13, 2019 . On August 22, 2019, Google announced a major refresh of the Android brand. That includes a new logo and, more importantly, the decision to ditch the traditional dessert name for the next version. As a result, Android Q officially is known just as Android 10 . Android 10 was officially launched on September 3, 2019 for Google’s Pixel devices, and it will roll out for other phones soon.
EDITOR'S PICK
As usual with any new Android release, Android 10 has a number of new features and improvements and a number of new APIs . That includes new support for the upcoming rush of
foldable phones with flexible displays . Android 10 also has a system-wide dark mode, along with new gesture-navigation controls, a more efficient sharing menu , smart reply features for all messaging apps, and more control over app-based permissions.
The future of Android?
Android has come a long way from its humble beginnings, as the product of a small start up, all the way to becoming the leading mobile operating system worldwide. There are hints that Google is in the very early stages of developing an all-new OS, called Fuchsia , that may support everything from smartphones to tablets, and even to notebook and desktop PCs. However, the company has said almost nothing about its plans for Fuchsia, and it’s more than possible that it may cancel its development.
This just shows that Google is still extremely committed to furthering the development of Android, and has even tried to extend the mobile and tablet OS to other devices, including Android TV , Android Auto, and WearOS . Depending on which research firm you believe, Android’s worldwide smartphone market share is currently between 85 and 86 percent, with iOS a distant second at between 14 and 15 percent. All other mobile operating systems (Windows Phone/Windows 10 Mobile, BlackBerry, Tizen, and the rest) now have less than 0.1 percent of the phone market. In May 2017, during Google I/O, the company said there are now over two billion active devices running some version of the Android OS.
One challenge for Android device owners that has been an issue for the OS ever since it launched is updating it with the latest security patches, to say nothing of over-the-air rollouts for major feature updates for the OS. Google’s supported Nexus and Pixel devices consistently receive regular monthly security updates, and the latest version of the OS. Third party phones are a lot more hit and miss with new security patches and often quickly drop off seeing new OS updates. A few phones, especially unlocked ones that are in the budget category, may not receive any updates at all. Google’s introduction of Project Treble in Android Oreo should make it easier for phone makers to update their devices faster, but it remains to be seen if those efforts will be effective in the long run.
Conclusion
Unless Apple decides to start selling new iPhones that are much cheaper than its current models, it would seem reasonable to predict that Android will continue to dominate the mobile OS market, even with its problems providing swift updates. The OS is being installed on phones that are sold for far less than $100, all the way to expensive flagship devices like the current champion: the Samsung Galaxy S10 Plus. That flexibility, combined with yearly updates, will ensure Android will remain the leader in this industry for years to come.

Sunday, September 29, 2019

Can we edit an update on WhatsApp?

Is there anyway one can edit an already posted WhatsApp update?....is it officially there?Think about it WhatsApp

The dangers of using some VPNs ..The quest to know whether the gorvenment of Uganda spying on opposition chiefs...PART ONe!







Some couple of weeks ago,one politician was complaining of the gorvenment spying on him using Chinese technology gadgets,and all of you know that it was even written in the news paper in America.To me as a cyber security enthusiast,I had to laugh!!! The biggest issue with most of us is that we don't understand the term spying and we knew what is really behind our phones and where they come from then we must know who spying on us.First of all,the Socs of these phones we use are made from foreign countries and some of these gorvenments pattern or sponsor some these projects to come up with Socs or the mobile operating systems.Am sure most of you do use Android Is and it is a fact that CIA ,the USA's spy masters are behind it's commencement and if you are using Android it is just very easy for CIA,FBI,NSA to get any information from and about you.Since the writting of that story the Uganda is using Chinese gadgets and technology to spy on opposition,I have been trying to write a more simple document so that everyone will understand the privacy leakages we are subjective to if we continue using these tech gadgets.And another thing people should understand is that military intelligence is meant to extract information majorly to avoid incidences that may harm the citzens but some individuals want to make it look a devil to the society, actually citzens must work and help them to get such information.
Let me get to these VPNs,at the bringing of the OTT many Ugandans rushed to the use of VPNs and most of them are not aware that they are a security threat to their privacy and general communication.I want every one to read this and take care especially you politicians, business men especially in crypto currency,mobile money,mobile banking etc...!! I was totally shocked when I saw some of you in excitement when you saw a photo of his excellence Yoweri kaguta Museveni using an small old Nokia phone,am sure he read the dangers of over hanging on these smart phones!!!!
What you must know about these VPNs...
The reason people have Virtual private networks (VPNs) is that they protect our online privacy, however, privacy is essentially non-existent if you live in a place where the government is allowed to track your online activities. This is why you need to get a good VPN, the goal is to make sure that you don’t have to worry about third-parties keeping an eye on you. However, while using a VPN, it is important to know if it is in a 14 Eyes country. – Now, that being said, you are probably asking what is a 14 Eyes country.
Before you decide to use a VPN, it is important to have a good amount of background information on the VPN company. In terms of the 14 Eyes countries, they all have entered into the UKUSA Agreement which basically allows countries to share information about international communications between two parties. This is obviously something that would bother VPN users because why should anyone be allowed to access your online activities especially when it does not involve anything illegal such as terrorism or explicit content involving children or animals?
How is the UKUSA Agreement Utilized?
In the United States, it is “illegal” for the government to spy on its citizens. There have to be warrants and lots of other legal proceedings done for the government can surveil its citizens. The United Kingdom, for example, doesn’t have any of the same limitations that the United States has on surveillance of the same American citizen. This could allow the United States under the UKUSA Agreement to give a nudge to UK authorities to look at different folks and see exactly what they are up to.
Naturally, there are certain rights that folks have in different countries that protect their privacy, but in the world of online communications, the legal rulings in these areas are, at best murky. Because there is an evolving legal precedent, it’s difficult for users to know exactly where their rights to privacy in online communications and visits begin and end. That’s why many turn to VPNs since a reliable VPN doesn’t track what you do online.
What are the 14 Eyes Countries?
14 Eyes refer to the countries who have signed the UKUSA Agreement. Obviously, the UK and the USA are part of the 14 countries. The other twelve are:

Italy
Canada,
Australia
Denmark
France
Netherlands
Norway
Germany
Belgium
Sweden
Spain
New Zealand
Additionally, other countries that are believed to be part of the 14 Eyes but not officially are Israel and Japan. After the Snowden leak, it was confirmed that Singapore and South Korea are also taking part in the agreement.
Many countries – especially the United States – can get your internet history and worse yet, they can do so without notifying you. The VPN that is located in a 14 Eyes country is subject to laws that essentially allow the legal system to compel the private entity (a VPN) to surrender information about a user’s web habits.
Furthermore, VPNs in these countries are forced to keep logs of exactly what someone browses and what they do on the Internet. Therefore, if you are going to use a VPN, it is extremely wise to get a VPN that is not based in any of the 14 eyes countries and be wary of any VPN based in Singapore, South Korea, Israel, and Japan.
How do I Find Out Where a VPN is Located?
It is actually not too difficult to find out which VPNs are not based within the 14 Eyes countries. The easiest way to find this out is to do a Google Search, but when you look at a VPN’s landing page you will notice the address at the bottom will probably tell you where it is based. If you are still not sure, look at the billing information.
Some countries where you may find great VPNs in are Hong Kong, Taiwan, and several Eastern European nations that are part of the EU and NATO. These countries allow you to have the technical savvy of one of the 14 Eyes countries while not having to deal with the different issues that plague VPN usage such as a lack of privacy.
Selecting a Good VPN
The key to selecting a good VPN is first understanding the purpose. There are different VPNs for gaming and others that are great for streaming. However, when looking generally at a VPN, the key is having a few really solid features. Understand that you’ll have to pay for a VPN, but what they offer makes it worth it.
The first feature to look for is a large number of servers. This will allow you to select the server closest to you. A close server allows for a better connection, especially in terms of gaming. Another important factor is that the VPN doesn’t track your data. This is why many people trust VPNs, and when you have a VPN from a place that isn’t part of the 14 Eyes nations, then you have a VPN that you can trust.
Another important consideration is the ease of use of a VPN. When you get one that doesn’t make it too complicated to log on and get to work, then you will have no problem using the VPN for all of your purposes.
Conclusion
Unfortunately, such governments that sponsors such tech programmes,software,gadgets,system,etc always try to overreach into what you do in the privacy of your home. While you are working at getting a VPN that’s not based in one of the 14 Eyes countries, be sure that your information is not being tracked by free VPNs since such providers are known for selling browsing data to third-parties.

Nevertheless, VPNs provide great security and protect your privacy very well, so be sure you get a VPN that keeps your information away from overreaching governments.

Saturday, September 21, 2019

Are you aware of your web camera's leakage of your data
Every cybersecurity article you’ll find will include some sort of reminder emphasizing the use of strong passwords, good antivirus software and the related usual. However, there is less care taken to ensure the hardware components of our computers are secure.

In the wake of this, Avishai Efrat, a white hat hacker from Wizcase has found 15,000 webcams globally that can be accessed unauthorizedly with the only pre-requisite being an Internet connection. Many of these webcams can also be tinkered with by malicious users editing their settings which is made easier by the fact that most users do not bother changing the default credentials of such devices.
Some of the manufacturers include:
AXIS net cameras
Cisco Linksys webcam
IP Camera Logo Server
IP WebCam
IQ Invision web camera Mega-Pixel IP Camera,
Mobotix
WebCamXP 5
Yawcam.
These have been found installed both for home and business use in different countries with the following ones being the most popular as reported by Wizcase:
Argentina
Australia
Austria
Brazil
Canada
France
Germany
Italy
Japan
Pakistan
Russia
Spain
Switzerland
UK
USA
Vietnam
 While webcams at homes would be expected to mostly have revealed personal sensitive information in developing countries where the trend of remote working is less, this is untrue for economies based particularly in Europe and the Americas where important business data may have also been compromised.

But that’s not where it ends. Potential uses of webcams also extend to places of worship, museums, sports areas and parking lots which could be deemed as an invasion to the privacy of users.

Here, it’s noteworthy that since 2014, a website called “Insecam” has been showing live footages from over 100,000 insecure private security cameras from all over the world. The site claim to be “The world biggest directory of online surveillance security cameras.”
Some of the consequences of these are that indecent footage of people could be used for blackmailing them, IP theft could become easier for unethical businesses who may utilize such feeds, surveillance becomes easier for both government and foreign government agencies, camera loops could be set to coordinate physical attacks and much more – the list is endless to say.
The golden question is, why was such a flaw overlooked by several manufacturers despite the implications? To answer this, we must look at how webcams work. Every time one is installed, users need some remote way in order to access its footage either in real-time or later for play-back. This is important to realize as not all webcams are used for video networking communication and many of them are utilized for security purposes.
The access mechanisms can be divided into two networking protocols, namely port forwarding and peer to peer(P2p). In port forwarding through the use of Universal Plug and Play (UPnP) technology, the camera can be accessed by a port on the external IP address.

If there is no authentication method, anyone who knows the IP address of the device can access the footage and other privileges depending on the manufacturer’s setup. Secondly, in P2P, the device itself communicates with the manufacturer’s servers for administration and other functions without port forwarding leaving no need for port forwarding.However, this can again be insecure if the manufacturer doesn’t take the basic precautions mentioned above. To solve these security issues, Chase from Wiscase offers some insight along the lines of,

“Many devices aren’t put behind firewalls, VPNs, or whitelisted IP access – any of which would deny scanners and arbitrary connections. If these devices have open network services, then they could be exposed. wrote Chase.” “The device’s security posture might depend on different things but a recommended way to set up a secure web camera would be to use a local VPN network, so that any open port would remain within the limits of the encrypted communication of the VPN. The app would connect to the VPN which would then access the port using an internal IP, thus avoiding the open port & call home potential problems and removing accessible ports from your external IP,” Chase concluded.




Furthermore, one can also add other measures such as whitelisting only one’s own device’s MAC addresses, choosing vendors with a focus on security, enabling two-factor authentication and finally using an encrypted connection to access the admin panel.
Finally, If you’re not a technically interested user, checking if your public IP address is compromised through a search engine like Shodan can also help for the immediate time being helping you decide your next course of action.


Friday, September 13, 2019

The joker malaware

Another day, another Android malware – This time; The Joker malware is here not to creep you out but steal from you.

While “The Joker” might be your favorite villain fighting the dark knight, a new malware that goes by the name of it may not entertain you.
It has been recently discovered by researcher Aleksejs Kuprins, that The Joker malware infected 24 apps on the Google Play Storewhich had over 472,000 installations.
After successfully being deployed, the malware tricks and scams users by signing them up for premium subscription services all without their knowledge. It does so by using the background component and stealthily clicking on advertisements and other processes intended to reach its final goal.
Finally, since an authorization code would be required usually for confirming payments, it accesses the user’s SMS messages and copies any code needed.
However unlike most malwares, it only targets users in specific countries. This is evident as the apps infected contain mobile country codes from which the sim should belong to for it to receive the payload.
For example, in Denmark, Joker can silently sign the victim up for a 50 DKK/week service (roughly ~6,71 EUR). This strategy works by automating the necessary interaction with the premium offer’s webpage, entering the operator’s offer code, then waiting for a SMS message with a confirmation code and extracting it using regular expressions. Finally, the Joker submits the extracted code to the offer’s webpage, in order to authorize the premium subscription, wrote Kuprins in his blog"

Thursday, September 12, 2019

You can now easily take video download from Facebook, Instagram,YouTube,Twitter....

With the widespread availability of the Internet today, there are still times when it may not be feasibly available. Be it on a flight, during the commute to work or simply put the blame on poor network reach, such situations can arise frequently. 
For example, suppose I need to watch a lecture on YouTube but I won’t have access to the Internet on my flight later on in the day. I’ll simply download the lecture up ahead and watch it offline later then. Furthermore, people like journalists, bloggers and videographers can download videos to analyze or edit them according to their needs. 
If you can relate, turns out that you could easily download online video and audio files using a new downloading tool from SaveFrom.net to watch them later.

You can do so in 4 simple steps:

  • Visit SaveFrom.net by entering the URL in your browser bar. 
  • Enter the video link from which you want to download in the search bar. You could also alternatively add “ss” before the URL and press enter in the browser bar which will lead you directly to the site. For example, “ssyoutube.com” could be used.
How to download online video & audio files with new tool from SaveFrom.net
  • Choose the video resolution from the dropdown right to the download button, different options are available here depending on your needs. You can also download it in MP3 form by clicking the button to the far right beside it. 
  • Click on the download button and the video will start downloading.
Tada! It’s that simple and easy-to-use. Such files can also be downloaded from additional resources including Instagram, DailyMotion, Twitter, SoundCloud, and Facebook. 
For those of you who prefer in-browser extensions, you can install the tool on Chrome by runningSaveFrom’s script through another extension named MeddleMonkey.
For Android users, they may download a dedicated app for their device while iPhone users will have to use it with the help of another third-party tool as Apple does not allow direct downloading of music and videos.
As with everything, privacy & security-focused users can be relieved that all the videos downloaded are never stored by the tool and remain on the source’s servers. Moreover, upon a scan of the site by Norton, the result displays no safety issues. If you lose the video you downloaded, you can simply re-download it using the aforementioned steps. Seems like a win-win for all!

The Sim jacker vulnerability

The Simjacker vulnerability could extend to over 1 billion mobile phone users globally.

As time passes, we’re witnessing more exploits building upon the usage of sim cards including the ever-famous sim swapping method. To add to these, just recently, AdaptiveMobile Security had released details of a previously undiscovered exploit dubbing it as SimJacking. How it apparently works is illustrated very simply with the help of a diagram below, however, there’s more to its intricacies.
Simjacker Vulnerability
Example of how Simjacker vulnerability can track mobile phone location of vulnerable subscribers – 

Sunday, September 8, 2019

US DOJ to subject Google, Facebook and other to antitrust investigation

company Alphabet has confirmed that it is under investigation by the United States Department of Justice. Specifically, the DOJ suspects Alphabet of antitrust practices, and is demanding all information and documents related to prior antitrust investigations involving the company around the globe. While the DOJ stated that it was just beginning to investigate major tech companies back in July 2019, we now know the department's efforts have kicked into high gear.

US DOJ seal

Alphabet and Google aren't the only major tech companies under the crosshair right now. AppleFacebook, and Amazon are all known to be under investigation as well, and we wouldn't be surprised if other platforms like Twitter soon found themselves under scrutiny, too. President Trump has quite the love-hate relationship with Twitter, as he uses it frequently to announce major policy decisions and communicate with the general populous. He has also criticized the platform, however, (along with Google) with accusations of bias.

So, what does all of this mean for you, a consumer? For now, nothing. In the future, however, we're likely to see these bigger tech companies become more reigned-in. In the case of giants like Facebook and Google, who command a massive percentage of any given market as well as corporate entities, we wouldn't be surprised to see their empires divided.

Talk of breaking up companies like Facebook and Google has been rumbling for years now in political spheres. However, we'd be more surprised to see any damage done to their fundamental services; i.e. Google's Search/AdSense and Facebook's main social networking platforms. Fortunately for web users and advertisers at large, though, that scenario seems quite unlikely.

Saturday, September 7, 2019

As I warned markzuckerberg few months ago,then you can see this privacy disaster on Facebook!!! Next has to be WhatsApp...

Some few days ag
o another privacy disaster hits Facebook users.But mark Zuckeberg and his team would not have read such news with surprise because I remember few months ago I wrote about the database uncertainties and irregularities especially in the login credentials.I have read mant tweets about this and seemingly many this it is a problem prone to the western hemisphere,am telling you that"africa" is also under this privacy threat!!It should be noted carefully that even whatsApp is with privacy issues,under some research on security of social media,I in June this year discovered that the VPNs used mainly in African can make many fall prey to privacy leakages of which leakages are Paramount to the users security in terms of gps location ,phone book,calls and sms ...etc..i i wi write about this later in my final analysis by the end of September.
To add insult to the already enraged privacy advocates, Facebook has yet again disappointed its user base. It has been revealed that 419 million phone numbers belonging to Facebook users have been exposed due to a breach in an online unsecured database.

The database contained 133 million records from the US, 18 million in the UK and 50 million in Vietnam. However, a Facebook spokeswoman has added that in actuality the data of 210 million users was revealed since the unsecured database contained duplication.







About more than a year ago, if you entered a phone number into Facebook’s search bar, it would reveal the account connected to that number. Although Facebook has abandoned this practice, it is believed that the phone numbers were scraped before it did so.
Unsecured database leaked phone numbers of 419 million Facebook users
Screenshot of the leaked database








However, according to GDI Foundation’s security researcher Victor Gevers tweeted that “Although Facebook had disabled the API that shares users mobile phone & address details back in 2011, this data leak with scraped Facebook details was deployed recently in August 2019 on the latest version (4.0.12) of MongoDB. There is also a mail server running on that server.”

 Although Facebook had disabled the API that shares users mobile phone & address details back in 2011, this data leak with scraped Facebook details was deployed recently in August 2019 on the latest version (4.0.12) of MongoDB. There is also a mail server running on that server 🤔 https://twitter.com/zackwhittaker/status/1169327242528219136 …



There were several databases on the exposed server containing 419 million records — including 133 million on U.S.-based Facebook users and 18 million on U.K. users.







Nevertheless, the breach is still alarming for a number of reasons. Firstly, phone numbers are a goldmine for hackers who would definitely enjoy sending loads of marketing messages and calls to these users.






Secondly, they could be used to aid in sim swapping for users who have been using their phone numbers as a part of two-factor authentication. How serious can this be? Well, last week, Jack Dorsey’s Twitter account was compromised just due to such a technique despite him being the CEO so this leaves a layman much more vulnerable.


Moreover, the phone numbers were linked to Facebook accounts identifiable by a unique public ID assigned by the platform and that could be used to discern someone’s username.

“TechCrunch verified a number of records in theunsecured database by matching a known Facebook user’s phone number against their listed Facebook ID. We also checked other records by matching phone numbers against Facebook’s own password reset feature, which can be used to partially reveal a user’s phone number linked to their account,” reported the site.the unsecured database has been taken down with Facebook investigating in the meanwhile. We do not know if the affected users would be compensated in any way or even be informed. This leaves us with a simple yet profound lesson of not relying on companies no matter how big they may seem, there will always be human errors after all.

Wednesday, July 24, 2019

Somal troops repulse two alshabab terror attacks

Somali troops repulsed two separate attacks by Al-Shabaab militants on El-Jaalle military training facility near Marka town, and again on El-Salini base near K-50, Lower Shabelle region. There are reports of injuries from the attack on El-Jaalle - per security sources.