A follow-up of the report we did on YouTube’s ‘Non-Advertisers Friendly’ method to rip off even that tiny revenue from the activists uploading their contents on Google-owned site as a way of pressure and to maintain the narrative the Pentagon and NATO promotes for targeting sovereign states, well, they’re now taking [Continue reading…]
One main feature of monopoly is the ability to control the revenues and come up with ‘creative’ ideas to literally steal users. This is very much demonstrated by the new invention of YouTube under the guise ‘the content in your video(s) or video details may not be advertiser-friendly’. The idea to [Continue reading…]
The US sanctions against Syria are not news, the United States regime started imposing illegal sanctions against the Syrian state since more than 6 decades when Syrians started to look for partners without getting subjogated to undesirable choices. The US regimes with the help of their minions use sanctions against other [Continue reading…]
Root Explorer updated with Superuser compatibility, Kindle App with UI tweaks. Root Explorer and the Kindle App for Google’s mobile operating system Android received updates in the Google Play Store. While the often used Root Explorer was updated for Koush’s Superuser app as well as owner change options, the new version [Continue reading…]
Arirang A1201: North Korean Smartphone with Android OS and Browser. North Korea is on the rise. At least, the People’s Republic of North Korea likes to convey this impression. After the first tablets with the sonorous names such as Samjiyon and Achim, new pictures of the first state-developed smartphone emerged and [Continue reading…]
After the new Android version, Android 4.3 Jelly Bean, was offiically unvailed by Google at the “Breakfast in San Francisco” event yesterday, Sony is already right up there and has published information about which tablet and smartphone will receive the Android update to Android 4.3 on their company blog.
The use of SSL-encrypted connections does not guarantee that the transmitted content is not easily to read by the NSA and other U.S. intelligence agencies – because the NSA and other U.S. intelligence agencies try to get those SSL-keys. It is to assume that other intelligence of further states are trying [Continue reading…]