You may have seen celebrities endorsements of BitiCodes or Biti Codes circulating on Facebook and Instagram, but they are all FAKE.
Find out why there are so many fake celebrity endorsements of Biticodes / Biti Codes, and how they are doing it!
BitiCodes / Biti Codes : Fake Celebrity Endorsements
BitiCodes or Biti Codes claims to be “the crypto industry’s most accurate AI auto-trading app“, which “works by automatically placing trades… using trading bots to strengthen your chances of making a profitable trade.”
If you never heard of it, you won’t be alone, because it’s mainly promoted via advertisements on Facebook, Instagram, etc. They are also promoting it through Google Ads like these examples, which will often appear in completely legitimate websites.
Clicking on those advertisements will lead to legitimate-looking articles from local or crypto publications, often with a celebrity endorsing Biticodes / Biti Codes.
Here in Malaysia, people will see Biticodes being endorsed by the likes of local politicians like Lim Guan Eng or Dr. Mahathir. But those in the cybersecurity industry will quickly realise that these articles are familiar because they are almost exact copies of scam articles used in the previous Bitcoin Revolution scam.
Looking for reviews of Biticodes or Biti Codes is pointless, because they appeared to have paid for advertorials in legitimate media outlets, which are (intentionally?) wrongly listed as “reviews”. Only at the very bottom do they include a disclaimer that it was a sponsored post.
Outlook India
Biticodes Reviews : Today we’ll be talking about one platform called Biticodes that you can use to make an extra source of income. It’s safe, and you do not need to worry about anything. It may help you earn good money in very less time.
Disclaimer :This is sponsored review content posted by us. All the information about the product is taken from the official website (and not fact-checked by us). Contact customer care phone number given on product’s official website for order cancellation, return, refund, payment, delivery etc. related issues. Must consult any financial specialist before investing in BitiCodes Auto-Trading Software.
Tribune India
Biticodes is real or scam review 2022 : With an astonishing success rate of 90%, BitiCodes has what it takes to be your go-to platform for cryptocurrency trading. It can execute multiple deals per second – a rate that even the most experienced cryptocurrency traders would be hard-pressed to match.
Disclaimer :The views and opinions expressed in the above article are independent professional judgment of the experts and The Tribune does not take any responsibility, in any manner whatsoever, for the accuracy of their views. Biticodes are solely liable for the correctness, reliability of the content and/or compliance of applicable laws. The above is non-editorial content and The Tribune does not vouch, endorse or guarantee any of the above content, nor is it responsible for them in any manner whatsoever. Please take all steps necessary to ascertain that any information and content provided is correct, updated, and verified.
In other words, those are NOT legitimate reviews, and the media outlets did not even test Biticodes / Biti Codes. Their disclaimers show that their “reviews” were paid content, written by Biticodes / Biticodes.
Avast Explains How BitiCodes Scam Works
In an August 2022 article, the cybersecurity company explained how the BitiCodes (also known as TeslaCoin) scam works:
The scam encourages people to pay to create an account and invest into a fraudulent crypto investment platform. There are two ways the campaign reaches potential victims: Through Facebook ads and email. Ultimately, victims can end up losing at least $250.
At the bottom of the page is a webform requesting site visitors to enter their name, email address, and phone number in order to register for the platform. The victim receives an email from a bot sparking a conversation in the victim’s language.
After a brief example exchange, the bot sends a link to a payment gateway, and asks the victim to transfer $250 in order to activate their trading account. Another scenario involves the bot emailing potential victims with steps to login to a cryptocurrency broker page, and after a few more emails, the bot sends a link to a payment gateway, asking the victim for a $250 initial investment.
I also investigated the articles and the BitiCodes website, and noticed that they are all using highly-suspicious domains and links:
celesteal.xyz/biticodes for the BitiCodes website (registered 23 Nov. 2022)
thedailypressbriefing.com/my for the BTC-News website (registered 29 Jan. 2023)
saveontaxesthisyear.tax for the BTC-News website (registered 6 Feb. 2023)
As you can see, the domains are not only completely unrelated to the article / websites, they are almost brand new! And if you go to their domain root, nothing loads. That is not how legitimate websites function. If you do a WHOIS lookup, you will discover that the owners of these domains are hidden.
Regardless of whether BitiCodes / Biti Codes itself is legitimate, you should avoid any article that do not tally with the official website, or with irrelevant domains.
Don’t fall for the scam. Avoid these BitiCodes / Biti Codes advertisements and fake celebrity endorsements.
Please help us fight fake news – SHARE this article, and SUPPORT our work!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Now, let me show you how to spot these scams next time!
If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!
Warning Sign #1 : Bad Grammar
Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.
Proper contests or events sponsored by major brands like Tenaga Nasional will have at least one PR or marketing person who will vet the text before allowing it to be posted.
Warning Sign #2 : Offering You Free Money Or Gifts
Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!
Tenaga Nasional isn’t going to give you FREE money, just because it’s their anniversary.
They are a corporation whose business is to make money, not a charity to give you free money.
Warning Sign #3 : Not Using The Real Jaya Grocer Domain
A genuine Tenaga Nasional campaign would use their real domain – www.tnb.com.my.
Or they would run it off the official Tenaga Nasional page on Facebook – www.facebook.com/TNBCareline/.
If you see nonsensical domains like merefamily.top, 0yjjg61.cn, 1eaf1rnbeef.top, ldxqw.bar, etc. that’s a sign it’s a SCAM!
Warning Sign #4 : Asking You To Forward The Offer
No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp or Facebook Messenger.
Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!
Warning Sign #5 : Asking You To Download + Register An App
If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.
This is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.
Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).
Please help us fight scams like this and SHARE this article out!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
In this article, we will show you many types of TNG eWallet SMS phasing scam, so you can avoid them!
Watch Out For TNG eWallet SMS Phishing Scam!
People are getting these SMS messages that appear to be from TNG eWallet, but are really just phishing scams!
RMO TNG eWallet: Bantuan e-dompet kepada golongan B40&M40 RM1000 akan dikreditkan ke dalam TNG eWallet anda. Kemaskini maklumat dan semakan status di www.tngewalletbantuangov.com
RMO T’n GO Your account function has been closed. You need to confirm the device immediately. Follow my.tngwallc.com
RMO TNG Wallet: Permohonan GOpinjam anda telah diluluskan, RM3000 telah kredit ke TNG Wallet anda. Sila semak baki dan tuntutan anda di http://logtouchngo.cc
RMO GOV: Terima kasih atas sokongan anda dari kerajaan BN.Bantuan e-dompet kepada rakyatMalaysia berjumlah RM500 telah kredit ke TNG Wallet anda. Sila sahkan identiti dan semak baki anda di https://touchngoemy.top/
How TNG eWallet SMS Phishing Scam Works!
The many examples of the TNG eWallet phishing scam employ SMS spoofing technology to send you SMS messages that appear to be from the TNG eWallet team.
What most people don’t know is that – the TNG eWallet team will never send you any SMS messages to :
offer you money from government or other agencies
inform you that money has been credited to your eWallet
ask you to log into your eWallet account using a link
ask you to update your account information using a link
The TNG eWallet team warned users against clicking on any links sent by SMS, even if they appear to be genuine. Genuine TNG eWallet SMS messages will never have a link attached.
These links do not lead to the real TNG eWallet website (https://www.touchngo.com.my/), but use similar-looking fake domains, like:
If you see such domains, you should be alert that you are being targeted by a phishing scam. NEVER CLICK ON A LINK in any TNG eWallet SMS.
If you click on any of these links, you will be taken to a page that looks like a genuine TNG eWallet login page, but is really a phishing scam page.
If you key in your login details, as well as your phone number and One-Time Password (OTP), the scammers will have full access to your eWallet, and can freely transfer out your eWallet balance.
As many of us link our credit cards to the TNG eWallet, the scammers can also reload your eWallet using those credit cards, and transfer the money out.
So make sure you IGNORE any SMS message that asks you to click on a link, even if it appears to be from TNG eWallet.
Please help to fight financial scams, by SHARING this article with your family and friends!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Is FIFA offering 50 GB of free mobile data to stream World Cup 2022 matches with no interruptions?!
Take a look at the viral offers, and find out why they are just scams!
Claim : FIFA Is Giving Free 50GB Data For World Cup 2022!
People are sharing viral offers for 50 GB of free mobile data to stream World Cup 2022 matches without interruption. Here are some examples :
* FIFA is giving people around the world 50GB of data for free to watch the 2022 Cartel [Qatar] World Cup.* * I Have Received Mine.* * OPEN THIS*
* FIFA memberi orang di seluruh dunia 50GB data secara percuma untuk menonton Piala Dunia Kartel [Qatar] 2022.* * Saya Telah Menerima Milik Saya.* * BUKA INI*
FREE 50GB DATA PLAN FOR ALL NETWORKS
PERCUMA PELAN DATA 50GB UNTUK SEMUA RANGKAIAN
Truth : FIFA Is Not Giving 50GB Free Data For World Cup 2022!
This is yet another SCAM circulating on WhatsApp and social media, and here are the reasons why you must avoid it!
Fact #1 : FIFA Is Not Offering Free Mobile Data
First, let me just say it out loud and clear – FIFA is not offering free mobile data anywhere in the world, just to watch World Cup 2022 matches.
FIFA makes its money through sale of television, marketing and licensing rights for World Cup 2022, so there is simply no reason for it to provide free mobile data to stream the matches.
Fact #2 : FIFA Would Never Give You Anything Free
Please do NOT be naive. No one is going to give you free data just to participate in a survey!
FIFA is a corporation whose business is to make money, not a charity to give you free data.
Fact #3 : They Do Not Use Official FIFA Domains
Genuine FIFA promotions would be announced on the official website at www.fifa.com, or their official social media accounts:
They would never run contests or promotions via dodgy domains like “subsidy.buzz”, “50g.kxoe1.xyz”, “50gb450.xyz”, or “zlqxt.top”.
Once you see those random domains, click delete. Or just ignore. DO NOT CLICK.
Fact #4 : They Are Advertisement Scams
After you click on the link, you will be redirected through a series of hidden advertisements before you arrive at the “offer page”.
The offer page will ask you a series of simple questions. Regardless of your answers, you will be congratulated and told you won the 50 GB free data plan for three months.
You will be asked to key in your mobile number to receive the free mobile data, but you will never receive anything. In one variant, you are even redirected to more advertisements, including a video advertisement.
Fact #5 : Brands Won’t Ask You To Forward The Contest
To get that free 50 GB data for three months, you are asked to share the “contest” with 12 friends or groups on WhatsApp.
That’s a clear sign of a scam. No brand will insist that you must share their contest or free offer with WhatsApp friends of groups.
Please do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!
Fact #6 : They Can Potentially Be Dangerous
Similar scams in the past have more dangerous variants, where you are asked to :
a) install an app, which is really a malware to keep sending you advertisements
b) enter your banking or credit card details, ostensibly to prove your identity or some other excuse
Needless to say – proceeding with this step will open you up to great risk of monetary loss. DO NOT PROCEED!
If you install their malware, you will start receiving promotions, some of which will ask you to send an SMS to receive expensive free gifts like laptops and smartphones.
If you proceed to send the confirmation SMS messages, you will be subscribed and billed for international premium SMS services.
This is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.
Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).
Fact #7 : They Are Just Another Example Of Online Scams
These are just more examples of online scams offering freebies.
Now that you know the facts, please WARN your family and friends!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Is the Semak.Info website used to check for GE15 voter information really a phishing website?!
Take a look at the viral claim, and find out what the facts really are!
Claim : Semak.Info Is A Phishing Website!
After the official voter information website by the Malaysia Election Commission (SPR) went down a day before the GE15 election day,, people were advised to try an alternative voter information website called Semak.Info.
However, this warning then went viral later that day, claiming that the Semak.Info website is really a phishing website!
The app.semak.info is a phishing site to track your mobile number. Please be informed. Please do not forward. Thanks.
Truth : Semak.Info Is NOT A Phishing Website!
This is yet another example of FAKE NEWS circulating on WhatsApp and social media, and here are the reasons why…
Fact #1 : Semak.Info + App.Semak.Info Are Different Pages
First, let me point out that Semak.Info, and App.Semak.Info are two different pages on the same website. Think of them as two different rooms in the same office.
Semak.Info is the public-facing page, where users can check their GE15 voter information. Think of it as the information desk at your office.
App.Semak.Info, on the other hand, appears to be the website administrator’s page. Think of it as the back office.
That’s why it has a login page, just like how your back office would have a door with a lock – so that the public can’t just walk inside.
Fact #2 : Phishing Websites Masquerade As Genuine Websites
Phishing (pronounced as fishing) is a social engineering attack that attempts to obtain your login information, or personal information like credit card and bank account numbers, etc.
Hackers accomplish this by creating fake websites that look like the real website, to trick you into revealing sensitive information like your bank account login and password, or your security questions.
The Semak.Info page does not ask for any login or critical personal information, so it is not a phishing website.
The App.Semak.Info page is blank, with a simple login function. It does not pretend to be an SPR or banking website, and so it is also not a phishing website.
Fact #3 : Semak.Info Is Owned By DAP
When Semak.Info was first circulated, I too was concerned about this “unknown” website. But a quick check showed that the Democratic Action Party (DAP) was the one promoting its use on Facebook.
I did a little digging, and confirmed that the Semak.Info domain is owned by the Democratic Action Party. It also looked like they bought the domain, and developed the website for GE14, way back in 2017.
Fact #4 : Phone Number Used To Send WhatsApp
Some people asked me why this Semak.Info website would require a phone number, when the official SPR website does not require one to obtain voter information.
What they may not realise is that the DAP team added a WhatsApp messaging feature to their Semak.Info website.
Once you key in your phone number and identity card number, the website will give you your voter information. At the bottom though is a blue Whatsapp [sic] button.
If you click on that button, the website will attempt to send a WhatsApp message to that phone number you keyed in earlier, with key voting information.
It doesn’t automatically send the message. You are given a preview of the message, and you will need to tap on the “Continue to Chat” button to actually send that message to the phone number.
Fact #5 : You Can Use A Fake Phone Number
You may be worried that the DAP team could be harvesting your phone number, and tying it to your identification card number.
Frankly speaking, that kind of data is already easily available and sold (illegally) to marketers and scammers alike. So no one actually needs to “scam” you into keying your phone number.
If you are worried, you can use a fake phone number with this website. Just key in any 7-digit number, with a legitimate 3-digit telco prefix (like 011, 012, 017, 018, etc.), and you are good to go.
Please WATCH OUT about such FAKE NEWS on WhatsApp and social media. They are designed to suppress voter turnout in the 15th General Election.
Regardless of what you may read or see on social media, please take the time and effort to cast your vote. This is not only your right, it is your responsibility as a citizen of Malaysia.
Remember – democracy does not guarantee us a good government. Democracy only guarantees us the right to vote out a bad government!
Happy voting on 19 November 2022!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Maybank just officially announced that it will fully migrate from SMS OTP to Secure2u, as part of efforts to crack down on scams!
Here is what you need to know…
Maybank To Fully Migrate SMS OTP To Secure2u!
On 28 September 2022, Maybank officially announced that it will fully migrate from SMS OTP to Secure2u, as part of efforts to crack down on scams!
By June 2023, all online activities or transactions involving account opening, fund transfers and payments, as well as changes to personal information or account settings, will require Secure2u authentication.
This announcement came after Bank Negara Malaysia (BNM) ordered banks to migrate from the SMS OTP (One Time Password) to more secure authentication methods.
We remain highly committed in helping our customers to avoid being scammed by fraudsters. This is done through existing security measures that are already in place and as we progressively rollout more measures that can help deter or minimise the likelihood of customers falling prey to financial scams.
We are also supportive of Bank Negara Malaysia’s announcement on 26 September 2022 in relation to the five measures to be adopted by banks in Malaysia to ensure higher standards of security, especially for Internet and mobile banking services.
The banking industry is committed to working together to combat financial scams which are increasingly prevalent in today’s digitalised environment.
– Dato’ Khairussaleh Ramli, Group President & CEO of Maybank
Details Of How Maybank Secure2u Will Replace SMS OTP
Secure2u isn’t new. It was introduced in April 2017 as a more secure way for Maybank customers to authorise Maybank2u and MAE transactions using Secure Verification (one-tap approval) and Secure Transaction activation codes (a 6-digit TAC number generated in the app), as an alternate to SMS OTP.
Maybank also revealed some details of how Secure2u will be enhanced as it replaces SMS OTP :
Only one Secure2u device will be allowed per account holder (customer) to minimise the possibility of compromise by a third party
Maybank will alert the customer by SMS, a push notification, and an email when Secure2u is registered on a new device.
In Q4 2022, Maybank will introduce a cooling-off period whenever customers enable Secure2u on a different device. This cooling-off period will give customers the opportunity to verify and report to the bank in case of any unauthorised Secure2u registration on a new device.
In addition to Secure2u, Maybank is heeding BNM’s call for tightened fraud detection rules and triggers, and has in place a call-back verification process to alert customers of suspicious transactions.
Maybank has a dedicated 24/7 hotline for customers to report financial scams at +603-5891-4744. Customers are advised to call the hotline immediately, as soon as they suspect that their banking details have been compromised, or whenever they notice suspicious transactions, so their bank accounts can be suspended swiftly.
Alternatively, customers can also contact the general Maybank Customer Care Hotline at 1-300-88-6688 to report scams / fraud, or to seek assistance in suspending their bank accounts.
Finally, here are some tips from Maybank on how to protect yourself while using online platforms:
Avoid installing/downloading apps/Android Package Kit (APK) files or clicking on suspicious links sent via chat messages such as SMS, WhatsApp, Messenger or other similar services.
Do not provide permission for any app to send or view your SMSes.
Do not ignore any warnings from your devices, especially when downloading or installing a new file.
Do not enter your banking details, especially username or password, in any suspicious apps or websites.
Always keep your antivirus software updated for constant protection.
Only download apps from the genuine app stores such as Apple App Store, Google Play Store or Huawei AppGallery and not from a link.
Be alert if you are being prompted to download a file that is not compatible with your device i.e.: iPhone/iPad device being asked to use an Android device to download a file.
Always look out for your online banking security image and phrase (i.e.: Maybank2u security image and phrase), to ensure the website and app are legitimate.
Do not root or jailbreak your device.
Update your mobile device’s operating system (OS) and apps regularly.
Finally, we must all remember to NEVER share with anyone (not even bank employees) details of our bank accounts.
Please SHARE this article and these tips with your family and friends!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
In this guide, I will share with you how to turn on two-step verification in Telegram.
Step 1 : Open Telegram.
Step 2 : Go to Options > Settings > Privacy and Security.
Step 3 : Tap on the Two-Step Verification option.
Step 4 : In the Two-Step Verification screen, tap on the Set Password option.
Step 5 : Key in your preferred password, which can be any combination of capital or small letters and numbers.
Step 6 : You will need to key the same password again, to confirm it.
Step 7 : Next, you can create a hint to remind you of your password. This is optional, and you can skip it if you prefer.
But if you key one in, the hint will be displayed whenever you are asked to key in the password in the future.
Step 8 : After that, you will have the option of adding a Recovery Email address, just in case your account is hijacked.
This is optional as well, but I highly recommend you add a recovery email, which is simply the email address you use.
Step 9 : If you entered a Recovery Email address, Telegram will now send you an email with a 6-digit code to verify that email address.
Step 10 : Look for the Telegram verification code email, and key in the 6-digit verification code.
That’s it! You’re done! From now on, you will be required to key in the password whenever you log into a new device.
This will prevent hackers / scammers from taking over your account, even if you accidentally give them the Login code you receive by SMS.
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Watch out for the Telegram screenshot hack and scam! Find out how the Telegram screenshot hack and scam works, and what you can do!
Telegram Screenshot Hack : New Twist To Old Trick
My friend just got hit by the Telegram screenshot hack, and the hacker is now trying to scam everyone on his contact list!
The Telegram screenshot hack is a new twist to an old trick, and here is how they do it…
Step 1 : Identify A Suitable Target
After obtaining a legitimate Telegram account through phishing or other means, the hacker reads through the messages to identify a suitable target – usually a close friend whom you often chat with, and trust.
For the purpose of our example, the hacker stole your friend’s Telegram account and has identified you as a suitable target.
Step 2 : Attempt To Login From Another Device
The hacker installs Telegram in another device and attempts to log into your account. He only needs the your phone number to do that.
The login attempt triggers Telegram to send a Login code to the your registered devices to authenticate the login. Usually, that’s the Telegram app in your smartphone.
Step 3 : Ask For A Screenshot Of Telegram
Traditionally, this is when the hacker will use your friend’s Telegram account to message you and ask for that Login code. However, asking for the Login code may trigger suspicion, so hackers have now come up with a new twist.
Instead of asking you for the Login code, the hacker will use your friend’s Telegram account to ask you to take a screenshot of your Telegram app and send it to him.
What harm is there? After all, many of us take screenshots and share them with family, friends and even on social media!
The problem is – the screenshot will accidentally reveal your Telegram Login code! Take a look at the actual screenshot my friend sent – it clearly shows the Telegram Login code!
Step 4 : Terminate All Other Sessions
The hacker will immediately use the Login code to log into your Telegram account on his device.
Then he will terminate all other sessions from that Telegram account, which means you get logged out from your Telegram app on your own smartphone!
Step 5 : Change Password
To prevent you from logging back in, and terminating his Telegram session, he will change the password.
Step 6 : Scam Your Friends
Now that the hacker gained control of your Telegram account and locked you out of it, he is free to scam your friends.
In this case, my friend’s contacts all started getting pleas to borrow money for some kind of emergency. The hacker will, of course, promise to pay you back quickly.
Your unsuspecting friends may not realise that this is not you that they are talking to, and may end up sending the hacker money.
In this case though, my friend managed to quickly alert us via WhatsApp that his Telegram account was hacked, so we didn’t tall for the scam.
One of his friends toyed with the scammer, and obtained the bank details. That is obviously not my friend’s name or account number!
Telegram Screenshot Hack : How To Prevent It?
Now that you know how the Telegram screenshot hack works, you can pretty much figure out how to prevent it.
Here is my quick summary for those who didn’t go through the whole process above :
Do NOT send anyone your Telegram Login code. Not even anyone claiming to be working for Telegram.
Do NOT send anyone a screenshot of your Telegram app. Even if it’s not a scam, it reveals portions of your chats!
Turn on Two-Step Verification in Telegram. This lets you recover your account, even if you accidentally let someone take over your account.
Telegram Screenshot Hack : How To Recover Your Account?
If you failed to turn on two-step verification, there is still a way to recover your Telegram account after it is stolen by a hacker.
For these steps to work though, you need to have access to your phone number. You must also do this quickly, as the hacker will be alerted to your attempt.
Step 1 : Open Telegram.
Step 2 : Log into your Telegram account using your phone number.
Step 3 : You will be asked if you have the correct number. Click Yes.
Step 4 : Telegram will send a 5-digit code to all your devices with Telegram installed. You won’t receive it since the hacker has already terminated all other sessions.
Step 5 : Click on the option just above the keypad – “Send the code as an SMS“.
Step 6 : You will now receive an SMS with the 5-digit code. Key it in, and you will now have access to your Telegram account.
Step 7 : Go to Options > Settings > Privacy and Security.
Step 8 : Scroll down and tap on Devices.
Step 9 : Tap on the option – Terminate All Other Session – to boot out the hacker.
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
The Royal Malaysia Police (PDRM) denies running a troll farm to corrupt or manipulate public discourse!
Here is what you need to know!
Meta Accuses Malaysia Police Of Running Political Troll Farm!
On 4 August 2022, Meta directly named the Royal Malaysia Police (PDRM) as being responsible for a troll farm designed to “corrupt or manipulate public discourse“.
Here were the key findings that the Meta team revealed about the individuals behind the PDRM troll farm :
They were active on Facebook, TikTok, Twitter and Instagram.
They posted memes in Malay, in support of the current government coalition
They posted claims of corruption amongst the current government coalition’s critics
They created Facebook Pages that posed as independent news entities, and promoted police while criticising the opposition.
Their posting activity were greatest during weekdays, taking breaks for lunch.
Their fake accounts were under-developed, and some of them used stolen profile photos.
The troll farm was initially suspected to have originated in China by researchers at Clemson University in South Caroline. But when the Meta team investigated it, they found links to the Royal Malaysia Police (PDRM).
The Meta team also revealed that the PDRM troll farm spent about $6,000 (~RM26,750) in Facebook and Instagram ads, paid for primarily in Malaysian Ringgit.
They also shared how successful the PDRM troll farm was in garnering followers on Facebook and Instagram :
Facebook Pages : About 427,000 accounts
Facebook Groups : About 4,000 accounts
Instagram Accounts : About 15,000 accounts
As a result of their investigation, Meta removed 595 Facebook accounts, 180 Pages, 11 Groups and 72 Instagram accounts that were linked to this PDRM troll farm, for violating their police against “coordinated inauthentic behavior“.
What Is Inauthentic Behavior?
Inauthentic behaviour (IB) as an effort to mislead people or Facebook about about the popularity of content, the purpose of a community (i.e. Groups, Pages, Events) or the identity of the people behind it. It is primarily centered around amplifying and increasing the distribution of content, and is often (but not exclusively) financially motivated.
IB operators typically focus on quantity rather than the quality of engagement. For example, they may use large numbers of low-sophistication fake accounts to mass-post or like their content — be it commercial, social or political. They often use tactics similar to other large-scale online activities, like spam.
This behavior pattern distinguishes IB from Coordinated Inauthentic Behavior (CIB) where operators invest in mimicking human social activity as closely as possible.
PDRM Denies Meta Accusations Of Running Political Troll Farm!
On 6 August 2022, PDRM issued a short notice (with my English translation) stating that it takes Meta’s allegations seriously, denies them, and is currently gathering information about those allegations.
Penafian PDRM Atas Dakwaan Syarikat Meta Platforms Incorporated
Police Diraja Malaysia (PDRM) memandang serius laporan pihak syarikat Meta Platforms Incorporated yang mendakwa terdapat akaun-akaun palsu di media sosial yang “mempunyai hubungan dengan PDRM”.
PDRM menafikan dakwaan tersebut dan sedang mengampul maklumat lanjut mengenainya.
PDRM Denies Allegations By Meta Platforms Incorporated
The Royal Malaysia Police (PDRM) is taking seriously the report by Meta Platforms Incorporated which claimed that there are fake social media account “with ties to PDRM”.
PDRM denies these allegations and is gathering more information about it.
PDRM Troll Farm : Is That Even Legal?!
The Royal Malaysia Police (PDRM) enforces the laws of the country, including the Internet. In fact, they have a Cyber & Multimedia Criminal Investigation Unit under the Commercial Crime Investigation Department.
The PDRM works together with the National Cyber Security Agency (NACSA) to tackle cybersecurity threats, and these would include malicious influence campaigns.
All the more reason why it is both perplexing and troubling that Malaysia’s national police force has been linked to a troll farm designed to promote the current government coalition, while denigrating the opposition.
These are specifically the cybercrimes that NACSA should be looking out for, and the PDRM should be assisting them in arresting anyone in Malaysia who participated in such activities.
The PDRM will no doubt be under tremendous pressure to explain / refute Meta’s allegations.
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Indonesia just banned a number of major websites including Steam, Epic Games, PayPal and Battle.net!
Here is what you need to know!
Indonesia Banned Steam, PayPal, Epic Games + More!
On 30 July 2022, Indonesians woke up to the shocking discovery that a number of gaming platforms like Steam, Epic Games, Origin, Ubisoft and Battle.net are now banned!
Not only were gaming platforms banned, Indonesia also banned major websites and digital services like PayPal and Waze.
Indonesian netizens have started sharing tips on how to bypass this sudden ban – by using VPN, or changing their DNS servers, to bypass what appears to be an IP block.
Why Indonesia Banned Steam, PayPal, Epic Games, Etc!
There was no official announcement by the Indonesian government, but it is likely that Indonesia banned Steam, PayPal, Epic Games and a bunch of other websites and digital platforms because they failed to register as an Electronics System Provider / Penyelenggara Sistem Elektronik (PSE).
On November 24, 2020, the Indonesian Ministry of Communication and Information Technology (Kominfo) imposed a new regulation calling for all local and international digital services to register with them for cybersecurity and user protection purposes.
Failure to comply with that regulation would subject the digital service to being banned / blocked in Indonesia.
Here is a partial list of major websites, platforms and digital services registered with the Indonesian government, and those that have not been registered, or are known to be blocked.
Those on the unregistered list are likely to be blocked, if not already blocked. Interestingly, Telegram is listed as registered, but is currently inaccessible (blocked) in Indonesia.
Registered
Unregistered
Blocked
LINE
WhatsApp
TikTok
Google
Google Classroom
Google Drive
Gmail
Google Cloud
YouTube
Amazon AWS
Facebook
Telegram
Twitter
Instagram
Discord
Zoom
Gojek
Spotify
Shopee
Lazada
Traveloka
Netflix
Disney+ Hotstar
Zenius
Mobile Legends
LinkedIn
Roblox
Vidio
FB Messenger
Wikipedia
Deezer
Waze
Brainly
Notion
Pinterest
SoundCloud
PayPal
EA
Nintendo
Ubisoft
Mangaku
MediaFire
GitHub
GitLab
Bitbucket
CloudFlare
MS Azure
Amazon
Reddit
DuckDuckGo
Twitch
IMDb
MS Office
Yahoo
IMDb
Patreon
Epic Games
Steam
Uplay
Battle.net
Origin
On July 15 – just 2 weeks earlier – Kominfo warned that digital service providers will be banned in Indonesia on July 21, 2022 if they refused to register.
The deadline for all PSE registration – both domestic and foreign – was set at July 20, 2022. After that, Kominfo would start banning unregistered apps and services.
At that time, Kominfo reported that many major brands and companies have yet to register with them, like Google (which owns YouTube, Google Drive, Gmail, etc.), Meta (which owns WhatsApp, Instagram and Facebook), Twitter, Netflix, PUBG Mobile and Mobile Legends.
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
China just fined Didi Global a whopping $1.2 billion for violating its cybersecurity, data security and privacy laws!
China Fines Didi Global $1.2 Billion For Violating Laws!
On Thursday, 21 July 2022, the Cyberspace Administration of China (CAC) announced that Didi Global breached the country’s cybersecurity law, data security law, and personal information protection law.
The Chinese cyberspace regulator fined Didi Global 8 billion yuan ($1.2 billion), as well as a personal fine of 1 million yuan ($148,000) each on Chairman and CEO Cheng Wei, as well as President Liu Qing (also known as Jean Liu).
The facts of violations of laws and regulations are clear, the evidence is conclusive, the circumstances are serious, and the nature is vile.
Didi Global responded to the regulator’s announcement with a contrite statement “sincerely” accepting the judgement and penalties :
We sincerely accept this decision, and resolutely obey it. We will strictly follow the penalty decision and the requirements of relevant laws and regulations, conduct comprehensive and in-depth self-examination, and actively cooperate with supervision and complete rectification carefully.
We will take this as a warning and further strengthen the construction of cyberspace security and data security, strengthen the protection of personal information, and earnestly fulfill our social responsibilities. We will serve every passenger, driver and partner well, and realize the safe, healthy and sustainable development of the enterprise.
What Did Didi Do To Incur China’s Wrath?
According to an FAQ by the CAC, its investigators started their investigation of Didi in July 2021.
After conducting an extensive investigation, they found that Didi conducted data processing activities that “seriously affected national security”, and refused to comply with “the explicit requirements of regulatory authorities” and conducted “malicious evasion” of regulatory supervision.
They also stated that Didi Global committed 16 violations of China’s laws, including :
Didi illegally collected 11.9639 million screenshots from its users’ mobile phone photo albums.
Didi excessively collected 8.323 billion pieces of its users’ clipboard information, and application list information.
Didi excessively collected 107 million pieces of passenger face recognition information, and 53.5092 million pieces of age group information, 16.3556 million pieces of occupational information, 1.3829 million pieces of family relationship information, and 153 million pieces of taxi address information.
Didi excessively collected passengers’ evaluation of the drivers, when the app is running in the background, and 167 million pieces of precise location (longitude and latitude).
Didi excessively collected 142,900 pieces of driver education information, and 53.976 billion pieces of “intent information”, 1.538 billion pieces of resident city information, and 304 million pieces of non-local business/travel information.
Its users are frequently asked to provide “telephone permissions” while using its services.
Inaccurate and clear description of user personal information processing, including device information.
The CAC noted that Didi started its bad practices in June 2015, and continued even after the Cybersecurity Law was implemented in June 2017, the Data Security Law started in January 2022, and the Personal Information Protection Law was implemented in November 2021.
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
The FBI and MI5 just issued a joint warning about economic spying and hacking operations by the Chinese government!
Here is what you need to know…
FBI + MI5 Issue Joint Warning On Chinese Spying!
On July 7, 2022, FBI Director Christopher Wray joined MI5 Director General Ken McCallum at the MI5 London headquarters to issue a joint warning about Chinese spying and cyberattacks.
Ken McCallum said that MI5 was running seven times as many investigations into China, as it had just four years ago. He also said that MI5 planned to double that to tackle the widespread attempts.
Christopher Wray, on the other hand, stressed that the FBI had substantially increased its investigations into China, and is currently managing about 2,000 problems, and opening about two counterintelligence cases every day.
The Chinese government is set on stealing your technology – whatever it is that makes your industry tick – and using it to undercut your business and dominate your market.
Maintaining a technological edge may do more to increase a company’s value than would partnering with a Chinese company to sell into that huge Chinese market, only to find the Chinese government and your partner stealing and copying your innovation.
Both McCallum and Wray alleged that the Chinese government is engaged in a “coordinated campaign” to “cheat and steal [technology] on a massive scale“.
They also stressed that China’s hacking programme dwarfs that of any other major country, and that it has a global network of intelligence operatives.
FBI + MI5 : China Also Preparing To Shield From Sanctions
Even more worrying is the fact that China is working to shield its economy from any future sanctions, obviously learning from how the West punished Russia for invading Ukraine.
This suggests that China is at least preparing for the possibility, if not the eventuality, of insulating its economy from potential sanctions, should it attack Taiwan.
Wray said that China is “trying to cushion themselves from harm if they do anything to draw the ire of the international community”, and that the Chinese government is pressuring Western businesses not to criticise Beijing or its policies.
He declined to say whether an invasion of Taiwan has become more likely due to these measures, but warn that Western investments in China could be similarly impacted by such a conflict.
Just as in Russia, Western investments built over years could become hostage, capital stranded. Supply chains and relationships disrupted.
Wray also shared that the Chinese government had directly interfered in a New York congressional election, because they did not want a candidate who was a critic and a former Tiananmen Square protestor to be elected.
China has for far too long counted on being everybody’s second-highest priority. They are not flying under the radar anymore.
Both Wray and McCallum said that the intention of the joint address was to “send the clearest signal” to the Chinese Communist Party (CCP), because if China decides to invade Taiwan, it would cause “one of the most horrific business disruptions the world has ever seen“.
McCallum shared some specific cases of Chinese spying activities that MI5 detected and thwarted.
Covert Theft
Late last year Chinese intelligence officer Shu Yenjoon was convicted in a US court on charges of economic espionage and theft of trade secrets from the US aviation sector.
Shu was active in Europe too: he’d been part of a prolific Ministry of State Security network targeting the aerospace sector.
MI5 worked with those being targeted in the UK to mitigate the risks until the FBI action could solve the problem for both of us.
Tech Transfer
Clandestine espionage methodology isn’t always necessary. Take the tale of Smith’s Harlow, a UK-based precision engineering firm. In 2017 Smith’s Harlow entered into a deal with a Chinese firm, Futures Aerospace. The first of three agreed technology transfers saw Futures pay £3m for quality control procedures and training courses.
You know how this ends: after further sharing of valuable IP, Futures abandoned the deal. Smith’s Harlow went into administration in 2020. As their Chairman put it: “They’ve taken what they wanted and now they’ve got it, they didn’t need the shell of Smith’s”.
Information Advantage
The CCP doesn’t just use intelligence officers posing as diplomats in the classic fashion. Privileged information is gathered on multiple channels, in what is sometimes referred to as the ‘thousand grains of sand’ strategy.
In Germany a retired political scientist and his wife who together ran a foreign policy think tank passed information to the Chinese intelligence services for almost ten years.
In Estonia a NATO maritime scientist was convicted for passing information to his Chinese handlers, who claimed to be working for a think tank.
Cultivating New Contacts
The deceptive use of professional networking sites is well known. Seemingly flattering approaches turn into something more insidious – and damaging.
In one example a British aviation expert received an approach online, ostensibly went through a recruitment process, and was offered an attractive employment opportunity. He travelled twice to China where he was wined and dined. He was then asked – and paid – for detailed technical information on military aircraft. The ‘company’ was actually run by Chinese intelligence officers.
Chinese government officials naturally rejected spying allegations by the FBI and MI5.
A spokesman for the Chinese embassy in Washington, Liu Pengyu, called the accusations groundless and said that China “firmly opposes and combats all forms of cyber-attacks“, and would “never encourage, support or condone cyber-attacks“.
His statement also said that the Taiwan issue was “purely China’s internal affair” and that there was “no room for compromise or concession“. It also said that China “will strive for the prospect of peaceful reunification with utmost sincerity and efforts“, but noted that China would “reserve the option of taking all necessary measures in response to the interference of foreign forces“.
Chinese foreign ministry spokesperson Zhao Lijian did not address the claims directly, but accused the United States of being the real danger instead.
The relevant US politician has been playing up the so-called China threat to smear and attack China. Facts have fully proven that the US is the biggest threat to world peace, stability and development.
We urge this US official to have the right perspective, see China’s developments in an objective and reasonable manner and stop spreading lies and stop making irresponsible remarks.
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
However, Malaysians are also too gullible, accepting all warnings on WhatsApp as genuine, without first verifying if they are even true.
Here are the reasons why the MySejahtera reset messages delivered by the 68808 SMS service are not necessarily a scam!
Fact #1 : 68808 Is Used By MySejahtera
Despite what people may tell you – 68808 is an official SMS service number used by MySejahtera.
In fact, MySejahtera uses three SMS service numbers to send you notifications (like your vaccination appointments), as well as your password renewal link :
68808 68088 63001
Fact #2 : 68808 Messages Are Generally Legitimate
Despite what is shared on social media, messages sent through 68808 are genuine. What you need to be wary of are SMS messages sent via other numbers.
Take a look at this example of fake news shared on social media, and some websites. It was touted as an example of fake MySejahtera messages sent by 68808.
The truth is “original” message was sent through 63839, which is not a legitimate MySejahtera SMS service. The “fake” message was sent through 68808, which is a legitimate MySejahtera SMS service.
In this misleading example, you can also see a prior SMS message on vehicle servicing in the 63839 channel. Official MySejahtera SMS channels (68808, 68088 and 63001) will only show messages from MySejahtera, not other services.
Note : The links in both messages appear to be genuine, linking to https://mysejahtera.malaysia.gov.my/.
Fact #3 : MySejahtera Sends Reset Links Via SMS
Despite what social media “experts” may tell you – MySejahtera will send password reset links through SMS, as a verification method.
If you are trying to reset your MySejahtera password (because you forgot it), you will be sent an SMS message with a link to https://mysejahtera.malaysia.gov.my/, as the example above shows.
Fact #4 : SMS Messages Can Be Spoofed
That said, SMS messages can be spoofed to appear to come from the three legitimate MySejahtera channels – 68808, 68088 and 63001.
So you should avoid clicking on MySejahtera password reset links, even from legitimate channels, unless you have specifically asked to reset the MySejahtera password.
Fact #5 : MySejahtera Team Clarified This In April
The MySejahtera team actually refuted these false claims in April 2022. Unfortunately, people still continue to share this fake news.
So please help us fight fake news – share this fact check with your family and friends!
How To Avoid MySejahtera (Or Other) SMS Scam!
So here is what I recommend when it comes to SMS messages, whether they were sent by MySejahtera, banks, etc. :
Always check to make sure they come from legitimate SMS channels. For MySejahtera, that’s 68808, 68088 and 63001.
If you are not sure about an SMS message from the authorities / banks / telcos, please do not hesitate to call them to verify the authenticity of that message.
Never click on a link to log into a website (like your bank). Always use your banking app, or log in manually using a Internet browser on your computer or phone.
Only click on a link in specific circumstances that do not require a login – for example : to verify your request to reset your MySejahtera password.
Do NOT click on any link to confirm that you are resetting a password, or confirm your new SIM card, unless you just requested to performed those actions.
Before you click on a link, always check the link goes to the official website (like https://mysejahtera.malaysia.gov.my/). Never click on a link that goes to suspicious websites.
I hope this article helps you differentiate between fake claims circulating on social media and WhatsApp groups, and proper cybersecurity measures we should take to prevent being scammed of our hard-earned money!
Please help to SHARE this fact check article out, and please SUPPORT our work! Thank you!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Did hackers just crack the Pfizer and Moderna servers, and publicly released the hidden vaccine death data that they stole?!
Take a look at the viral claim, and find out what the facts really are!
Claim : Hackers Stole, Released Pfizer + Moderna Vaccine Death Data!
People are sharing links to articles that claim that hackers just stole and released vaccine death data from Pfizer and Moderna servers!
Here is an example, which is rather long, so feel free to skip to the next section for the facts!
GOOD NEWS!!!! Hackers broke into all the pharmaceutical companies and stold all the medial data on vaccines thank God!!!! The Great Awaking has lifted off!!! Forward this link everywhere!!!!
**Displays number of deaths and disabilities associated with each batch/lot number = indication of relative toxicity of one batch/lot compared to another
**No one currently knows the reason why some batches/lots are associated with excessive deaths, disabilities and adverse reactions (up to 50 x). Until we do know, it is best to be cautious
**[“Batch-code” = “Lot Number” = the number they write on your vaccination card.]
Here’s the link to the site www.linkremoved.info where you can see live links listed below. Download and save all articals you can incase the site goes down!!!
Check out your batch code (lot number)
Check out your batch code (lot number)
• Moderna Batch Codes
• Pfizer Batch Codes
• Janssen Batch Codes
• Moderna (outside of USA)
• Pfizer (outside of USA)
• Janssen (outside of USA)
Latest Info on Boosters
• Bad Batches of the Month
Variation in Toxicity
• Cumulative Toxicity over Time PDF
• VIDEO : Variation in Toxicity between Batches
• Death by Lottery PDF
• VIDEO : Non-GMP Compliant Batches Associated with Death and Disability
• VIDEO : Team Enigma – Covid Vax Variability
• VIDEO : VAERS reveals super-toxic batches
Do the Batch Codes Code for Toxicity?
• Moderna’s 20A-21A Classification of Toxicity for Covid Vaccines PDF
• Moderna : Alphabetic Labelling of Different Toxicities PDF
• Pfizer : Alphabetic Labelling of Different Toxicities PDF
• VIDEO : Do Pfizer Batch Numbers Code for Toxicity Part 1 ?
• VIDEO : Do Pfizer Batch Numbers Code for Toxicity Part 2 ?
• VIDEO : Do Moderna Batch Numbers Code for Toxicity ?
VAERS Database
• Covid Science Library
• Medical doctors talking about VAERS
• VaersAnalysis.info
Data Source
• All data is sourced from VAERS, a public database of over 700,000 adverse reaction reports for Moderna, Pfizer and Janssen Covid 19 vaccines in the USA. Our intention is to present the VAERS data in an accessible and unadulterated form, that can be easily verified using the links below
• Vaccine Adverse Event Reporting System (VAERS)
• Video Tutorial 1 : Extracting Bad Batch Data from VAERS – Deaths, Disabilities, Hospitalisations
Truth : Hackers Did Not Steal / Release Pfizer + Moderna Vaccine Death Data!
This is yet another example of FAKE NEWS created and promoted by disinformation websites like Before It’s News, How Bad Is My Batch, Best News Here, and here are the reasons why…
Fact #1 : Pfizer + Moderna Servers Were Not Hacked
Those websites falsely claimed that hackers broke into Pfizer and Moderna servers, and stole their (hidden) vaccine death data.
There is no evidence the Pfizer and Moderna servers were ever hacked, or had any data stolen.
Fact #2 : All Data Are Publicly Available
Despite claiming at the start that the data provided in the website was stolen from Pfizer and Moderna servers, the article ends with a statement that all of the data was really sourced from VAERS.
Data Source • All data is sourced from VAERS, a public database of over 700,000 adverse reaction reports for Moderna, Pfizer and Janssen Covid 19 vaccines in the USA. Our intention is to present the VAERS data in an accessible and unadulterated form, that can be easily verified using the links below
In other words – they falsely claimed that the data was provided by hackers who broke into Pfizer and Moderna servers. The data were all from VAERS, which is publicly available.
Fact #3 : VAERS Data Cannot Be Used As Evidence
Like the British Yellow Card system, VAERS is an open reporting system that lets ANYONE from ANYWHERE file a report, without verification.
Reports may include incomplete, inaccurate, coincidental and unverified information.
The number of reports alone cannot be interpreted or used to reach conclusions about the existence, severity, frequency, or rates of problems associated with vaccines.
But anti-vaccination activists and disinformation websites LOVE to use VAERS, because they can easily manipulate the reports to create a fake narrative.
Fact #4 : Pfizer + Moderna Released Their Data In 2020
Both Pfizer and Moderna submitted data from their COVID-19 vaccine clinical trials to health authorities across the world, like the US FDA and EMA in Europe in November 2020.
The release of clinical trial data, which would include post-vaccination adverse events, is necessary for any health authority to approve their vaccines.
The US FDA released the briefing documents Pfizer and Moderna submitted to the Vaccines and Related Biological Products Advisory Committee (VRBPAC) in December 2020 :
Fact #5 : FDA Started Releasing Pfizer Documents In 2021
On 27 August 2021, a group that called themselves Public Health and Medical Professionals for Transparency (PHMPT) filed a Freedom of Information Act (FOIA) request with the US FDA to gain access to all of their documents related to the Pfizer COVID-19 vaccine.
The US FDA started releasing the Pfizer documents on 17 November 2021. They were then ordered by US District Judge Mark Pittman to speed up the release of those documents on 6 January 2022.
As of 2 May 2022, the US FDA had already released 238 documents related to the Pfizer COVID-19 vaccine, containing thousands of pages.
Fact #6 : Before It’s News Is Known Fake News Website
Before It’s News is known for creating and spreading fake news – not just misinformation, but also disinformation about everything from MH17 conspiracy theories to anti-vaccination claims.
Everything posted by Before It’s News must be considered FAKE NEWS, until proven otherwise.
Please help us FIGHT FAKE NEWS by sharing this fact check article out!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Unfortunately, this Nespresso contest is yet another SCAM that you should NEVER participate in!
After you click on the link, you are taken to a page that looks like a genuine Nespresso contest page.
You will be asked to answer three very simple questions.
The answers are irrelevant – no matter what you answer, you are always allowed to proceed to the next step.
You are then asked to share the promotion with 30 WhatsApp contacts, or 5 WhatsApp groups.
Next, you will be asked to complete one of these tasks to receive the “free” Nespresso coffee machine :
a) install an app, which is really a malware to send you advertisements, or
b) enter your credit card details
Needless to say – proceeding with this step will open you up to great risk of monetary loss. DO NOT PROCEED!
If you install their malware, you will start receiving promotions, some of which will ask you to send an SMS to receive expensive free gifts like laptops and smartphones.
If you proceed to send the confirmation SMS messages, you will be subscribed and billed for international premium SMS services.
So never click on such contest links, even if they were sent to you by a trusted relative or friend.
They would have certainly been fooled by the scam, so please warn them too!
How To Spot Scams Like The Nespresso Survey Contest!
Now, let me show you how to spot these scams next time!
If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!
Warning Sign #1 : Bad Grammar
Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.
Proper contests or events sponsored by major brands like Nespresso will have at least one PR or marketing person who will vet the text before allowing it to be posted.
Warning Sign #2 : Offering You Free Money Or Gifts
Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!
Petronas isn’t going to give you FREE money, just because it’s their anniversary.
They are a corporation whose business is to make money, not a charity to give you free money.
Warning Sign #3 : Not Using The Real Jaya Grocer Domain
A genuine Petronas campaign would use their real domain – www.petronas.com.
Or they would run it off the official Petronas page on Facebook – www.facebook.com/petronas/.
If you see nonsensical domains like 0yjjg61.cn, 1eaf1rnbeef.top, ldxqw.bar, etc. that’s a sign of a SCAM!
Warning Sign #4 : Asking You To Forward The Offer
No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.
Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!
Warning Sign #5 : Asking You To Download + Register An App
If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.
This is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.
Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).
Please help us fight scams like this and SHARE this article out!
And please WARN your family and friends!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
For one thing – Petronas was incorporated on 17 August 1974, so their 50th anniversary would be on 17 August 2024!
Petronas confirmed that this survey is a scam in a Facebook post :
PETRONAS has been made aware of a scam online “survey” conducted supposedly in conjunction with “PETRONAS’ 50th Anniversary”.
We wish to inform that neither PETRONAS nor any of our subsidiaries within the Group of Companies are involved in this “survey”, and we appeal to the public not to respond or take part.
I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.
Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :
Now, let me show you how to spot these scams next time!
If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!
Warning Sign #1 : Bad Grammar
Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.
Proper contests or events sponsored by major brands like Petronas will have at least one PR or marketing person who will vet the text before allowing it to be posted.
Warning Sign #2 : Offering You Free Money Or Gifts
Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!
Petronas isn’t going to give you FREE money, just because it’s their anniversary.
They are a corporation whose business is to make money, not a charity to give you free money.
Warning Sign #3 : Not Using The Real Jaya Grocer Domain
A genuine Petronas campaign would use their real domain – www.petronas.com.
Or they would run it off the official Petronas page on Facebook – www.facebook.com/petronas/.
If you see nonsensical domains like 0yjjg61.cn, 1eaf1rnbeef.top, ldxqw.bar, etc. that’s a sign of a SCAM!
Warning Sign #4 : Asking You To Forward The Offer
No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.
Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!
Warning Sign #5 : Asking You To Download + Register An App
If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.
This is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.
Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).
Please help us fight scams like this and SHARE this article out!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Did Senator Joe Biden block the Vietnam evacuation, and the resettlement of Vietnamese refugees in 1975?
Take a look at the viral post, and find out what the FACTS really are!
Claim : Senator Joe Biden Blocked Vietnam Evacuation + Refugees!
The message was first introduced before the 2020 US Presidential Elections, and reintroduced after the US withdrawal from Afghanistan resulted in a rout of the Afghan government, and a stampede to escape the Taliban.
Now, people are sharing this viral message on social media and WhatsApp, as President Joe Biden punishes the Russian government for its invasion of Ukraine.
ONE FOR HISTORY BUFFS THAT I BET YOU DID NOT KNOW
In 1975, President Ford was left to manage the difficult ending of the Vietnam War. President Ford went to Congress for a relief package to allow American personnel and our allies to evacuate. However, there was ONE US SENATOR who opposed any such support. The result was the embarrassing and hurried evacuation from the roof of the American embassy in Saigon.
This senator reveled in the embarrassment and did everything he could to leverage it politically against Ford. Despite the efforts of this U.S. Senator – President Ford managed to rescue 1,500 South Vietnamese allies prior to the country’s fall. Had President Ford not acted quickly, these people would have been targeted and slaughtered for their support for America.
When they arrived in America, President Ford asked Congress for a package to assist these refugees to integrated into American society. That SAME troublesome SENATOR TORPEDOED ANY SUPPORT for these shell shocked, anti-communist Americans and our helpers, the refugees.
Instead, President Ford had to recruit Christian organizations to offer assistance on a voluntary basis. As he did so, the Senator belittled those efforts. What kind of person would oppose President Ford’s tireless work to do the right and humanitarian thing? Who would want to play politics with the well-being of innocent people who stood by America in the tragic Vietnam War?
THAT SENATOR WAS JOE BIDEN
From the book – “When the Center Held” by Donald Rumsfeld in 2018 (biography)
… spread it, far and wide!
Truth : Joe Biden Did Not Block Vietnam Evacuation + Refugees!
This recycled FAKE NEWS was originally created by Trump supporters, and is still fake news, no matter how many times it’s reposted.
It is now being recycled to cast aspersions on US President Joe Biden’s actions against the Russian government for its invasion of Ukraine.
Here is a quick summary of the facts :
Senator Joe Biden did not block President Gerald Ford’s Vietnam evacuation plans.
Senator Joe Biden did not torpedo any support for Vietnamese refugees.
President Ford did not rely on Christian organisations to help the Vietnamese refugees.
Senator Joe Biden voted to approve humanitarian aid for Vietnamese and Cambodian refugees.
Humanitarian aid was approved for both Vietnamese and Cambodian refugees.
Senator Joe Biden voted to welcome the Vietnamese and Cambodian refugees.
For those who want the nitty, gritty details, here are the facts…
Fact #1 : Senator Joe Biden Voted Against Vietnam Contingency Act
Senator Joe Biden voted against the Vietnam Contingency Act (S. 1484) when it was proposed in the US Senate, because he disagreed with two terms in the bill :
military assistance to Vietnam
authorisation to use American troops (if necessary) to protect the evacuation of South Vietnamese citizens.
Specifically, he was against the Ford Administration tying military assistance to Vietnam and the continued use of US troops, with the evacuation of American and Vietnamese civilians.
He was worried that $100 million of contingency funds in this bill would be used to provide military aid, instead of helping to evacuate the refugees.
Fact #2 : Joe Biden Was One Of 17 Who Voted Against S. 1484
The claim that Senator Joe Biden was the only senator to vote against S. 1484 is false. He was one of 17 senators who voted against the Vietnam Contingency Act.
Fact #3 : Vietnam Contingency Act Passed In The US Congress
Despite Senator Biden’s Nay vote, together with 16 other senators, the Vietnam Contingency Act (S. 1484) was approved in the Senate with a 75-17 vote on 24 April 1975.
Fact #4 : Vietnam Contingency Act Rejected In House Of Representatives
The Vietnam Contingency Act however failed to pass the House of Representatives, where it was defeated in a vote of 162 to 246 on 1 May 1975.
It was generally agreed that the majority of Representatives were against the Ford Administration’s intentional linking of the evacuation with military assistance to Vietnam.
So it was ultimately not Joe Biden – a very young senator at that time – who blocked President Ford’s militarised evacuation plan, but the US House of Representatives.
Fact #5 : HR 6096 Rejected In House Of Representatives
The Vietnam Humanitarian Assistance and Evacuation Act of 1975 (HR 6096) was proposed in the US House of Representatives, to assist the Vietnamese refugees.
However, it was defeated in the same US House of Representative vote for S. 1484 above, with a vote of 162 to 246.
The defeated bill never got to the US Senate, so Senator Joe Biden never voted for or against it. It is therefore categorically FALSE to claim that he torpedoed the bill.
Fact #6 : S. 1661 Passed In The US Congress
After HR 6096 failed in the House of Representatives, President Ford submitted a new bill to the US Congress – the Indochina Migration and Refugee Assistance Act (S. 1661) on 6 May 1975.
This bill passed the US Senate with an overwhelming majority vote of 77 to 2. Only Republican senators Jesse Helm and William Scott voted against it.
Senator Joe Biden was not present for the vote, but later voted to advance the bill to the House of Representatives with a “favourable recommendation”.
Joe Biden certainly did not torpedo this humanitarian bill either.
Fact #7 : President Ford Did Not Rely On Christian Organisations
The S. 1661 Senate bill was merged into HR 6755 (Authorizing Funds for Assistance to Refugees from South Vietnam and Cambodia), which passed in the House of Representatives with a 381 vs. 31 vote.
HR 6755 was signed into law by President Gerald Ford on 23 May 1975.
So the claim that President Ford had to rely on Christian organisations to help the Vietnamese refugees is also FALSE.
Fact #7 : US Congress Welcomed Vietnamese + Cambodian Refugees
On 8 May 1975, the US Congress issued a resolution called “Welcome the latest refugees to our shores (S. Res. 148)“.
92 senators, including Senator Joe Biden, voted in favour, with only one Republican senator voting against – Senator William Scott, and seven others abstaining.
In short, Joe Biden voted to welcome both Vietnamese and Cambodian refugees to the United States.
Now that you know the truth, please SHARE THIS OUT so other people won’t get fooled by the fake viral claim!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
After Anonymous declare a cyberwar against Russia, their affiliates are going after the Russian space agency, Roscosmos.
Here is what they accomplished so far!
Anonymous Affiliate NB65 Attacked Russian Space Agency!
On 28 February 2022, the hacking group – Anonymous Network Battalion 65′ (NB65), which hacked and released over 40,000 files from the Russian Nuclear Safety Institute.
They then turned their attention to the Russian Space Agency, claiming to shut down the WS02 Vehicle Monitoring System server at the Roscosmos Control Center on 1 March 2022.
The Russian Space Agency sure does love their satellite imaging.
Better yet they sure do love their Vehicle Monitoring System.
The WS02 was deleted, credentials were rotated and the server is shut down.
Network Battalion isn’t going to give you the IP, that would be too easy, now wouldn’t it?
Have a nice Monday fixing your spying tech. Glory to Ukraine.
We wont [sic] stop until you stop dropping bombs, killing civilians and trying to invade.
Go the fuck back to Russia.
However, Roscosmos Chief Executive, Dmitry Rogozin denied the claim, saying that “The information of these scammers and petty swindlers is not true. All our space activity control centers are operating normally.‘
The information of these scammers and petty swindlers is not true. All our space activity control centers are operating normally. https://t.co/MY0qzlLqCI
Anonymous Affiliate v0g3lSec Hacked Russian Space Agency Website!
On 3 March 2022, another Anonymous affiliate, v0g3lSec, hacked a website owned by the Russian Space Agency – http://uv.ikiweb.ru/.
This appears to be the official website for the World Space Observatory-Ultraviolet (WSO-UV) telescope, also known as the Spektr-UV. It is still down as of 4 March 2022.
Anonymous Affiliate v0g3lSec Leaked Russian Space Agency Files!
On 4 March 2022, v0g3lSecreleased files that were hacked from a private service hosted by the Russian space agency.
The files apparently contained data from Luna – a joint programme between Roscosmos and the European Space Agency (ESA).
The leaked data consisted of 261 items, with a size of 729 gigabytes.
The executable files (.exe) are from 2012, with a timestamp of 2012-12-20 18:18:57.
Most of the documents are from 2009 to 2012, so the files are pretty old.
This suggests that the files that v0g3lSec stole were old data archived by Roscosmos. While it is a technical success, it is unlikely to have any actual effect.
Roscosmos Chief Threatens ISS + War
Roscosmos chief, Rogozin, suggested that sanctions against Russia could result in the destruction of the International Space Station (ISS).
If you block cooperation with us, who will save the ISS from an uncontrolled deorbit and fall into the United States or Europe?
Rogozin also said that any cyberattack on Russia’s satellites would be considered casus belli – a cause for war.
However, it is unknown how Roscosmos or Russia plans to declare or effect war against Anonymous, or its affiliates.
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
The hacktivist group, Anonymous, just fired a warning shot at both China and Russia over the invasion of Ukraine!
Anonymous fires Warning Shot at China, Russia over Ukraine!
The hacktivist group, Anonymous, just hacked a Chinese state website, and a logic controller in Russia, as a warning shot to both countries over the invasion of Ukraine.
On Tuesday, 22 February 2022, Anonymous hacked the Chinese Culture website (www.chineseculture.com.cn), replacing its content with a page showing its logo, and the Guy Fawkes mask.
The hacked Chinese Culture website was taken offline, but you can still see the hacked page through the Wayback Machine.
The hacked page includes the YouTube video – It Might Break Your Pinky Heart – the famous music video by Malaysian singer-songwriter, Namewee, that mocks the Chinese government.
After a video about an old MIT experimental antiviral approach called DRACO (Double-stranded RNA Activated Caspase Oligomerizer), and a reference to Operation Samatha Smith, the hacked page warned Russia over its invasion of Ukraine, with a warning shot in the form of “a small hack”.
However sadly because Putin has burned the bridge and reneged the Minsk dealby prematurely recognising separatist territories as independent,instead of waiting until the conclusion of UN interim administration periodand if they vote overwhelmingly for independence per that plan,Anonymous decides to make good some of its threats byconducting a small hack on a Modbus devicewhich we intend as a warning shot.
The above Modbus deviceisn”t located in countriesfriendly to the US and Taiwan,nor in neutral countriesthat want nothing with these.Instead, it is inplaces like Chinaor somewhere like it.
You can make stupid threats like a spoiled child,but remember thatAnonymous never have restrictionsthat says that onlyhomo sapienscan be part of it.
Sonylearnt the hard way in 2011that a part of Anonymouscan finishwhat a totally different parthad started!
The Modbus device was later confirmed to be a Schneider Electric Modicon M251 logic controller located in Russia.
Anonymous Will Formally Attack Russia Over Ukraine Invasion!
According to Taiwan News, which reached out to Anonymous, their representative said that they were previously “playing nice and not give them an excuse to start a war“, but now that missiles had been fired on Ukraine, “we are taking off the gloves altogether.”
That representative also said, “Anonymous will formally attack Russian websites or devices later” in retaliation for Russia’s invasion of Ukraine.
The Anonymous threat on the Chinese Culture website ended with its signature quote in English, Russian and Chinese :
We are Anonymous We are legion We do not forgive We do not forget Expect us! Мы анонимы Мы легион Мы не прощаем мы не забываем Ждите нас! 我们是匿名者 我们是军团 我们不原谅 我们不会忘记 期待我们
Anonymous did not explicitly say why they are targeting China over Russia’s invasion of Ukraine, but it seems obvious that they believe that China is partly responsible for Russia’s military action.
Perhaps they felt that indirect support by the Chinese, as well as their propaganda effort, gave Russia some leeway and economic support in attacking Ukraine.
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Please watch out for the Herbal Visual Tea scam, which claims to cure glaucoma, cataract and many other diseases of the eye!
Find out why this Herbal Visual Team is just a scam, and warn your family and friends!
Scam Alert : Herbal Visual Tea By Li Tianfa / Tianfa Lee!
The Malaysian Society of Ophthalmology (MSO) is warning people again about fake Facebook pages using their photos
Take a look at a selection of fake Facebook pages that the Malaysian Society of Ophthalmology (MSO) identified and shared on their Facebook page.
Why Herbal Visual Tea For Glaucoma / Cataract Is A Scam!
All these fake Facebook pages appear to promote the Herbal Visual Tea by Li Tianfa, who also goes by the name Tianfa Lee.
So why is this Herbal Visual Tea a scam? Here are the facts…
Fact #1 : Malaysian Society of Ophthalmology Warned About This Scam
On 5 January 2021, the Malaysian Society of Ophthalmology reported these scam posts to the police, Facebook and MCMC.
The Malaysian Society of Ophthalmology has been made aware of malicious scammers who have cut and pasted our committee members and other members photos to be used to promote dubious fake eye products or services. We have reported these posts to the Police , Facebook and the Malaysian Communications and Multimedia Commission (MCMC) . Please do not respond to these scammers .
That didn’t stop these scammers, who continued to create new fake Facebook pages to promote Herbal Visual Tea.
On 21 May 2021, MSO again warned about these scammers.
The Malaysian Society of Ophthalmology (MSO) strongly condemns the action of certain irresponsible parties who misuse official images from our Society, seemingly endorsing certain health products of dubious benefits. The health claims are callous, misleading and without any sound evidence.
The public is advised against purchasing these products of unknown entity. Existing patients with eye conditions should always consult their eye doctor before stopping their existing medications or trying these alternative treatments.
The Society appreciates those who have notified us of these ads. Please help us to report these ads to Facebook so that we can stop others from being duped into buying these products.
And on 23 September 2021, MSO yet again issued another warning about these scammers.
Fact #2 : Those Fancy Associations Do NOT Exist!
This Li Tianfa / Tianfa Lee claims to have a TON of titles, but if you check them online, these organisations do not really exist!
International Exchange Center for Traditional Complementary Medicine : Does Not Exist!
Academic Association of Ophthalmology of Malaysian Hospital of Traditional Chinese Medicine : Does Not Exist!
Malaysia Association of Chinese Medicine : Does Not Exist!
Professional Chinese Acupuncture Association of Malaysia : Does Not Exist!
Indy International University, Malaysia : Does Not Exist!
Miaofa Traditional Chinese Medicine Hospital : Does Not Exist!
There is a Center for International Exchange of Traditional Chinese Medicine, but he is not listed amongst its many consultants and lecturers.
Malaysian Chinese Medical Association exists, but he is not even in its committee, never mind one of its NINE Vice Presidents!
INTI International University exists, but he does not appear to be in their faculty list.
There is a Miao Fa TCM 妙法中醫 store, but it is a traditional Chinese medicine store, not a hospital!
Fact #3 : Dr. Li Tianfa Called Herbal Visual Tea A Scam!
Here is the kicker – Dr. Li Tianfa is the owner of Miao Fa TCM, and he declared that the Herbal Visual Tea is a SCAM!
Clarification! Clarification! Clarification!
Scammers are misusing my identity!
I, Dr. Li Tianfa would like to clarify, and solemnly declare that this Herbal Visual Tea is not my product!!!
Please don’t be! fooled!!
Our Facebook page is miaofa tcm!!!
So please do NOT blame Dr. Li Tianfa. He appears to be an innocent victim of these scammers, just like all those who were fooled into purchasing the Herbal Visual Tea.
Fact #4 : There Is No Proof This Tea Cures Anything
The Herbal Visual Tea consists of common ingredients like longan, chrysanthemum, honeysuckle, cassia seed, wolfberry, Galli gigeriae endothelium corneum, black sesame and mulberry.
Pretty much ingredients you can buy at any traditional Chinese medicine store!
There is simply NO EVIDENCE that such a concoction can cure glaucoma, cataracts, macular degeneration, optic atrophy, fundus lesions, retinal detachment, vitreous body turbidity, floaters, presbyopia, astigmatism, hyperopia, night blindness and more that the scammers are claiming!
This Visual Herbal Tea is nothing more than a SCAM! Please warn your family and friends!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Please watch out for the Nestle 2022 Anniversary phishing scam!
Find out why it is just aSCAM, and WARN your family and friends!
Nestle 2022 Anniversary Phishing Scam Alert!
People are now sharing the Nestle 2022 Anniversary message on WhatsApp (translated into English) :
CONGRATULATIONS!
Your family has been chosen to receive a lucky drag for the Nestle 2022 Anniversary at the Nestle office.
This contest has been approved by the Malaysian court / police, with the cooperation of Bank Negera Malaysia (BNM).
The link attached to the a website with the following instructions :
Winners must keep the PIN-CEK number as evidence for winner verification and prize collection
There are two ways to submit the contest form – through WhatsApp or this website.
The contest form must be completed with your details. Incomplete forms will be rejected by the sponsor without notice.
Every valid application will be shortlisted. There is no limit to the number of applications.
First Prize Winner : RM10,500
Second Prize Winner : RM9,300
Third Prize Winner : RM8,500
To redeem your prize, just use your WhatsApp to :
a) Fill in the Nestle winner application number
b) Fill in your full name and identity card number
c) Attach a clear picture of your BANK ATM CARD – front and back
d) Go to the nearest ATM machine, and WhatsApp the details above to +60124181128
Nestle 2022 Anniversary Phishing Scam : How Does It Work?
The Nestle 2022 Anniversary phishing scam is DANGEROUS. Please warn your family and friends to AVOID it.
Fact #1 : There Is No Such Nestle Giveaway!
There is no such anniversary giveaway by Nestle Malaysia. There is no reason for Nestle Malaysia to give out so much money.
They are a business, not a charity. They are in the business of selling you products, not giving you money.
Businesses do sponsor giveaway contests, but they are generally low value. Nestle Malaysia, for example, is currently giving away RM30 Shopee vouchers.
Fact #2 : Nestle Would Not Use Free Websites
Nestle is a large multinational company. It would not be using free website services like Wix.
Nestle Malaysia has its own website (https://www.nestle.com.my/) and Facebook page (https://www.facebook.com/Nestle.Malaysia) where they post official contests and promotions.
Always verify if a contest is genuine by visiting the official website / social media page.
Fact #3 : Nestle Would Never Ask For Pictures Of Your ATM Card!
Nestle, and any legitimate brand, would NEVER ask you to send them pictures of your bank ATM card!
Sending the pictures of your ATM card will allow them to clone the card, or trick bank staff into giving the scammers access to your bank account.
NEVER EVER SEND ANYONE PICTURES OF YOUR BANK ATM CARD!
Fact #4 : Nestle Would Never Ask You To Go To An ATM
No legitimate contest would require you to go to an ATM machine to receive money.
NEVER TRUST ANYONE WHO ASKS YOU TO GO TO AN ATM MACHINE.
Fact #5 : Nestle Would Never Ask For Your PIN / TAC
Nestle would never ask you for your ATM card’s PIN or any TAC number you may receive.
Giving out those details is how scammers get access to your bank account.
NEVER GIVE OUT YOUR PIN OR TAC NUMBER!
Fact #6 : This Lets Scammers Withdraw Money From Your Bank Account
I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.
Unfortunately, scammers are counting on our desperation to prey on us, using such anniversary scams.
This particular Nestle 2022 Anniversary Scam is a real danger, because it will allow scammers to gain access to your bank account and withdraw money.
Also watch out for the other anniversary scams that I have covered over the years :
Please WARN your family and friends about these scams!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Did China create this amazing female dancing robot for a dance show in Shanghai?
Watch the viral video for yourself, and find out what the FACTS really are!
Did China Create This Amazing Dancing Robot?
Here is the video that countless people have been sharing on social media and even on YouTube. It is often paired with a short explanation in (broken) English.
Can u believe that this female dancer is robot ? The dance was held in Shanghai n it lasted only 5 minutes but the queue was 4hrs n cost 499 Yuan!
It has surpassed Japan in complexity, and saw its perfect facial expressions. Send this video to everyone to watch, let us enjoy together…
The Truth About This Amazing Female Dancing Robot
The agility and grace of this female dancing robot, and its facial expressions, are incredible.
The less gullible would point out that it is something you would only expect from a real human being, and they would be right.
Fact #1 : That Is A WDSF Competition Video
That was actually a video clip from the 2018 World Dance Sport Federation Championship in Lithuania.
The initials WDSF (World Dance Sport Federation) can be seen, together with the recording date at the upper left corner of the video.
Fact #2 : The Dance Only Lasted A Minute
The dance in the video only lasted just over a minute, even though the accompanying fake message claimed it lasted for 5 minutes.
Fact #3 : They Are Lithuanian Dance Champions
Both dancers are very human. In fact, they are Lithuanian dance champions Ieva Zukauskaite (female), and Evaldas Sodeika (male).
Fact #4 : 499 Yuan Was Old Entry Price To Shanghai Disneyland
The fake story claimed that the ticket to watch this performance costs 499 Yuan – about US$73 / £55 / RM303. That would be ridiculously exorbitant for a short dance.
In truth, that price was “copied” from the two earlier hoaxes (here and here) about robot dancers at the Shanghai Disneyland.
Even that price was not accurate, because 499 Yuan was the cost of an entry ticket to the Shanghai Disneyland when it first opened in February 2016.
Since 6 June 2018, it has been priced at 399 Yuan (off-peak), 575 Yuan (peak) and 665 Yuan (peak holiday).
Why Would Someone Create This Fake Dancing Robot Story?
With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared.
Some believe it’s part of a concerted attempt to burnish China’s image overseas.
Others believe the many fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and their aggressive moves in the South China Sea.
Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.
Please share this fact check with your friends, so they know the truth!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Can hackers use Good Morning videos, pictures and messages to hack your devices, and steal your data?
Find out what is happening, and what the FACTS really are!
Claim : Hackers Are Using Good Morning Messages To Hack You!
This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, keeps going viral on social media and WhatsApp.
It’s a long message, so just skip to the next section for the facts!
Dear friends, please delete all welcome photos and videos in Good Morning format and the like. Read below the article to the end, which will be clear why I ask about it. From now on I will only send personally prepared greetings.
Read it all !!! Send this message urgently to as many friends as you can to stop the invasion.
Olga Nikolaevna Lawyer: Caution:
ATTENTION
For those who like to send Good Morning pictures! Good day! Good evening!
Do not send these “good” messages.
Today, Shanghai China International News sent SOS to all subscribers (this is the third reminder) that experts recommend: please do not send good morning, good night, pictures and videos,.
Reports show that hackers in China designed the images, the video is so beautiful to hide the phishing codes inside them, when everyone sends these messages, the hackers use your devices to steal personal information, such as bank card information and data to crack the phone.
It has been reported that more than 500,000 victims of fraud have already been deceived.
If you want to greet others, write your own message to protect yourself and your family and friends.
Important! Delete all greeting messages and pictures that you have on your phone for your own safety. If someone sent you such a picture, immediately remove it from the device. Malicious code takes time to deploy, so if you act immediately, no harm will be done.
Tell all your friends about this to prevent hacking.
Greet others by writing your own words, and send only images you create. The material you create yourself is completely safe.‼️‼️ ️‼️
Please understand me correctly! All have credit cards attached to their phone. Everyone has a lot of contacts in their phones. You will create a threat not only to yourself, but to all the contacts that you have on your phones, your friends and acquaintances. ‼️ ️‼️ ️‼️
Take this very carefully! This is a harsh reality‼️ ️‼️ ️‼️
Truth : Good Morning Greetings Not Being Used To Hack You!
Many of us get spammed with Good Morning or Good Night messages every day from family and friends.
While they often clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.
Here are the reasons why Good Morning messages are very irritating, but harmless…
Fact #1 : Shanghai China International News Does Not Exist
The news organisation that was claimed to be the source of this warning – Shanghai China International News – does not exist!
Fact #2 : Good Morning Greetings Not Created By Hackers
Hackers (from China or anywhere else) have better things to do than to create these Good Morning pictures and videos.
They are mostly created by websites and social media influencers for people to share and attract new followers.
Fact #3 : No Fraud Involving Good Morning Messages
There has been no known fraud involving Good Morning or even Good Night messages, videos or pictures.
Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case…. because it never happened.
Fact #4 : Image-Based Malware Is Possible, But…
Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.
It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself.
At most, it can be used to hide the malware payload from antivirus scanners, which is pretty clever to be honest…
Fact #5 : Image-Based Malware Requires User Action
In January 2019, cybercriminals created an online advertisement with a script that appears innocuous and would pass any malware check.
However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.
Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.
Such a clever way to bypass malware checks, but even so, this image-based malware requires user action.
You cannot get infected by the Trojan if you practice good “Internet hygiene” by not downloading or installing anything from unknown websites.
Fact #6 : Malicious Code Executes Immediately
If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.
Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.
There is really no reason for malware to wait before it infects your devices. Waiting will only increase the risk of detection.
Whether the malware serves to take over your device, steal your information or encrypt it for ransom, it pays to do it at the first opportunity.
Now that you know the facts, please SHARE this article with your family and friends!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Should you enable the new MySJ Trace feature in MySejahtera, or should you disable it?
Let’s take a look at people’s deepest fears about MySJ Trace, and find out what the facts really are!
MySJ Trace : Should You Enable Or Disable?
MySejahtera just introduced a new MySJ Trace feature, which uses Bluetooth technology to track your close contacts.
The proximity data it collects allows Malaysia Ministry of Health (KKM) to accurately determine if you are a close contact of a COVID-19 positive person.
KKM has been strongly urging people to turn it on, but many people are offering conflicting advice on whether to enable or disable it.
Let’s take at what people are saying, and find out what the facts really are!
Should You Enable MySJ Trace?
There are several good reasons to enable MySJ in MySejahtera :
MySJ Trace allows for more accurate contact tracing. If you test positive for COVID-19, the data it collects lets KKM accurately identify your close contacts, and inform them.
MySJ Trace automatically tracks your close contacts. All you have to do is turn it on, and forget about it.
MySJ Trace removes the need to manually check out from locations, which was tedious and easy to forget.
Those who use MySJ Trace will avoid being wrongly identified as casual or close contacts, due to the inaccuracy of using check-in and check-out times.
MySJ Trace gets more accurate and more useful, when more people use it. So KKM is strongly encouraging everyone to use it.
Plus, when enough people start using it, we will all enjoy an additional benefit :
When enough people use MySJ Trace, we will no longer need to check-in at every location!
MySJ Trace also does not transmit data, unless we consent. In fact, we are only asked to transmit MySJ Trace data if we test positive for COVID-19.
Claim #2 : MySJ Trace Not Useful Because No One Is Using It Verdict : False
Some people are discouraging people from using MySJ Trace because “not many people are using it yet“.
Switching to MySJ Trace immediately helps you by removing the need to check-out of locations. Isn’t that useful?
For healthcare professionals who need to quickly and accurately trace close contacts of infected individuals, MySJ Trace works better when more people use it, but that doesn’t mean it’s completely useless when few people use it.
Claim #3 : Old Check-In, Check-Out System Is More Accurate
Verdict : False
Some people claim that the old method of checking in and out of locations is more accurate than MySJ Trace.
That may be true in the early days, when very few people are using it, but that is no longe true once many of your close contacts are using it.
MySJ Trace not only automatically determines who comes into close contact with you, it also logs how long they are in close contact, and their proximity (distance) to you.
The manual check-in and check-out system is unable to determine time of contact, and distance of contact; and can easily lead to false positives – people wrongly identified as casual or close contacts.
Claim #4 : MySJ Trace Uses A Lot Of Battery Life
Verdict : False
This is a real concern for many people as MySJ Trace requires Bluetooth to be turned on all the time. However, it uses Bluetooth Low Energy technology, which uses very little power.
I had earlier tested MySJ Trace on an old Samsung Galaxy S10 smartphone, and did not notice any noticeable drain on its battery life.
For people who have strong concerns over this aspect, it is possible to temporarily turn off MySJ Trace while you are at home, and only turn it on when you go out.
Claim #5 : Bluetooth Increases Risk Of Hacking
Verdict : Misleading
It is possible for criminals to hack your smartphone using Bluetooth, and it is good cybersecurity practice to turn off wireless connections that you are not using.
However, it is far more difficult to hack you through your Bluetooth connection, than your Wi-Fi connection.
After all, Bluetooth only has a range of 10 metres! The hacker will have to remain in close proximity to hack you.
Claim #6 : Hackers Can Grab Our Personal Information Verdict : False
Some people are claiming that hackers can hack into MySJ Trace and use it to trawl for personal information of people nearby.
That’s nonsense, because MySJ Trace will only record the following information :
Unique User ID (UUID) that is created by the MySejahtera app.
Operating system version (Android or iOS)
Time of contact
Received Signal Strength Indicator (RSSI)
There is no personal information that would be useful to hackers, even if they grab these information.
The UUID, for example, is useless as an identification number without access to the KKM database of MySejahtera users and their personal information.
Claim #7 : MySJ Trace Continuously Uses Internet Data Verdict : False
Some people are falsely claiming that MySJ Trace continuously uses Internet data, which is extremely limited for some users.
That’s not true. MySJ Trace does not require Internet connectivity, except :
when you first download and install MySejahtera,
whenever you update MySejahtera
when you consent to upload your MySJ Trace data to KKM
Since those are all optional, you can do it when you have access to a Wi-Fi network. You can use MySJ Trace without mobile Internet.
I hope that clarifies the reasons why you should enable or disable MySJ Trace. If you have any other questions, please feel free to ask us.
Meanwhile, I hope you can share this article with your family and friends, and encourage them to turn on MySJ Trace.
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Did the US Supreme Court just cancel universal vaccination because the COVID-19 vaccines are unsafe?!
Find out what’s going on, and what the FACTS really are!
Claim : US Supreme Court Just Canceled Universal Vaccination!
Alternative health / news websites are YET AGAIN claiming that the Supreme Court just cancelled universal vaccination in the United States!
Allegedly, Senator Robert F. Kennedy Jr. and a group of scientists filed a lawsuit against Bill Gates, Dr. Fauci and Big Pharma, and they won!
It is a long essay, please SKIP to the next section for the FACTS!
URGENT: Supreme Court Has Canceled Universal Vaccination In The United States
Just Got this:
Has not been in the news anywhere. Looks like we are getting closer to the Final Scene in the movie.
Please ALERT everyone in the family, friends and relatives! BREAKING NEWS !
Supreme Court has canceled universal vaccination In the United States, the Supreme Court has canceled universal vaccination.
Bill Gates, US Chief Infectious Disease Specialist Fauci, and Big Pharma have lost a lawsuit in the US Supreme Court, failing to prove that all of their vaccines over the past 32 years have been safe for the health of citizens!
The lawsuit was filed by a group of scientists led by Senator Kennedy. Robert F. Kennedy Jr .:
“The new COVID vaccine should be avoided at all costs. I urgently draw your attention to important issues related to the next vaccination against Covid-19.
For the first time in the history of vaccination, the so-called mRNA vaccines of the latest generation directly interfere with the patient’s genetic material and therefore alter the individual genetic material, which is genetic manipulation, which was already prohibited and was previously considered a crime.
The coronavirus VACCINE IS NOT A VACCINE! ATTENTION!
What has always been a vaccine? It was always the pathogen itself – a microbe or virus that was killed or attenuated, that is, weakened – and it was introduced into the body in order to produce antibodies. Not even a coronavirus vaccine! It is not that at all! It is part of the newest group of mRNA (mRNA) allegedly “vaccines”. Once inside a human cell, mRNA reprograms normal RNA / DNA, which begins to make another protein.
That is, nothing to do with traditional vaccines! That is, it is an instrument of genetic influence. Genetic bioweapon! That is, they were going to destroy from earthlings, and the survivors will become GMOs! Following the unprecedented mRNA vaccine, the vaccinated will no longer be able to treat the symptoms of the vaccine in an additional way.
Vaccinated people will have to come to terms with the consequences, because they can no longer be cured by simply removing toxins from the human body, as in a person with a genetic defect such as Down syndrome, Klinefelter syndrome, Turner syndrome, genetic heart failure, hemophilia, cystic fibrosis, Rett syndrome, etc. ), because the genetic defect is forever!
This clearly means: if a symptom of vaccination develops after mRNA vaccination, neither I nor any other therapist can help you, because DAMAGE CAUSED BY VACCINATION WILL BE GENETICALLY Irreversible.
Vaccination – Bio-weapons of genocide of the 21st century. Former Pfizer Chief Scientist Mike Yeedon has once again expressed his position that it is too late now to save those who have been injected with a substance publicly called “the Covid-19 vaccine.” He encourages those who have not yet received the lethal injection to fight for their lives, those around them and the lives of their children.
The internationally renowned immunologist goes on to describe a process that he says will kill the vast majority of people: “Immediately after the first vaccination, about 0.8% of people die within two weeks. The average life expectancy of survivors will be a maximum of two years, but it also decreases with each new “injection”.
” Additional vaccines are still being developed to cause deterioration in certain organs, including the heart, lungs and brain. After two decades at Pfizer, Professor Yedon was familiar with the functions and research and development goals of pharmaceutical giant Pfizer, and states that the ultimate goal of the current “vaccination” regime can only be a massive demographic event that will make all world wars put together, like Mickey’s staging Mouse.
“Billions of people have already been sentenced to certain, inevitable and painful death. Anyone who receives the injection will die prematurely, and three years is a generous estimate of how long they can survive.”
Truth : US Supreme Court Did Not Cancel Universal Vaccination!
It’s 2022, and yet again, the US Supreme Court just “cancelled” universal vaccination for the 4th or 5th time?
Just like COVID-19 variants, alternative health / news websites keep regurgitating this fake story for page views.
Let me repeat this yet again – this is FAKE NEWS!
Let’s break down the individual claims, and tell you what the FACTS really are :
Claim : Supreme Court canceled universal vaccination in the United States Verdict : False
This claim is completely false, because the United States never mandated universal vaccination in the first place!
There is, therefore, no universal vaccination for the Supreme Court to overturn or cancel.
The government continues to have broad authority to make a vaccine mandatory during a public health crisis, as decided by the Supreme Court in their 1905 decision in Jacobson v. Massachusetts.
In 1922, the Supreme Court “settled that it is within the police power of a state to provide for compulsory vaccination” in their unanimous Zucht v. King decision.
However, compulsory or mandatory vaccination is quite different from universal vaccination.
But that Supreme Court case had nothing to do with pharmaceutical companies, Bill Gates or even Dr. Fauci.
In that case, the Supreme Court ruled that the State of New York cannot bar people from gathering in churches and synagogues during the COVID-19 pandemic.
It was a ruling against New York’s lockdown measures, not vaccines.
I should also point out that all nine justices on the US Supreme Court were fully vaccinated by 5 May 2021, as confirmed by Supreme Court spokeswoman Kathleen Arberg.
Bill Gates, NIH Director Dr. Francis Collins and NIAID Director Dr. Anthony Fauci, May 2016, Photo Credit : Bill Branson
Claim : Robert F. Kennedy Jr. Is A Senator Verdict : False
Robert F. Kennedy Jr. is not, and has never been, a US Senator.
The writer probably confused him with his illustrious father, Senator Robert F. Kennedy, who was assassinated in 1968.
Claim : Robert F. Kennedy Jr. Filed Supreme Court Lawsuit Verdict : False
Robert F. Kennedy Jr. never filed any lawsuit that was brought before the US Supreme Court.
In July 2019, he filed a lawsuit against the state of New York, to overturn a new state law that bars parents from refusing to vaccinate their children on religious grounds.
His family actually spoke out AGAINST him, calling him “an outlier in the Kennedy family“, and pointing out that his uncle President John F. Kennedy and his father, Robert F. Kennedy, both promoted vaccinations to stamp out preventable diseases.
He lost that lawsuit on 9 December 2019, after the New York state law was ruled constitutional.
That lawsuit was over the measles outbreak, and happened before the world first became aware of COVID-19 on 31 December 2019.
So it had NOTHING to do with COVID-19 or COVID-19 vaccines.
It is physically impossible for vaccine mRNA to penetrate the cell nucleus, so it cannot possibly change the cell’s DNA.
The mRNA can only enter the cell cytoplasm, where it is taken up by the ribosomes to create the spike protein.
Vaccines based on the viral vector technology are the ones that enter the cell nucleus, but even that only affects a small number of cells, and does not become part of our DNA.
Vaccines do NOT integrate with our DNA. Vaccines will NOT turn us into GMOs (Genetically Modified Organisms).
The mRNA instructions in an mRNA vaccine are automatically destroyed by the cell after use. Therefore, they can only exist for a short period of time.
As these mRNA instructions do NOT enter the cell nucleus or combine with our DNA, they cannot possibly cause “irreversible genetic changes”.
Claim : Genetic Engineering Is A Crime
Verdict : False
Genetic engineering is not a crime in any country. However, countries may set limits on what is permissible.
For example, the United States allows the genetic modification of human embryos for research purposes, but forbids its implantation without FDA’s approval.
Genetic engineering is being used to develop cures for diseases like :
acute and chronic lymphocytic leukaemia
multiple myeloma
various muscular dystrophies
cystic fibrosis
cancers
There have already been a few approved gene therapies :
2003 : Gendicine was approved in China for certain cancers
2011 : Neovasculgen was approved in Russian for peripheral artery disease
2012 : Glybera was approved in the US and the US for lipoprotein lipase deficiency
Claim : mRNA Vaccine Is Not A Vaccine Verdict : False
A vaccine is simply any biological preparation that gives your body an active, acquired immunity to a particular infectious disease.
The mRNA vaccine is a vaccine, even though it does not use the dead or attenuated (weakened) virus to provide the protection.
It works quite similarly to a viral vector vaccine, in that they both use our cells to create the SARS-CoV-2 spike protein to trigger our body’s immune system.
Think of mRNA vaccines as instructions for your cells to make “enemy soldier puppets” for your immune system to train against.
Claim : COVID-19 Vaccines Cause Genetic Defects Verdict : False
This is complete nonsense. COVID-19 vaccines do not cause genetic defects. Genetic defects are inherited, and cannot be introduced through a vaccine.
Genetic defects are also not caused by the inability to excrete toxins, which our liver and kidneys do every single day!
Vaccines also do not prevent the human body from excreting toxins. If that actually happened, vaccinated people would die within days… which obviously, did not happen.
Claim : Vaccinated People Will Die Verdict : False
The claim by Michael Yeadon that 0.8% of people will die within 2 weeks of the first vaccination, and the rest will die within 2 years, is absolute nonsense.
Billions of people globally have been vaccinated against COVID-19, and there is no evidence of millions of people dying from the vaccines within two weeks of their first vaccination.
Frankly, if that’s true – they wouldn’t be alive to receive their second and third vaccinations, as billions of people have done.
Now that you know that this is yet another example of anti-vaccination FAKE NEWS, please SHARE this fact check with your family and friends.
Help stop the pandemic, by vaccinating against COVID-19!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
People are claiming that the government can use it to track your movements 24/7. Here is one example :
so the govt can trace our exact location at any given moment. great.
Though I guess there is probably several other apps or with the telcos help that they can already do exactly that.
Although surprisingly the police have been totally unable to locate the ex husband of Indira Gandhi or her children that the ex husband abducted, despite the court ordering the police to do so.
That’s really a typical response to any new MySejahtera feature – the government is introducing it to snoop on us. Our privacy is gone! They will know where we are!
Truth :No One Can Use MySJ Trace To Track You 24/7
The truth is – this is yet another example of FAKE NEWS being shared on WhatsApp, and here are the reasons why it’s not possible for anyone to use it to track you 24/7…
Fact #1 : MySJ Trace Only Tracks Your Proximity
MySJ Trace does not actually detect your location, which is why you still need to check into locations manually.
It only detects and logs the Bluetooth signals of nearby smartphones with MySJ Trace enabled, to determine how close they are and how long they remain in proximity.
MySJ Trace also broadcasts itself to nearby devices, so that they can log its presence, distance and length of contact.
Fact #2 : MySJ Trace Does Not Collect Location Data
MySJ Trace does not collect geolocation data, only these data:
Unique User ID (UUID) that is created by the MySejahtera app.
Frankly, most of us are not that interesting to the government. They are not interested in where you live or travel to, what you eat or buy, or even who you are sleeping with.
All that data is interesting and useful to corporations, but not the Malaysian government. Please remember – you are living in Malaysia, not China or North Korea.
Why would the government want to know where you are, or where you have gone, or who you have met?
Fact #7 : There Are Easier Ways To Find You…
Finally, the “fear” of the government using MySJ Trace to track where you are at all times is frankly, ludicrous because there are far easier ways to do it.
The truth is – our geolocation data is readily available to your mobile service provider, as well as cloud and social media service providers (Google, Facebook, Instagram, WhatsApp, etc.)
If the government really wants to know where you are, they can simply get a court order to force your mobile service provider to tell them where you are right now.
They don’t have to rely on an opt-in feature in the MySejahtera app, and wait until you submit your own proximity data…
Now that you know the facts, please TURN ON MySJ Trace, to improve contact tracing!
And please SHARE this fact check with your family and friends!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Now, let me show you how to spot these scams next time!
If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!
Warning Sign #1 : Bad Grammar
Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.
This scammer even got the spelling of the brand wrong! It’s Touch ‘n Go, not Touch n’Go.
Proper contests or events sponsored by major brands like TnG eWallet will have a PR or marketing person who will vet the text before allowing it to be posted.
Warning Sign #2 : Offering You Free Money Or Gifts
Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!
Touch ‘n Go isn’t going to give you so much FREE money, just because it’s their anniversary.
They are a corporation whose business is to make money, not a charity to give you free money.
Warning Sign #3 : Not Using The Real Domain
A genuine TNG eWallet campaign would use their real domain – www.touchngo.com.my or www.tngdigital.com.my, not di47823.shop as shown in the scam post above.
Or they would run it off the official TnG eWallet page on Facebook – www.facebook.com/touchngoewallet/.
If you see nonsensical domains like childrerdg.xyz, uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!
Warning Sign #4 : Asking You To Forward The Offer
No matter how many times you “try” this scam, you will ALWAYS win the RM 2000 “prize”.
If you don’t find that odd, you should know that no brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.
Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!
Warning Sign #5 : Asking You To Download + Register An App
If you click through and joined the fake survey scam, you may eventually be asked to download and register for an app.
That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.
Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Just days after going down for SIX HOURS, Facebook, Instagram, Messenger and Workplace went down AGAIN!
Find out what happened!
Facebook, Instagram, Messenger + Workplace Down Again!
Just days after all of Facebook’s services went down for six hours, Facebook, Instagram, Messenger and Workplace went down AGAIN!
At around 3:22 AM on 9 October 2021, they went down again… with people reporting that they were unable to log into their accounts, or send messages.
We’re aware that some people are having trouble accessing our apps and products. We’re working to get things back to normal as quickly as possible and we apologize for any inconvenience.
Fortunately, this time it didn’t take down WhatsApp and it took their engineering team just under 2 hours to get those Facebook services restored.
We’re so sorry if you weren’t able to access our products during the last couple of hours. We know how much you depend on us to communicate with one another. We fixed the issue — thanks again for your patience this week.
Why Did Facebook, Instagram, Messenger + Workplace Go Down Again!
Again, Facebook blamed another faulty “configuration change” for this downtime, but did not announce any details on what actually happened.
But coming right after an extraordinarily long downtime just days earlier and public testimony by Facebook whistleblower Frances Haugen, this new downtime may be shorter but is no less grievous.
It will feed growing opinion that Facebook has too much services under its control, and it’s dangerous and even folly to let a single company control so many social networks and communication services.
Regulators will no doubt be spurred by this new incident to look at breaking up Facebook.
EU antitrust chief Margrethe Vestager said that the major Facebook outage highlighted the danger of relying on just a few big players, underscoring “the need for more rivals”.
Even Russia jumped into the fray, stating that Russia was right to develop its own Internet platforms and social networks.
Russian Foreign Ministry spokesperson Maria Zakharova said that the recent 6-hour outage of Facebook services “answers the question of whether we need our own social networks and Internet platforms“.
We will be looking forward to Facebook Engineering’s explanation of what happened, and whether it involved cutting through doors to get to their servers…
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Was Facebook taken down by a 13 year-old Chinese hacker?
Take a look at the viral claim, and find out what the FACTS really are!
Claim : Facebook Was Taken Down By 13 Year-Old Chinese Hacker!
On 4 October 2021, Facebook and ALL of its messaging and social media platformswent downfor about six hours, including Messenger, WhatsApp and Instagram!
Several websites, as well as people on Twitter and Facebook started claiming that Facebook was taken down by a 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Jiso / Sun Ji Soo.
There are quite a number of these claims, so just SKIP to the next section for the facts!
International media claimed that “China” was behind the suspension of social media services in the world.
According to Reuters, a Chinese hacker named “Sun Jisu” is responsible for stopping the services of “Facebook”, “WhatsApp” and Instagram, and added that the Chinese hackers are only 13 years old.
The Chinese hacker “Sun Ji Su” has topped the famous search engines and Twitter platforms during the past minutes, after disabling WhatsApp, Instagram and Facebook today 2021 in all countries of the world, amid questions among activists about the details of this information.
The Chinese hacker who disrupted Facebook, WhatsApp and Instagram around the world. The 13-year-old boy, Sun Jisu, who hacked the three sites and also caused Facebook employees to be prevented from entering the headquarters of the global institution after disabling the electronic portals and caused an economic loss estimated at billions dollars around the world.
Reuters: A 13-year-old Chinese hacker named Sun Jiso has stopped Facebook, WhatsApp and Instagram services.
The value of Facebook shares has dropped significantly due to the disruption of the global network of Instagram and WhatsApp.
#NewYorkTimes: The Facebook company refused the cyber attacks on behalf of a 13, Chinese hacker. It is not clear what the problem is with Facebook, Whatsapp, and Instagram. The Facebook company claims that we repair them soon.
Truth : Facebook Was Not Taken Down By 13 Year-Old Chinese Hacker!
The story of a 13 year-old Chinese hacker taking down Facebook is just fake news created by fake news / clickbait websites to go viral and get money through ads.
Here are the reasons why…
Fact #1 : International Media Did Not Blame China
On one blamed China for the bizarre 6-hour downtime of Facebook, WhatsApp, Instagram and Messenger.
The international media referred to cybersecurity specialists who pointed at DNS failure as the most likely cause, not a state actor like China.
Clickbait / fake news websites intentionally added that false claim to “trigger” Chinese netizens and Sinophiles to share their fake news.
Fact #2 : Reuters + NYT Did Not Report On Any Chinese Hacker
Reuters did not report that a 13 year-old Chinese hacker called Sun Jisu was responsible for the bringing down Facebook, WhatsApp, Instagram and Messenger.
Neither did the New York Times write about a 13 year old hacker attacking Facebook.
These are complete lies that are easily verified with a quick check on the Reuters and New York Times websites.
Fact #3 : 13 Year-Old Sun Jisu / Sun Jiso Does Not Exist
There is no 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Ji So / Sun Ji Soo. He does NOT exist.
In addition, that is a Korean name, not Chinese – a mistake that a non-Asian person would make.
Fact #4 : That Was An Old Picture Of Wang Zhengyang
The fake news websites used a picture of Chinese hacking prodigy, Wang Zhengyang, speaking at the 2014 Chinese Internet Security Conference.
Wang Zhengyang was 13 year-old at that time, and would be 20 years old this year – 2021. Here are two more pictures of him speaking at that event.
Wang Zhengyang at 2014 Chinese Internet Security Conference
Fact #5 : Facebook Services Were Brought Down By Configuration Changes
Facebook services were not brought down by a hacker, but configuration changes their own engineering team initiated internally.
Facebook’s Vice-President of Infrastructure, Santosh Janardhan, confirmed that “configuration changes” on their “backbone routers” caused the 6-hour long failure.
Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication. This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.
Fact #6 : Access Problems Were Caused By Same Servers
Facebook run their internal systems through the same servers, so they became inaccessible when those servers were taken offline.
This included security systems that controlled the fob door locks, with a New York Times reporter tweeting that Facebook staff were unable to gain access to an unspecified office using their keycards.
However, many Facebook staff are working from home due to COVID-19 precautions, so this was only a big problem for engineers trying to gain access to the Facebook data centre in Santa Clara, California.
At no time was this security issue caused by a hacker. It was due to the same servers that went offline.
Now that you know the truth, please SHARE this fact check with your family and friends!
Also, please STOP SHARING fake stories created by fake news / clickbait websites!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Did the 13 year-old Chinese hacker, Sun Jisu, hack Facebook, WhatsApp and Instagram, causing them to fail for more than 6 hours?
Take a look at the new viral claim, and find out what the FACTS really are!
Claim : 13 Year-Old Sun Jisu Hacked Facebook, WhatsApp, Instagram!
On 4 October 2021, Facebook and ALL of its messaging and social media platformswent downfor about six hours, including Messenger, WhatsApp and Instagram!
Some websites and people on Twitter and Facebook started claiming that the failure was due to a 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Jiso / Sun Ji Soo.
There are quite a number of these claims, so just SKIP to the next section for the facts!
International media claimed that “China” was behind the suspension of social media services in the world.
According to Reuters, a Chinese hacker named “Sun Jisu” is responsible for stopping the services of “Facebook”, “WhatsApp” and Instagram, and added that the Chinese hackers are only 13 years old.
The Chinese hacker “Sun Ji Su” has topped the famous search engines and Twitter platforms during the past minutes, after disabling WhatsApp, Instagram and Facebook today 2021 in all countries of the world, amid questions among activists about the details of this information.
The Chinese hacker who disrupted Facebook, WhatsApp and Instagram around the world. The 13-year-old boy, Sun Jisu, who hacked the three sites and also caused Facebook employees to be prevented from entering the headquarters of the global institution after disabling the electronic portals and caused an economic loss estimated at billions dollars around the world.
Reuters: A 13-year-old Chinese hacker named Sun Jiso has stopped Facebook, WhatsApp and Instagram services.
The value of Facebook shares has dropped significantly due to the disruption of the global network of Instagram and WhatsApp.
#NewYorkTimes: The Facebook company refused the cyber attacks on behalf of a 13, Chinese hacker. It is not clear what the problem is with Facebook, Whatsapp, and Instagram. The Facebook company claims that we repair them soon.
Fact #2 : Reuters + NYT Did Not Report On Any Chinese Hacker
Reuters did not report that a 13 year-old Chinese hacker called Sun Jisu was responsible for the bringing down Facebook, WhatsApp, Instagram and Messenger.
Neither did the New York Times write about a 13 year old hacker attacking Facebook.
These are complete lies that are easily verified with a quick check on the Reuters and New York Times websites.
Fact #3 : 13 Year-Old Sun Jisu / Sun Ji Soo Does Not Exist
There is no 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Ji So / Sun Ji Soo. He does NOT exist.
In addition, Sun Jisu / Sun Ji Soo is a Korean name, not Chinese. This is a mistake that a non-Asian person would make.
Fact #4 : That Was An Old Picture Of Wang Zhengyang
The fake news websites used a picture of Chinese hacking prodigy, Wang Zhengyang, speaking at the 2014 Chinese Internet Security Conference.
Wang Zhengyang was 13 year-old at that time, and would be 20 years old this year – 2021. Here are two more pictures of him speaking at that event.
Wang Zhengyang at 2014 Chinese Internet Security Conference
Fact #5 : Facebook Services Were Brought Down By Configuration Changes
Facebook services were not brought down by a hacker, but configuration changes their own engineering team initiated internally.
Facebook’s Vice-President of Infrastructure, Santosh Janardhan, confirmed that “configuration changes” on their “backbone routers” caused the 6-hour long failure.
Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication. This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.
He also asserted that it was a faulty configuration change, and no user data was compromised.
Our services are now back online and we’re actively working to fully return them to regular operations. We want to make clear at this time we believe the root cause of this outage was a faulty configuration change. We also have no evidence that user data was compromised as a result of this downtime.
Fact #6 : Access Problems Were Caused By Same Servers
Facebook run their internal systems through the same servers, so they became inaccessible when those servers were taken offline.
This included security systems that controlled the fob door locks, with a New York Times reporter tweeting that Facebook staff were unable to gain access to an unspecified office using their keycards.
However, many Facebook staff are working from home due to COVID-19 precautions, so this was only a big problem for engineers trying to gain access to the Facebook data centre in Santa Clara, California.
At no time was this security issue caused by a hacker. It was due to the same servers that went offline.
Now that you know the truth, please SHARE this fact check with your family and friends!
Also, please STOP SHARING fake stories created by fake news / clickbait websites!
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.