expr:class='"loading" + data:blog.mobileClass'>

Wednesday, 19 November 2014

Naye Ufaq Digest November 2014

Free download Urdu Books, read online Pakistani monthly Urdu Digest / Magazine / Novel.
Naye Ufaq Digest November 2014 complete free download in pdf.
Naye Ufaq Digest November 2014
File size: 29.10 MB --- Pages: 288 --- PDF
اگر آپ کو ناول، ڈائجسٹ یا کسی کتاب کی ضرورت ھے یا ویب سائٹ میں کسی قسم کی کوئی پرابلم ھے تو یہاں کلک کریں۔
Blogger Tricks

Sachi Kahaniyan Digest November 2014

Free download Urdu Books, read online Pakistani monthly Urdu Digest / Magazine / Novel.
Sachi Kahaniyan Digest November 2014 complete free download in pdf.
Sachi Kahaniyan Digest November 2014
File size: 25.60 MB --- Pages: 249 --- PDF
اگر آپ کو ناول، ڈائجسٹ یا کسی کتاب کی ضرورت ھے یا ویب سائٹ میں کسی قسم کی کوئی پرابلم ھے تو یہاں کلک کریں۔

Rohani Digest November 2014

Free download Urdu Books, read online Pakistani monthly Urdu Digest / Magazine / Novel.
Rohani Digest November 2014 complete free download in pdf.
Rohani Digest November 2014
File size:42 MB --- Pages: 207 --- PDF
اگر آپ کو ناول، ڈائجسٹ یا کسی کتاب کی ضرورت ھے یا ویب سائٹ میں کسی قسم کی کوئی پرابلم ھے تو یہاں کلک کریں۔

Tuesday, 18 November 2014

Closed Bitcoin Exchange Said Bitcoins Are Not Missing

The operator of the now defunct Bitcoin exchange named Moolah announced that he was working on returning money to his customers. According to his words, he has already processed about $900,000 in refunds. The CEO of Moolah, named Ryan Kennedy, ran the service under the name Alex Green. However, the service suddenly declared bankruptcy in mid-October, and Kennedy claims his former customers and investors aren’t giving him a fair hearing.

He said that most of Moolah customers could successfully withdraw their money from the platform. Kennedy pointed out that there was only one major 3rd-party creditor, Syscoin, that he was still unable to process a transaction for. Alex Green has made a statement, saying that he kept working on processing withdrawals, auditing the platform, and trying to find out what has happened. He said that contrary to popular belief, he wasn’t missing and hiding.

Until going bankrupt, Moolah was quite a large Bitcoin exchange that allowed its users to convert the cryptocurrency into fiat money and vice versa. Moreover, Moolah dominated the niche, meme-based cryptocurrency Dogecoin via publicity stunts like acting as a sponsor for a Nascar driver and charity donations garnering a thank you video from Will Ferrell.

However, the media raised some questions about the company. For example, a few months ago, the media reports claimed that Moolah had shifted its headquarters several times within less than 6 months. After that, it launched a questionable fundraising effort which was claimed to “may not be in technical compliance” with the securities law of the United States.

Alex Green explained that the currency exchange operated based on legal advice in Switzerland where it was based at the time. As for the CEO, he also had an unusual online persona. The same media reports claimed that he had “zero online footprint”, nobody saw any photos of him, and Green hadn’t even met many of his own employees.

However, it should be noted that in the world of cryptocurrencies, such identities are quite common – even the Bitcoin creator Satoshi Nakamoto himself also had “zero online footprint” before publishing the Bitcoin proposal. As for Alex Green, he revealed his secret voluntarily: he had simply changed his name in an attempt to start his life over and have some peace.

The Pirate Bay Founder Found Guilty in Hacking

Gottfrid Svartholm, one of the Swedish TPB founders, has recently been found guilty of hacking crimes. Svartholm and his 21-year-old accomplice were found by the Danish court to have been involved in obtaining illegal access to the systems operated by IT company CSC. This is considered as the biggest hacking case ever conducted in Denmark.

Gottfrid Svartholm was arrested in Cambodia apartment two years ago, but only now went on trial in Denmark. He and his 21-year-old co-defendant stood accused of hacking computer mainframes operated by American IT giant CSC. Their case turned into the largest of its kind ever in the country.

The prosecution in the case alleged that Gottfrid and his accomplice had launched hacker attacks against CSC in early 2012 and maintained access to its systems for several months. In response, the defense claimed that it was a case of mistaken identity. In other words, they tried to argue that someone else had carried out the crimes by remotely accessing Gottfrid’s machine.

However, the evidence was found by the prosecution that showed discussion between hackers named “Advanced Persistent Terrorist Threat” and “My Evil Twin” (who allegedly were the defendants) on the topic of the security and setup of CSC’s databases and systems.

Gottfrid Svartholm was claiming from the very beginning that his PC, from where the attacks had taken place, had been compromised. Respected security expert Jacob Appelbaum supported this side, providing evidence for the defense not only in this case, but also in Gottfrid’s Swedish trial. Gottfrid’s lawyer announced that her client should be found not guilty after it had been proven that third parties had carried out the crimes.

But the Danish court has made another decision. Both Gottfrid and his accomplice were found guilty of hacking-related offenses concerning CSC. The court found that the confidential data, including police drivers’ license records, social security information and even criminal records, have been illegally accessed by the defendants in 2012. All 3 judges and 4 of 6 jurors returned guilty verdicts. The rest 2 jurors voted to acquit after finding out that the remote access defense could not be ruled out.

After being extradited from Sweden, Svartholm has spent almost a year in Danish jail, while his accomplice has spent there 17 months.

Australian Government Will Bear Expenses for Metadata Retention Bill

The country’s government promised to make “substantial” payments to Australian telcos and ISPs under a new scheme that would require them to store information about their customers’ activities for 2 years.

However, the local communications minister said he couldn’t accurately estimate the cost of mandatory data retention. He also claimed that the companies, not the authorities, were responsible for ensuring the safety of subscriber data.

The minister has recently introduced a bill to parliament that would require “telecommunications service providers to retain for 2 years telecommunications data”, claiming it was necessary for police and security agencies. The Australian Federal Police confirmed that the information called metadata had application in a wide range of investigations, including pursuing unauthorized downloaders and file-sharers.

The suggested legislation will allow the storage of IP addresses assigned to a customer and details of communications, including the time, date, duration, sender or recipient, and phone numbers contacted. The government stressed that the law wouldn’t require to store “the contents or substance of a communication” or users’ web-browsing history.

The minister also said he expected “to make a substantial contribution” to the companies’ implementation and operational costs. However, he noted that the government didn’t have a final figure at the moment.

In the meantime, Labor has indicated it will consider its position, but the Greens have already claimed they are against data retention. They believe that the high costs would likely to be met through higher phone and Internet bills and government taxes.

In the meantime, the attorney general pointed out that law enforcement agencies already could access metadata, but only if telcos were voluntarily storing the data. Changing business practices and technology led to the situation where some metadata was no longer being stored, so the proposed bill was necessary to enhance the Australia’s counter-terrorism and general crime-fighting capabilities.

The chief of the Australian Security Intelligence Organization, when asked whether metadata could be used to target unauthorized downloads, said yes. In the issues of illegal downloads, piracy, cyber crimes and cyber security, the ability of the agencies to investigate them is absolutely pinned to their ability to retrieve and use metadata.

Australian Data Retention Won't Help Prevent Terrorist Attacks

The US lawyer for Edward Snowden has questioned whether the law to retain metadata can improve national security, after Australia introduced the bill to parliament.

Snowden’s lawyer said there was no good evidence that data retention could help national security authorities to prevent terror attacks. He acknowledges that the retention of metadata could help connect the dots after the attack already took place, but pointed at the lack of evidence that mass surveillance can prevent terrorist attacks.

The Australian government introduced the bill that would force phone companies and ISPs to retain users’ metadata (which is a digital footprint left behind when people use their devices) for 2 years. That data would be available to law enforcement agencies.

The country’s communications minister said that the law would not increase the extent to which metadata could be obtained by the authorities. He explained that the bill would rather establish an industry-wide standard to make sure telecommunications companies kept this information for 2 years.

However, both the prime minister and the chief architect of the data retention bill failed to clearly explain what data would and would not be collected under the proposed law when they first floated it. For example, it was claimed at the time that web browsing history wouldn’t be included in data collected. As a result, the tech experts and civil libertarians had to call on the government to release an exposure draft of the legislation, which would clearly define metadata and explain exactly what oversight provisions are expected to minimize the potential for data breaches.

At the same time, it is unclear who would bear the costs of the retention program, but as usual the guesses are that they would be handed down to consumers in the form of a “spied upon tax”.

The Australian government argued that data retention is necessary to protect citizens from terrorist cells and lone wolf attacks. However, public sentiment turned against data retention back in 2013, when a whistleblower Edward Snowden disclosed the extent to which American NSA was monitoring and storing phone and web data.

Although Snowden’s lawyer himself is against data retention, he had to admit that the Australian government has handled the issue well, pointing out that it managed to avoid the veil of secrecy that is normally “deeply corrosive” to public trust.

United Kingdom Launched Next Generation 4G+

The British people will get mobile Internet speeds comparable with South Korea and the United States after EE will have launched next generation 4G+ network.

The new technology, LTE-Advanced, allows devices to connect to two different 4G mobile signals simultaneously, thus doubling the capacity in the densest populated regions. In other words, the use of such network will allow to keep the data network strong even on packed trains, removing the frustrating overcapacity issues as commuters all try to access the worldwide web at the same time.

Vodafone has already announced the start of its LTE-Advanced rollout on 15 October in three major UK cities, doubling capacity for its users.

Everything Everywhere had been trialing the new technology in London’s Tech City in attempt to replace a fixed-line broadband for startups in the region with it. The new technology should allow to deliver data speeds of up to 300Mbps, though in reality speeds are expected to peak at approximately 150Mbps. In the meantime, regular speeds will be around 90Mbps, 5 times faster the average British broadband speed, which is 17.8Mbps according to the UK Internet regulator Ofcom.

Doubling the capacity of the network will allow broadband providers to ensure that every customer can watch video streaming at 5Mbps no matter how busy the network gets. While only owners of compatible devices, including the Samsung Galaxy Note 4 and Galaxy Alpha, will be able to use 4G+, every customer of EE is promised to see their average speeds increase.

It is known that EE has the largest 4G network in the United Kingdom, covering 300 towns and cities and 3/4 of the population and accounting for 6,000,000 subscribers. O2 and Three have not yet confirmed their plans to launch 4G+.

According to statistics, there are 83.1 million mobile phone subscribers in the United Kingdom, and 61% of adults own a smartphone.

The industry observers point out that the new LTE-Advanced technology brings the United Kingdom up to speed with some of the fastest and most connected countries ever, including South Korea, Japan and the United States. In other words, the United Kingdom leapfrogged most of the mobile networks in Europe. It is known that Vodafone Spain rolled out LTE-A in 3 cities in 2014, and Swisscom is going to launch LTE-A in 2015.

American Government Took Offline Music Sharing Services

The Department of Justice and Immigration and Customs Enforcement continue their Operation in Our Sites campaign. It is known that within the recent days, large music sharing websites – RockDizFile.com and RockDizMusic.com – were shut down. Like many other victims of the authorities before, their domains now point to a prominent seizure banner.

It was four and a half years ago that the US authorities launched their campaign to take copyright infringing services offline, dubbed “Operation in Our Sites”. Since then, the campaign has resulted in thousands of domain name seizures and a number of arrests. While most of the websites are linked to counterfeit products, the operation also targeted dozens of “pirate” websites.

Recently, it was a period of relative calm, as no sites were targeted within the last several months. But now it seems that the authorities have restarted their efforts with the closure of two large music websites. Two connected services, RockDizFile.com and RockDizMusic.com, now display familiar banners that claim that it was ICE who took them offline.

In the meantime, Twitter and Facebook pages of both services show no sign of a trouble and have remained silent for days. RockDizMusic website positioned itself as an index of popular new music. The musicians were encouraged to use the online portal to promote their work, but it is known that the website also featured music that was shared without copyright holders’ permission, including pre-release tracks. Its fellow, RockDizFile, featured a more classic file-hosting look, but it was generally used for music because of its 50MB limit. The website offered premium accounts, whose owners were able to add storage space and remove limitations of the file size and bandwidth.

The interesting fact is that both portals had a strong focus on rap and hip-hop music, as well as the previous ICE seizures: RapGodFathers.com, RMX4U.com, OnSmash.com and Dajaz1.com. However, the latter seems to have been seized by mistake, because the copyright lawsuits failed to deliver proof of alleged infringements to the authorities. As a result, the domain was returned to its operators after a long appeal.

Both lawmakers and legal scholars have repeatedly criticized the ICE’s practices in terms of the Operation in Our Sites, both because of that incident and the general lack of due process. However, the authorities decided to continue Operation in Our Sites.

The Immigration and Customs Enforcement claimed that actions under the “Operation in Our Sites” investigate and develop evidence to obtain seizure warrants from federal judges, cooperating with the US Department of Justice to prosecute, convict, and punish people and seize domains, profits, and other property from IP thieves.

In the recent case, it is unknown whether ICE has targeted any of the operators of the seized RockDizFile.com and RockDizMusic.com. It is also unclear whether the authorities have taken down any other websites in a similar way.

Apple Pay is Blocked

It was noticed that some retailers who initially backed Apple and Google pay give up on the idea, while the new partners don’t show up. At the same time, the suggestions are that the US retailers rush to set up their own system instead. Indeed, when Apple introduced Apple Pay a couple months ago, the number of retailers who backed it was impressive, but as the time passed, some major retailers have declined it in favor of a competing option set to launch in 2015.

It is known that Apple Pay was operational at NFC terminals at Rite Aid and CVS – both of them non-Apple Pay partners, but the service was reportedly disabled in the last days.
One of the CVS representatives said that the company disabled NFC payments over the weekend. This would also prevent Google Wallet users from using NFC payments.

The media published a leaked memo, which suggested that the retailers changed their mind and decided to stop working with Apple Pay. Instead, they are now cooperating with a group of large retailers to develop a mobile wallet which can be used to make mobile payments attached to credit cards and bank accounts directly from a mobile device. This service is expected to launch in the first half of 2015.

Industry experts found out that the new payment system mentioned in the alleged leaked memo was a solution suggested by Merchant Customer Exchange. It is dubbed CurrentC. The list of other confirmed major partners in the system includes CVS, Kmart, Sears, Target, Walmart, Best Buy and 7 Eleven – in other words, all mainstream retailers in the United States.

Of course, Apple couldn’t appreciate the scheme which is likely to allow its partners to avoid paying credit card processing fees and reveal them more data about customers. It is clear that this type of information should be kept by the tech giant rather than retailers.

Other Tech Giants Copy Apple’s Cartel Methods

A number of companies, including Oracle, Microsoft and Ask.com have faced accusations of treating their employees in exactly the same way as Apple. For example, Microsoft’s former employees Deserae Ryan and Trent Rau have launched a lawsuit against the company, accusing it, among other things, of entering into anti-solicitation and restricted hiring agreements with other companies without the consent or knowledge of its staff.

Now tech giants are all facing lawsuits claiming that they conspired to restrict hiring of employees. The lawsuits are linked to a memo naming a long list of companies, which allegedly had made arrangements with Google to prevent poaching of employees.

The issue was started as an exhibit in another class action case in the American District Court for the Northern District of California, San Jose division over hiring practices. The tech specialists who filed the lawsuit alleged that a number of companies, including Google, Apple, Intel, Adobe, Intuit, Lucasfilm and Pixar, put each other’s staff off-limits to other firms by using such measures as “do-not-cold-call” lists.

The tech companies mentioned above had to settle similar charges four years ago with the Department of Justice of the United States, while admitting no wrongdoing. At the same time, the companies agreed not to ban cold calling and make any arrangements that would prevent competition for staff.

Four of them ¬– Google, Apple, Adobe and Intel – have recently appealed the District Judge Lucy Koh’s rejection of a proposed settlement of $324.5 million with the tech employees that she found was too little. Three other companies – Intuit, Lucasfilm and Pixar – had earlier settled for approximately $20 million.

Now the story develops further and it looks like former employees file suits against Microsoft, Ask.com and Oracle, asking that the cases be assigned to Judge Koh, because there were similarities with the previous cases against Google, Apple and other tech giants.

On the other hand, the tech firms might try to argue that since the Department of Justice didn’t see it fit to prosecute them before 2010, they must have been legal.

For example, Oracle claimed that it was excluded from all prior lawsuits filed in this matter thanks to the fact that all the parties investigating the problem came to a conclusion there was absolutely no evidence that Oracle was involved. As for Microsoft, the company said that the workers miss the fact that the Department of Justice looked into the same claims five years ago and decided there was no reason to pursue a case against Microsoft

Microsoft Warns about Vulnerability Targeting Taiwan

The tech giant warned about new unpatched software vulnerability affecting almost all Windows computers. The flaw looks very similar to the one used in recent hacker attacks on the Ukrainian government. Now it is being used against Taiwanese targets: the attackers create malicious PowerPoint documents which launch exploit code on target machines when opened. The security experts admit the hackers could have used any Office file, but for some reason those chose PowerPoint.

Cyber intelligence experts warned that another (though similar) flaw was being used in so-called “Sandworm” attacks against Ukraine, the European Union, Nato, French telecom companies and even Polish energy suppliers. In previous cases, Russian hackers were suspected of intrusions.

Security companies believe that the two vulnerabilities are linked and have been exploited in the same way. While investigating the patch for the first flaw, the researchers found out that the fix wasn’t working and the vulnerability could still be exploited. However, there is no evidence that the recent flaw was being used by the same Sandworm hacker crew. The security firm’s sensors had detected an activity indicating the zero-day vulnerability was being used to attack people in Taiwan. They came to a conclusion that the Microsoft’s patch for the Sandworm flaw didn’t work properly and the new vulnerability exploits that.

The researchers have seen a number of samples, one of which probably targeted Taiwan and delivered the Taidoor malware. This type of activity has been attributed to Chinese cyber espionage in the past.

3 Google and 2 McAfee researchers were credited with disclosing the latest flaw to Microsoft. It turned out that the vulnerability targets all supported versions of Windows except Windows Server 2003, originating from a technology called an Object Linking and Embedding (OLE) object – this one is used to share data between several applications. For example, in Microsoft Office this technology is used when parts of a file appear within another file, like when an Excel chart is included in a Word document.

When the victim opens a malicious document, usually received via email, they risked handing over control of their machine to the attackers. The experts point out that this vulnerability can’t directly grant an attacker administrator-level access, but would allow them the same permissions as the victim. Advanced users will notice the “User Access Control” popup that requires consent when a malicious file is opened. In the meantime, Microsoft didn’t disclose when it was going to release a patch for the bug, but the company has included a fix-it solution in its advisory.

So, for now, Internet users are recommended to be careful about opening Office documents received via email, social media or instant messengers from unknown parties. Everyone is also reminded of links from untrusted sources, because those may be used to launch a malicious Office document from the hacker’s website.

British Cryptocurrency Exchange Shut Down, $1.5m Bitcoins Missing

All the cryptocurrency held by Bitcoin exchange has gone missing, after the exchange named Moolah declared bankruptcy. The suggestions are that the cash is in the personal wallet of the company’s founder and CEO. The latter has also gone missing when Moolah went bust.

The CEO of Moolah, known as Alex Green, recently revealed that he was previously named Ryan Kennedy and changed the name by deed poll, trying to start his life over. The matter is that under his previous name, the individual had gained notoriety among such communities as fans of anime and Bitcoin investors for a number of failed business ventures. His ventures included Flirble – a web hosting service which was only functional for 2 months, as well as Lemon, a Bitcoin mining company which shut down last year.

However, this seems to be not his full biography: others also link him to the names Albright, Fletcher and Gentle before he re-emerged in 2014 to start Moolah as Green. The final saga began in the middle of 2014: in July, a rival to the Bitcoin exchange, called Mintpal, became the target of a hack and lost $2m of Bitcoins. Green acquired Mintpal a few weeks later and integrated its 70,000 accounts into Moolah.

However, a few days ago, Alex Green (already under his former name) announced that the parent company of Moolah went insolvent due to a bug in the system which allowed users to arbitrarily double their balances on a whim. At the same time, Green claimed that former users of MintPal didn’t suffer from the exploit and has not been heard from since.

However, even the users who were assured their money was safe already start worrying, because their accounts remain locked. Thanks to the open nature of the Bitcoin ecosystem, they can see exactly where the money went: almost $1.5m of it has flowed into and then out of one specific account, which is believed to belong to Green himself.

Now MintPal users cooperate, trying to figure out where the Bitcoins end up. The case in question reminds many of the digital wild goose chase which ensued after Internet black market Sheep closed down. At the time, its founder disappeared with more than 5,000 Bitcoins, and users managed to trace their money across the network, until finding out that the crook had sold the coins days before.

The questions had been raised about Greens identity before, even though Moolah was a small player in the Bitcoin market. Just a few days before Mintpal had been hacked, the local media accused Alex Green of a litany of questionable business practices. It turned out that nobody outside of Moolah had ever seen Green’s face – the company’s COO once jokingly tweeted a picture of Green: a person wearing a cardboard box on his head. Besides, Moolah’s location repeatedly changed as well. At first, the firm was registered with a Swiss address, but then it was going to move to Ireland, then to England.

Thus far, Alex Green cannot be reached for comments via his known details.

Google Offers Physical USB Security Key

The tech giant has finally announced a physical USB Security Key for two-factor authentication. The key is expected to ensure that users keep their accounts safe from intruders, but it has its own limitations. Users can buy a compatible USB from a third-party supplier and add the Security Key functionality. After doing so, they can start using it when logging in to Google’s services, including Gmail and Google Drive. The key will contain the code required for two-factor authentication, if the latter has been switched on.

Two-factor authentication is a popular method of security protection. It required both a password and an additional data able to verify the identity of the person logging in. Before, Google provided users with the second piece of authentication data by sending the code via text message or the Authenticator app. Now the USB key can be used without any input required from the keyboard.

The company promises that accounts with Security Key enabled will remain secure from hacking (unless hackers manage to steal the plastic key). This method is presented as more secure than using a smartphone, because hackers have infected mobile devices in the past to steal security codes.

The USB key will also make sure that the website the user is on is owned by Google and not by a third party who uses it for a “man-in-a-middle” attack. The Security Key will not transmit its cryptographic signature if some phishing service is trying to pretend a Google login page.

Google explains that instead of typing a code, you can now insert the Security Key into the USB port of your machine and tap it when prompted in Chrome. The company guarantees that the cryptographic signature can’t be phished when you sign into your Google Account using Chrome browser and the Security Key.

As you might have noticed, there is one significant limitation: the USB key only works via the Chrome browser, and people who use other Internet browsers won’t like it. In addition, there’s the need for added hardware – this can also put some people off.

Apparently, this innovation has its own disadvantages: it is another thing to carry around and keep track of, it requires the Chrome browser to work, and it can’t be used on mobile devices as it needs a USB port to work. Perhaps, the target audience for this innovation is non-technical people who don’t use smartphones and apps. Anyway, if this increases the number of people using two-factor authentication, it is a useful thing.
Besides that, Google is also joining and championing a movement called the FIDO (Fast IDentity Online) Alliance. The goal of the latter is to spread the open Universal 2nd Factor (U2F) protocol used by the Security Key across various websites, so people will only require one USB key for all of them.

FIDO Universal Authentication Framework is widely used in payments apps from PayPal, Samsung, AliPay, and others, and with Google now using FIDO U2F, it is clear that a new era has arrived, where users and providers are urged to move beyond single-factor passwords to more secure authentication.

Jailed Vietnam Blogger Deported to US

Blogger Nguyen Van Hai, one of the best-known dissidents in Vietnam, has recently been released from the local prison and deported to the United States. The blogger, known online as Dieu Cay, promised to fight to return to his home country. He was jailed a couple years ago for 12 years for disseminating “anti-state propaganda” in his online publications. Some consider this the trumped-up charges for his critical views on China.

His son said his father was the first to talk about China’s intentions towards Vietnam, but now his words are repeated by everybody, even government leaders. Indeed, the blogger was one of the first to criticize China’s encroaching influence over Vietnam. Perhaps, the US senator John McCain, who is a former prisoner of war in Vietnam himself, has helped secure Hai’s release during a visit to Vietnam a few months ago.

The United States has warmed relations with Vietnam greatly as part of its “Asia pivot” and said that it welcomed the country’s decision to release the blogger, considered a prisoner of conscience. It is known that Hai, a founder of Vietnam’s Club for Free Journalists (an alternative to state-controlled news), has been in and out of detentions over the last 7 years. Hai had to fight against his ill treatment in prison by going on repeated hunger strikes.

It is still not clear just how he has ended up in the US, rather than his home town of Saigon. The US state department claimed it was the blogger’s decision to travel to the US, but Hai himself and his family decline this statement, saying that he was removed suddenly from his prison cell and put on a plane to the US, no prior warning was received.

The blogger could only phone this family briefly while in transit in Hong Kong to tell the news. They are sure he was deported to exile, not released. Hai believes that Vietnam sent him abroad on Washington’s request. He claimed he would fight for his return back to his home country.

In the meantime, the political observers point out that Hai was not the first high-profile dissident to be welcomed in the United States in 2014. This past April, French-trained lawyer Cu Huy Ha Vu, a vocal critic of the ruling Communist party, was released from prison and moved to America as well.

The local activists were happy about Hai’s release, but expressed concern over the conditions of his departure. Human Rights Watch’s Asia division admitted that it was very good news that the blogger is set free, but he should never have been in prison in the first place. They claim that the local authorities severely persecuted Hai for years only because he was brave enough to voice his opinions via the Internet and spread them among the Vietnamese people. As such, the government should not receive applause for forcing the blogger into exile as the price of his freedom.

In the meantime, more than 25 other bloggers are still detained in the country, which gives Vietnam the title of “the world’s3rd biggest prison for netizens”.
For the families who only have a baby girl can now have a baby boy. "Habb e Nareenah" medicine made with pure herbal ingredients. This medicine is have a very short (Only one day) period. Very unique medicine sold worldwide with affordable price. Contact us for free Consultation. . . Read More