Found this at 7am (gmt+3)
https://www.twilio.com/sms/pricing/ug via researching using frontline sms. Not looking so free, even setting up the app to use the phone's sms was either not available for the trail version or not made clear its not free for that function. [After sitting around i finally figured it out! smh!(another 30 mins)].
|Orange||$0.03 per message|
|Warid||$0.065 per message|
|UT Mobile||$0.03 per message|
|Airtel||$0.0542 per message|
|MTN||$0.0542 per message|
Still shocked so $1 gets 18.45 sms to mtn? hmm...
The wireless network that was being run with mesh networking products ran in Accra 2012-2014.
Currently on a little break adjusting to some life changes.
Cloud based network management
Powering Modems, switches and mesh routers.
Machines being converted to linux to run a rdp server on an Ubuntu server.
Later removed all wall unit and replaced the space with chairs for laptop users. removed the
desktops and use them for a printer station to serve the school behind our building. The wires
have all now been cleaned up but we need to get rid of our asbestos roof asap!
The white device is the embeded unit that runs the mesh node software for UBNT
antennas on the WiFi N 2.4GHz band.
Printer station serving GAKU Secondary School KPOGAS junction area, Accra, Ghana.
PV charged bluetooth headset (below)
Was using a VM with FreeNAS (visit) but would love to work with these types of networked
NAS servers this one below had 2TB of storage with 4 750GB RAID drives. <3
The average web user today is not a network administrator nor are they savy about network security issues on the web. This however is not enough to stop millions of users from getting on-line daily to communicate with one another via sms, email, social media and digital calls.
"National and international laws have yet to catch up with the evolving need for privacy that comes with new technology. Several governments have also chosen to use malware to engage in extra-legal spying or system sabotage for dissidents or non-citizens, all in the name of “national security.”
Respect for individuals' autonomy, anonymous speech, and the right to free association must be balanced against legitimate concerns like law enforcement. National governments must put legal checks in place to prevent abuse of state powers, and international bodies need to consider how a changing technological environment shapes security agencies’ best practices." - EFF.org
Internet.org presents itself as a facilitating tool for the masses who want to get on-line at affordable prices in less developed areas.
"We’re also giving people more choice over the free basic services they can use.
Our goal with Internet.org is to work with as many developers and entrepreneurs as possible to extend the benefits of connectivity to diverse, local communities.
To do this, we’re going to offer services through Internet.org in a way that’s more transparent and inclusive.
At the core of our efforts with Internet.org are non-exclusive partnerships with mobile operators to offer free basic internet services to people through Internet.org.
This is a set of basic websites and services to introduce people to the value of the internet, and that we hope add value to their lives.
These websites are very simple and data efficient, so operators can offer these for free in an economically sustainable way.
Websites do not pay to be included, and operators don’t charge developers for the data people use for their services." - internet.org (6-24-2015)
In countries like Uganda social media hacks are increasingly being used to embarrass high profile individuals by leaking pictures or videos that were meant to private. However a broader search on-line will show that is a fast growing problem worldwide.
As technology evolves and personal computers get more effective at deploying simpler tools that can perform sophisticated hacks these capabilities that used to be the tool of governments are increasingly being used by amateurs to wreck havoc on the common people.
Transport Layer Encryption (TLS is a critical tool for protecting the data privacy of users on the web
Page 1 of 3