Record-breaking 1 Tbs speed achieved over 5G mobile connection.

New Generations usually bring new base technologies, more network capacity for more data per user, and high speed Internet service, for which Internet service providers usually advertise. However, it is believed that the fifth generation (5G Technology) of mobile network will be beyond our thoughts.

1TBPS OVER 5G
Security researchers from the University of Surrey have just achieved Record-Breaking data speeds during a recent test of 5G wireless data connections, achieving an incredible One Terabit per second (1Tbps) speed – many thousands of times faster than the existing 4G connections.

After 4G, 5G is the next generation of mobile communication technology that aims at offering far greater capacity and be faster, more energy-efficient and more cost-effective than anything that has seen before. The boffins say 5G will be different – very different.

The 5G test was conducted at the university's 5G Innovation Centre (5GIC), which was founded by a host of telecoms industry partners including Huawei, Fujitsu, Samsung, Vodafone, EE, Aircom, BT, Telefonica, Aeroflex, BBC and Rohde & Schwarz.

DOWNLOAD 100 MOVIES IN JUST 3 SECONDS
1Tbps of speeds are far faster than previously announced 5G tests – Samsung’s 7.5 gigabits per second (Gbps) record, which was 30 times faster than 4G LTE (Long-Term Evolution) speed and just less than 1% of the Surrey team's speed.

    "We have developed 10 more breakthrough technologies and one of them means we can exceed 1Tbps wirelessly. This is the same capacity as fiber optics but we are doing it wirelessly," 5GIC director Prof Rahim Tafazolli told the news website V3.

With 1Tbps, it is possible to download a file 100 times the size of a feature film in just three seconds. This incredible speed is over 65,000 times faster than the current 4G download speeds.

5G EXPECTED TO ROLL OUT BY 2020
The test was carried out over a distance of 100 meters using equipment built at the university. The head of the 5GIC said he planned to demonstrate the technology to the public in 2018. It’s believed that 5G could possibly be available in the UK by 2020.

UK communications regulator Ofcom has been supportive of efforts to get 5G to the public. Ofcom previously said it expected 5G mobile should be able to deliver speeds between 10 and 50Gbps, compared with the 4G average download speed of 15 Megabits per second (Mbps).

    According to Prof Tafazolli, there were hurdles to overcome before 5G would be ready, he said, "An important aspect of 5G is how it will support applications in the future. We don't know what applications will be in use by 2020, or 2030 or 2040 for that matter, but we know they will be highly sensitive to latency."

There is a need to bring "end-to-end latency down to below one millisecond" in order to enable latest technologies and applications which would just not be possible with 4G. Tafazolli mentioned 3D holographic chess games on smartphones, controlling connected cars over 5G and other possible future applications requiring such low latency.

5G – NEW FRONTIER FOR CYBER ATTACKS
5G will, no doubt, provide a high speed Internet connectivity that would be really a great news for all, but that would be a distinction for cyber criminals as well. In Future, by leveraging 5G technology, it would be very easy for hackers and cybercriminals to take down almost any website on the Internet using Distributed Denial of Service (DDoS) attacks.

In Era of expected 50Gbps Internet speed at home or business, there would be no need for cyber criminals to make a critical infrastructure of botnets by compromising hundreds of thousands of devices, rather they only need few devices with 5G Internet connection to launch the ever largest DDoS attack of around 1 Tbps.

To resolve such issues in future, High speed Internet service providers and online communications service providers need to setup real time monitoring, reporting, limiting, and mitigation and protection mechanism against DDoS attacks in an attempt to protect online users.

Bill Gates Sponsored Giant Fans Will Soon Suck CO2 From Air and Recycle it as Fuel

Carbon-Engineering-Plant; CO2 is the major cause of climate change and global warming. As of now, sustainable development is just in speeches and when an immediate solution was seeming unlikely, Carbon Engineering came up with a technology that would reduce and recycle the CO2 present in the atmosphere instantaneously.
The rate of climate change today, and its effects on the planet’s future, incite some of the strongest opinions and anxiety among the people. While the world acknowledges it, yet no one wants to share the responsibility. No wonder Elon Musk calls this as humanity’s dumbest experiment.

Carbon emission is the biggest contributor to the increase in global temperatures worldwide, and it will continue to do so until an immediate solution is panned out. Planting trees can do the trick, but it would require vast amounts of fertile land to absorb even a small volume of CO2. But what if we could build something that does the same as forests- suck CO2 out of the atmosphere?

Carbon Engineering, a company sponsored by Bill gates, is working on technologies to take CO2 directly out of the atmosphere. It sounds amazing but not easy as CO2 represents just one molecule out of 2500 molecules in the air.

Carbon Engineering has built the prototype contactor that converts 100 kilos of carbon dioxide present in the atmosphere every day into harmless carbonates. Now just imagine the extent of their full-scale system.

At its maximum capacity, the full-scale system by the Carbon Engineering team is expected to capture the emissions from 300,000 cars every year. Air capture doesn’t require any exotic technology and can be scaled in size and installed anywhere on the Earth (since CO2 is present everywhere) depending on the economic and industrial needs of the place.

And, it doesn’t end here. The pure CO2 can be combined with H2 and form hydrocarbon fuels such as gasoline and jet fuel, thus continuing the above process.

Air-capture-forming-hydrocarbon-fuel

Air capture seems quite a promising technology, a solution that could provide sustainable development at a lower cost. The conventional cars are not going out anytime soon and nor the industries going to slow their pace, so air capture could be a game changer without affecting the development agenda of the countries.

A single email can give hackers access to the entire network:


Google researchers find code-execution bug in FireEye threat-prevention devices which can give hackers complete access to networks

Almost all companies install cyber security solutions to safeguard their networks against malicious vectors like hacking, spamming etc. Imagine what happens if there is a vulnerability in once such security device meant to protect your network.

Now, researchers say they have uncovered a critical vulnerability in such a product from security firm FireEye that can give attackers full network access.

According to Tavis Ormandy from Google, they have discovered an vulnerability in the NX, EX, AX, FX series of FireEye products. Ormandy says that the vulnerability makes it possible for attackers to penetrate a network by sending one of its members a single malicious e-mail, even if it’s never opened.

Ormandy, who has already uncovered bugs in many anti-virus solutions in the past says that they have informed FireEye about the bug. Ormandy has explained in a blog post published Tuesday:

For networks with deployed FireEye devices, a vulnerability that can be exploited via the passive monitoring interface would be a nightmare scenario. This would mean an attacker would only have to send an email to a user to gain access to a persistent network tap—the recipient wouldn’t even have to read the email, just receiving it would be enough.

‘A network tap is one of the most privileged machines on the network, with access to employee’s email, passwords, downloads, browsing history, confidential attachments, everything. In some deployment configurations* an attacker could tamper with traffic, inserting backdoors or worse. Because FireEye devices typically have a secondary internet-connected interface for updates and management, the issue could even be wormable across the internet.’

The devices are supposed to passively monitor network traffic from HTTP, FTP, SMTP connections. In instances where there’s a file transfer, the security appliance will scan it for malware. Ormandy and fellow Project Zero researcher Natalie Silvanovich found a vulnerability that can be exploited through such a passive monitoring interface. The researchers used the JODE Java decompiler to reverse engineer Java Archive files used by the FireEye devices. They then figured out a way to get the appliance to execute a malicious archive file by mimicking some of the same features found in legitimate ones.

“Putting these steps together, an attacker can send an e-mail to a user or get them to click a link, and completely compromise one of the most privileged machines on the network,” the researchers reported. “This allows exfiltration of confidential data, tampering with traffic, lateral movement around networks and even self-propagating internet worms.”

In a statement, a FireEye spokesman wrote:

On Friday December 4, FireEye was informed of and confirmed a Remote Code Execution (RCE) vulnerability impacting our NX, EX, AX, and FX products by Google Project Zero’s Tavis Ormandy. FireEye had been engaged with and was supporting the Google Project Zero team prior to this discovery around the testing of our products.

We released an automated remediation to customers just 6 hours after notification, mitigating any customer exposure by Saturday morning, December 5th and released a full, automated fix on Monday, December 7. In addition, we will be releasing a fix to support our out-of-contract customers.

We are thankful for the opportunity to support researchers in the testing of our products and will continue to support their efforts and fully support their efforts to improve our products.

Facebook dispute results in a 14 year old girl being shot dead

Birmingham teenager shot dead after a dispute on Facebook

An argument on Facebook took a ghastly turn of events when it ended in gunfire that killed 14 year old Kierra’onna Rice.

The online Facebook brawl between two groups of friends spilled out into the streets with a fistfight and later ended in gunfire that killed a 14-year-old girl and wounded two others in Alabama on Friday, authorities said. The fistfight between the girls was to be recorded for posting online according to th police.

Birmingham police said 14-year Kierra’onna Rice was shot and killed at around 5 p.m. in Birmingham after two males opened fire after Rice and several other girls met at a park to fight. Birmingham Police Chief A.C. Roper told the NBC reporter that some in the Facebook group planned to record the fight so video could be posted online.

Those who knew Rice say they never dreamed something like this would happen to her. They say she was loving and would lend a helping hand to anyone. Her classmate, Diamond Davis said,, “She was a good person. She, she never had any trouble. She was never in anything. She was a good person. She liked to help people.”

These top ten progamming languages have most vulnerable apps on the Internet.

web-apps
A new research showed that Scripting languages, in general, give birth to more security vulnerabilities in web applications, which raised concerns over potential security bugs in millions of websites.

The app security firm Veracode has released its State of Software Security: Focus on Application Development report (PDF), analyzing more than 200,000 separate applications from October 1, 2013, through March 31, 2015.

A new research showed that Scripting languages, in general, give birth to more security vulnerabilities in web applications, which raised concerns over potential security bugs in millions of websites.

The app security firm Veracode has released its State of Software Security: Focus on Application Development report (PDF), analyzing more than 200,000 separate applications from October 1, 2013, through March 31, 2015.

The security researchers crawled popular web scripting languages including PHP, Java, JavaScript, Ruby, .NET, C and C++, Microsoft Classic ASP, Android, iOS, and COBOL, scanning hundreds of thousands of applications over the last 18 months.

Researchers found that PHP – and less popular Web development languages Classic ASP and ColdFusion – are the riskiest programming languages for the Internet, while Java and .NET are the safest.

Here's the Top 10 List:

The Veracode research report used a unique metric, Flaw Density per MB, which means the number of security bugs in each MB of source code.
Programming-Language
Here's the list of unlucky winners:

    Classic ASP – 1,686 flaws/MB (1,112 critical)
    ColdFusion – 262 flaws/MB (227 critical)
    PHP – 184 flaws/MB (47 critical)
    Java – 51 flaws/MB (5.2 critical)
    .NET – 32 flaws/MB (9.7 critical)
    C++ – 26 flaws/MB (8.8 critical)
    iOS – 23 flaws/MB (0.9 critical)
    Android – 11 flaws/MB (0.4 critical)
    JavaScript – 8 flaws/MB (0.09 critical)


Web Apps in PHP are Most Vulnerable, Here's Why:

PHP, which is on third, is actually leading the ranking because ColdFusion is a high-end niche tool and Classic ASP is almost dead.

Taking a closer look at PHP:

    86% of applications written in PHP contained at least one cross-site scripting (XSS) vulnerability.
    56% of apps included SQLi (SQL injection), which is one of the dangerous and easy-to-exploit web application vulnerabilities.
    67% of apps allowed for directory traversal.
    61% of apps allowed for code injection.
    58% of apps had problems with credentials management
    73% of apps contained cryptographic issues.
    50% allowed for information leakage.

From above issues, SQLi and XSS are among the Open Web Application Security Project's (OWASP) Top 10 most critical web application security risks.
And the Title of "Most Vulnerable Programming Language of Year 2015" Goes to…
SQL injection bugs – which allow hackers to directly interact with a Web site's database – are the ones that have been blamed for the massive data breaches at kiddie toymaker VTech and telecom firm TalkTalk.

According to the report, the risk size of the above vulnerabilities can be measured by the volume of PHP apps developed for the Top 3 CMS (Content Management Systems) – WordPress, Drupal and Joomla – that represent over 70% of the CMS market.

Choose Your Scripting Language Wisely

Less than a quarter of Java applications contain SQL injection flaws, compared to more than three-quarters of those applications written in PHP.

    "When organizations are starting new development projects and selecting languages and methodologies, the security team has an opportunity to anticipate the types of vulnerabilities that are likely to arise and how best to test for them," Veracode's CTO Chris Wysopal advised.

Hacker has built a $10 device that can predict and store hundreds of American Express credit card numbers

Imagine you have lost your credit card and applied for a fresh credit card from your bank. What if some criminal is using your new credit card before you have even received it?

Yes, it's possible at least with this $10 device.

Hardware hacker Samy Kamkar has built a $10 device that can predict and store hundreds of American Express credit card numbers, allowing anyone to use them for wireless payment transactions, even at non-wireless terminals.

The device, dubbed MagSpoof, guesses the next credit card numbers and new expiration dates based on a cancelled credit card's number and when the replacement card was requested respectively.

This process does not require the three or four-digit CVV numbers that are printed on the back side of the credit cards.


The tiny gadget would be a dream of any card fraudster who can pilfer cash from the stolen credit cards even after they have been blocked or cancelled by their owner.

What's MagSpoof?

MagSpoof is a device that can…

    Spoof any magnetic stripe or credit card entirely wirelessly, even on standard magstripe/credit card readers
    Disable chip and PIN (EMV) protection
    Switch between different credit cards
    Accurately predict the card number and expiration date

…on American Express credit cards.


Here's How MagSpoof Works

The wireless function of MagSpoof works by emitting a strong "electromagnetic field" that emulates a traditional magnetic stripe card as if it is physically being swiped.
magspoof-hacking-credit-card

    "What is incredible is that the magstripe reader requires no form of wireless receiver, RFID, or NFC – MagSpoof works wirelessly, even with standard magstripe readers," Kamkar says in his blog. "You can put it up to any traditional point of sales system, and it will believe that a card is being swiped."

After losing an American Express cards, Kamkar noticed that the replacement card's number appeared to have a relationship with his previous three American Express cards.

Kamkar recorded all the numbers and worked out a global pattern that allowed him to accurately predict up to 20 American Express card and replacement card numbers shared with him by his friends for his research.

Kamkar has also provided the necessary code that you can download from Github by following the instructions to build your own MagSpoof device, but…

…the code will be somewhat altered because Kamkar has removed the code's ability to deactivate EMV and hasn't released the AMEX prediction algorithm.


American Express has been notified of the issue and says the company is working on a fix.

A technology that can bring dead back to life might be a reality soon

Researchers plan to bring dead to life by freezing their brains and then resurrecting them with artificial intelligence

Bringing the dead back to life is futuristic and final frontier of science and Humai is working on just that. Humai is a technology company based in Los Angeles and is working on a project known as “Atom & Eve” that would let human consciousness be transferred to an artificial body after their death.

The artificial intelligence company has said it can resurrect human beings within the next 30 years. The “conversational styles, [behavioural]patterns, thought processes and information about how your body functions from the inside-out” would be stored on a silicon chip through AI and nanotechnology.

Humai researchers are banking on three technologies – bionics, nanotechnology and artificial intelligence – to achieve their goal of bringing the dead back to life and they feel that it will take around three decades for them to achieve this goal.

The founder of Humai, Josh Bocanegra told the Australian Popular Science: “I accept death, I’m not afraid of it that I’m not 100% sure I’m going to die one day.” While their Facebook page states, “Will death always be inevitable? We don’t think so.”

Bocanegra told Australian Popular Science that the brain of the deceased will be frozen using cryonics technology so that when the technology is fully developed they can implant the brain into an artificial body.

Humai says that bringing a body back to life won’t be easy, or cheap. It’s not known how the brains would be harvested, or for that matter, how much it would cost to bring someone back from the dead. Bocanegra says,”Using cloning technology, we will restore the brain as it matures”. “I don’t think of it as fighting death. I think of it as making death optional. I personally cannot imagine why someone would want to die, but I respect everyone’s wishes,” Bocanegra adds.

The most astonishing fact about Humai is that it consists of only five members. Two of them are researchers, one is the ambassador and an AI expert.

Should we be playing with the nature and bringing back the dead?

How To Remove Your Embarrassing Photos From All Social Media Websites

Work Hard and Party Even Harder. That’s the byword of today’s generation. Most of us have the same motto, myself being its hardcore follower.
It is pretty cool until a photograph of you being stoned or in an embarrassing situation surfaces on the internet a few days later. You can always try and keep safe your Android set by taking some measures.

No matter how much caution you keep on posting a selfie on Instagram or keeping a strict privacy over your Facebook account, you are just a click away from landing into embarrassing situations. It could either come from your friend or your teen imprudence.

Little embarrassment can be handled, but when something as trivial as this lands you in a major trouble as ruining a relationship (because a troubling pic from a distant past with your ex, resurfaces) or makes you a butt of jokes at the office, first thing that comes to mind is to just erase yourself completely from the internet.

Well, there is a simpler and better alternative.
REMOVE  YOUR  EMBARRASSING PHOTOS  FROM  SOCIAL  MEDIA:

Learn from these infographics to remove your photos from WhoIsHostingThis?

The Top Ten Hacker Tools of 2015

List of top ten hacker tools of 2015

Every task requires a good set of tools.This because having right tools in hand one can save much of its energy and time.In the world of Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares.

If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them. Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll.

1. Nmap:  Network Mapper

Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer,which type of protocols are being used for providing the services,what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.

2. Metasploit:

A tool for exploiting (Utilising network weakness for making a “backdoor”) vulnerabilities (Weak Points) on Network. This tool is neither free nor open source. But when it comes to features offered it deserves the price it claims. The Metasploit Project is a hugely popular pentesting (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3. Cain and Abel:

Cain & Abel is a password recovery tool that is mostly used for Microsoft Operating Systems. This popular hacking tool allows the user to seek the recovery of various kind of passwords by sniffing the network(capturing some of the data packets), cracking encrypted passwords using Dictionary, Brute-Force(Generation of hashes out of words and then comparison of encrypted hash with the generated one,this method takes less time than dictionary attack method) and Cryptanalysis attacks. Cain, as it is often referred to, can also record VoIP(Voice over IP protocol,used for making calls over using internet) conversations, decode hashed scrambled passwords, recover wireless network keys and more.It can crack various types of hashes including NTLM,MD2,MD5,SHA-1,SHA-2 and many more.These functionalities make Cain and Abel one of the best password recovery tool.

4. Angry IP Scanner: 

Angry IP Scanner, also known as ‘ipscan’ is a freely available (open-source and cross-platform) hacking network scanner that is both fast and easy to use. The main purpose of this hacking tool is to scan IP addresses and ports to find open doors and ports. Worth noting that Angry IP Scanner also has a bunch of other uses as well. Common users of this hacking tool include network administrators and system engineers.

5.John The Ripper: 

John the Ripper is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a wordlist, containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks.Including Brute Force and Rainbow attacks.

6. THC Hydra:

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP(Lightweight Directory Access Protocol),SMB, VNC, and SSH(Secure Shell,used by VPN Softwares).

7. Burp Suite:

A pentesting tool,Burp Suite has several features that can help the penetration tester or ethical hacker. Two commonly used applications used within this tool include the ‘Burp Suite Spider’ which can enumerate and map out the various pages and parameters of a web site by examining cookies and initiates connections with these web applications, and the ‘Intruder’ which performs automated attacks on web applications.

8. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. (This tool is not in the Concise list)

9. Ettercap:

Ettercap has a huge following and is widely used by cyber security professionals. Ettercap works by placing the user’s network interface into promiscuous mode and by ARP poisoning(ARP : Address resolution protocol is used to determine a host’s MAC address (address of its Network Interface Card) by knowing its IP address. ARP poisoning is a process where a hacker gives wrong information of either its MAC or IP address to the network.) the target machines, i.e. facilitating a ‘Man In The Middle’ or MITM attack. Once successful Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

10. Wapiti:

Wapiti has a very loyal following. As a pentesting tool (or framework) Wapiti is able to scan and detect hundreds of possible vulnerabilities. Essentially this Multi Purpose Hacker Tools can audit the security of web applications by performing “black-box” scans, i.e. it does not study the source code of the application but will scan the HTML pages of the application seeking scripts and forms where it can inject data.

 

Secure messaging App Telegram blocks 78 ‘ISIS-related’ channels

Telegram blocks 78 IS-propaganda channels from using its secure and encrypted messaging platform

It has been well known that the ISIS and its supporters use the Telegram App to propagate their ideology. Now the Telegram creators have blocked as many as 78 ISIS affiliated accounts from using its encrypted and secure service.

The Berlin-based Telegram, a popular mobile messaging service app has blocked 78 known ISIS sympathizer accounts from using its technology to communicate and spread propaganda to a wide audience. Telegram, which has been founded by two Russian brothers, Pavel Durov and Nicolay Durov uses strong encryption that makes it all but impossible for security services to intercept private messages between individuals or members of a group.

In a statement released on Wednesday, Telegram said that it has blocked 78 ISIS-related channels that the terrorist group used to spread propaganda and communicate with other members. The group had been using the app for distributing its propaganda material since October, when Telegram introduced a feature letting users broadcast messages to an unlimited number of subscribers.

“We were disturbed to learn that Telegram’s public channels were being used by ISIS to spread their propaganda. We are carefully reviewing all reports sent to us at abuse@telegram.org and are taking appropriate action to block such channels. As a result, this week alone we blocked 78 ISIS-related channels across 12 languages.

We are also introducing an easier way for our users to report objectionable public content in the upcoming update of Telegram this week.”

Telegram, Russia’s most popular social network site is very famous internationally, where it is used as an alternative to WhatsApp on similar services. It is an ultra-secure way to quickly upload texts and voice messages, and share videos. It says it has 60 million active users. In 2014, the app racked up millions of downloads, following Facebook’s acquisition of WhatsApp. According to its founder, Pavel Durov, who disclosed the stats during TechCrunch Disrupt in September, said that the app sees more than 12 billion messages a day.

According to security researchers, Telegram became the preferred method for Islamic State to broadcast news and share videos of military victories or sermons. The group used Telegram to claim responsibility for the Paris attacks, which left 129 people dead, and the bombing of a Russian airliner over Egypt last month, which killed 224.

According to Alex Kassirer, a counter-terrorism analyst with the New York-based private intelligence firm Flashpoint, said that IS had started using Telegram broadcast channels to send press releases targeted at inspiring and recruiting followers.

Further, Rita Katz, director of Bethesda, Maryland.-based extremist monitoring service SITE Intelligence Group said that some of the dozens of channels set up had 10,000 followers or more. Some of those channels could not be accessed on Wednesday afternoon and a message was displayed saying they were no longer available. She further added that Telegram had appeared to let the jihadists operate without fear of being turned off or traced until Wednesday.

However, Telegram explicitly says on its site that it makes efforts to block Islamic State, which is also known as ISIS.

The company statement stressed that shutting down ISIS channels on the site was not taken to restrict free speech, which it encourages.

“While we do block terrorist (e.g. ISIS-related) bots and channels, we will not block anybody who peacefully expresses alternative opinions,” Telegram said of its actions.

Telegram said the move would only affect public channels and automated response systems called ‘bots.’ Messages between individuals and group chats that can include up to 200 users would not be affected. While the app says it blocked the ISIS-related channels, unfortunately private communications between ISIS members were unaffected by those blocks.