Skip to main content

Tiktok ban in India

In a massive development, the Home Ministry on Monday, has banned 59 Chinese Apps including Tik-Tok. The Centre has stated that it has recieved  many complaints from various sources including several reports about misuse of these apps  for stealing and surreptitiously transmitting users' data in an unauthorized manner to servers which have locations outside India. Hence, in a move to protect  sovereignty of Indian Cyberspace and to ensure interests of crores of Indian mobile users, the government has stated that this was a major blow  to China's Digital Silk Route ambitions. This move comes amid the ongoing India-China standoff at the Line of Actual Control (LAC).
Here are the list of apps:

1. TikTok
2. Shareit
3. Kwai
4. UC Browser
5. Baidu map 
6. Shein 
7. Clash of Kings 
8. DU battery saver 
9. Helo 
10. Likee
11. YouCam makeup 
12. Mi Community 
13. CM Browers 
14. Virus Cleaner 
15. APUS Browser 
16. ROMWE 
17. Club Factory 
18. Newsdog 
19. Beutry Plus 
20. WeChat 
21. UC News 
22. QQ Mail 
23. Weibo 
24. Xender 
25. QQ Music 
26. QQ Newsfeed 
27. Bigo Live 
28. SelfieCity 
29. Mail Master 
30. Parallel Space 31. Mi Video Call ' Xiaomi 
32. WeSync 
33. ES File Explorer 
34. Viva Video ' QU Video Inc 
35. Meitu 
36. Vigo Video 
37. New Video Status 
38. DU Recorder 
39. Vault- Hide 
40. Cache Cleaner DU App studio 
41. DU Cleaner 
42. DU Browser 
43. Hago Play With New Friends 
44. Cam Scanner 
45. Clean Master ' Cheetah Mobile 
46. Wonder Camera 
47. Photo Wonder 
48. QQ Player 
49. We Meet 
50. Sweet Selfie 
51. Baidu Translate 
52. Vmate 
53. QQ International 
54. QQ Security Center 
55. QQ Launcher 
56. U Video 
57. V fly Status Video 
58. Mobile Legends 
59. DU Privacy
 

Tiktok's previous bans

Earlier in April 2019, TikTok was briefly banned in India by the Madras High Court for hosting 'pornographic and sleazy' content. Recently millions of Indian users had also millions of Indians called for a ban on the app after videos promoting violence against women went viral, with NCW chief Rekha Sharma seeking a total ban on it. Zoom too had been called out for security issues, with the government then issuing a notification for safe usage of the application.
🌍




....

Vineesh V
Assistant Professor of Geography,
Directorate of Education,
Government of Kerala.
https://g.page/vineeshvc
🌏🌎
🌐🌍

Comments

Popular posts from this blog

Atmospheric Window

The atmospheric window in remote sensing refers to specific wavelength ranges within the electromagnetic spectrum that can pass through the Earth's atmosphere relatively unimpeded. These windows are crucial for remote sensing applications because they allow us to observe the Earth's surface and atmosphere without significant interference from the atmosphere's constituents. Key facts and concepts about atmospheric windows: Visible and Near-Infrared (VNIR) window: This window encompasses wavelengths from approximately 0. 4 to 1. 0 micrometers. It is ideal for observing vegetation, water bodies, and land cover types. Shortwave Infrared (SWIR) window: This window covers wavelengths from approximately 1. 0 to 3. 0 micrometers. It is particularly useful for detecting minerals, water content, and vegetation health. Mid-Infrared (MIR) window: This window spans wavelengths from approximately 3. 0 to 8. 0 micrometers. It is valuable for identifying various materials, incl

DRA Disaster Risk Assessment

Disaster Risk Assessment (DRA): A Professional Overview Disaster Risk Assessment (DRA) is a systematic process used to identify, analyze, and evaluate the potential hazards, vulnerabilities, and risks posed by disasters to people, property, infrastructure, and the environment. It is a critical tool for effective disaster risk management, enabling communities, organizations, and governments to make informed decisions and implement appropriate mitigation measures. Key Components of DRA Hazard Identification: Identifying the types of hazards that could potentially affect a specific area, such as natural disasters (earthquakes, floods, cyclones), technological disasters (industrial accidents, infrastructure failures), or man-made disasters (conflicts, pandemics). Vulnerability Assessment: Evaluating the susceptibility of people, infrastructure, and the environment to the identified hazards. This involves assessing factors such as location, construction quality, socio-economic co

Linear Arrays Along-Track Scanners or Pushbroom Scanners

Multispectral Imaging Using Linear Arrays (Along-Track Scanners or Pushbroom Scanners) Multispectral Imaging: As previously defined, this involves capturing images using multiple sensors that are sensitive to different wavelengths of electromagnetic radiation. Linear Array of Detectors (A): This refers to a row of discrete detectors arranged in a straight line. Each detector is responsible for measuring the radiation within a specific wavelength band. Focal Plane (B): This is the plane where the image is formed by the lens system. It is the location where the detectors are placed to capture the focused image. Formed by Lens Systems (C): The lens system is responsible for collecting and focusing the incoming radiation onto the focal plane. It acts like a camera lens, creating a sharp image of the scene. Ground Resolution Cell (D): As previously defined, this is the smallest area on the ground that can be resolved by a remote sensing sensor. In the case of linear array scanne

Discrete Detectors and Scanning mirrors Across the track scanner Whisk broom scanner.

Multispectral Imaging Using Discrete Detectors and Scanning Mirrors (Across-Track Scanner or Whisk Broom Scanner) Multispectral Imaging:  This technique involves capturing images of the Earth's surface using multiple sensors that are sensitive to different wavelengths of electromagnetic radiation.  This allows for the identification of various features and materials based on their spectral signatures. Discrete Detectors:  These are individual sensors that are arranged in a linear or array configuration.  Each detector is responsible for measuring the radiation within a specific wavelength band. Scanning Mirrors:  These are optical components that are used to deflect the incoming radiation onto the discrete detectors.  By moving the mirrors,  the sensor can scan across the scene,  capturing data from different points. Across-Track Scanner or Whisk Broom Scanner:  This refers to the scanning mechanism where the mirror moves perpendicular to the direction of flight.  This allows for t

Hazard Vulnerability Exposure Risk

Key Concepts in Hazard Identification, Vulnerability Assessment, Exposure Assessment, and Risk Analysis Hazard-Exposure-Vulnerability-Risk (HEVR) Framework: Hazard: A potential event or phenomenon that can cause harm. Exposure: People, assets, or environments in harm's way. Vulnerability: Susceptibility to damage or harm from a hazard. Risk: The potential for loss or damage resulting from the interaction of hazards, exposure, and vulnerability. Risk as a Function: Risk can be calculated using the formula: Risk = Hazard × Vulnerability × Exposure. Reducing any of these factors can decrease overall risk. Types of Hazards: Natural hazards: Earthquakes, floods, tsunamis, landslides, hurricanes. Anthropogenic hazards: Industrial accidents, pollution, infrastructure failure, climate change. Technological hazards: Nuclear accidents, chemical spills. Vulnerability Dimensions: Physical: Infrastructure quality, building codes, location. Social: Age, income, disability, gender, acces