Connect with us

Technology

The Ultimate Online Privacy Guide

Published

on

By Douglas Crawford

Introduction

Edward Snowden’s NSA spying revelations highlighted just how much we have sacrificed to the gods of technology and convenience something we used to take for granted, and once considered a basic human right – our privacy.

It is just not just the NSA. Governments the world over are racing to introduce legislation that allows to them to monitor and store every email, phone call and Instant Message, every web page visited, webinar software and every VoIP conversation made by every single one of their citizens.

The press has bandied parallels with George Orwell’s dystopian world ruled by an all-seeing Big Brother about a great deal. They are depressingly accurate.

Encryption provides a highly effective way to protect your internet behavior, communications, and data. The main problem with using encryption is that its use flags you up to organizations such as the NSA for closer scrutiny.

Details of the NSA’s data collection rules are here. What it boils down to is that the NSA examines data from US citizens, then discards it if it’s found to be uninteresting. Encrypted data, on the other hand, is stored indefinitely until the NSA can decrypt it.

The NSA can keep all data relating to non-US citizens indefinitely, but practicality suggests that encrypted data gets special attention.

If a lot more people start to use encryption, then encrypted data will stand out less, and surveillance organizations’ job of invading everyone’s privacy will be much harder. Remember – anonymity is not a crime!

How Secure is Encryption?

Following revelations about the scale of the NSA’s deliberate assault on global encryption standards, confidence in encryption has taken a big dent. So let’s examine the current state of play…

Encryption Key Length

Encryption Key 01Key length is the crudest way of determining how long a cipher will take to break. It is the raw number of ones and zeros used in a cipher. Similarly, the crudest form of attack on a cipher is known as a brute force attack (or exhaustive key search). This involves trying every possible combination to find the correct one.

If anyone is capable of breaking modern encryption ciphers it is the NSA, but to do so is a considerable challenge. For a brute force attack:

  • A 128-bit key cipher has 3.4 x10(38) possible keys. Going through each of them would thousands of operations or more to break.
  • In 2011 the fastest supercomputer in the word (the Fujitsu K computer located in Kobe, Japan) was capable of an Rmax peak speed of 10.51 petaflops. Based on this figure, it would take Fujitsu K 1.02 x 10(18) (around 1 billion) years to crack a 128-bit AES key by force.
  • In 2016 the most powerful supercomputer in the world is the NUDT Tianhe-2 in Guangzhou, China. Almost 3 times as fast as the Fujitsu K, at 33.86 petaflops, it would “only” take it around a third of a billion years to crack a 128-bit AES key. That’s still a long time, and is the figure for breaking just one key.
  • A 256-bit key would require 2(128) times more computational power to break than a 128-bit one.
  • The number of years required to brute force a 256-bit cipher is 3.31 x 10(56) – which is about 20000….0000 (total 46 zeros) times the age of Universe (13.5 billion or 1.35 x 10(10) years!

The NUDT Tianhe-2 supercomputer in Guangzhou, China

128-bit Encryption

Until the Edward Snowden revelations, people assumed that 128-bit encryption was in practice uncrackable through brute force. They believed it would be so for around another 100 years (taking Moore’s Law into account).

In theory, this still holds true. However, the scale of resources that the NSA seems willing to throw at cracking encryption has shaken many experts’ faith in these predictions. Consequently, system administrators the world over are scrambling to upgrade cipher key lengths.

If and when quantum computing becomes available, all bets will be off. Quantum computers will be exponentially more powerful than any existing computer, and will make all current encryption ciphers and suites redundant overnight.

In theory, the development of quantum encryption will counter this problem. However, access to quantum computers will initially be the preserve of the most powerful and wealthy governments and corporations only. It is not in the interests of such organizations to democratize encryption.

For the time being, however, strong encryption is your friend.

Note that the US government uses 256-bit encryption to protect ‘sensitive’ data and 128-bit for ‘routine’ encryption needs.

However, the cipher it uses is AES. As I discuss below, this is not without problems.

Ciphers

Encryption key length refers to the amount of raw numbers involved. Ciphers are the mathematics used to perform the encryption. It is weaknesses in these algorithms, rather than in the key length, that often leads to encryption breaking.

By far the most common ciphers that you will likely encounter are those OpenVPN uses: Blowfish and AES. In addition to this, RSA is used to encrypt and decrypt a cipher’s keys. SHA-1 or SHA-2 are used as hash functions to authenticate the data.

AES is generally considered the most secure cipher for VPN use (and in general). Its adoption by the US government has increased its perceived reliability, and consequently its popularity. However, there is reason to believe this trust may be misplaced.

NIST

The United States National Institute of Standards and Technology (NIST) developed and/or certified AES, RSA, SHA-1 and SHA-2. NIST works closely with the NSA in the development of its ciphers.

Given the NSA’s systematic efforts to weaken or build backdoors into international encryption standards, there is every reason to question the integrity of NIST algorithms.

NIST has been quick to deny any wrongdoing (“NIST would not deliberately weaken a cryptographic standard”). It has also has invited public participation in a number of upcoming proposed encryption-related standards in a move designed to bolster public confidence.

The New York Times, however, has accused the NSA of introducing undetectable backdoors, or subverting the public development process to weaken the algorithms, thus circumventing NIST-approved encryption standards.

News that a NIST-certified cryptographic standard – the Dual Elliptic Curve algorithm (Dual_EC_DRGB) had been deliberately weakened not just once, but twice, by the NSA destroyed pretty much any existing trust.

Encryption

That there might be a deliberate backdoor in Dual_EC_DRGB had already been noticed before. In 2006 researchers at the Eindhoven University of Technology in the Netherlands noted that an attack against it was easy enough to launch on ‘an ordinary PC.’  Microsoft engineers also flagged up a suspected backdoor in the algorithm.

Despite these concerns, where NIST leads, industry follows. Microsoft, Cisco, Symantec and RSA all include the algorithm in their products’ cryptographic libraries. This is in large partbecause compliance with NIST standards is a prerequisite to obtaining US government contracts.

NIST-certified cryptographic standards are pretty much ubiquitous worldwide throughout all areas of industry and business that rely on privacy (including the VPN industry). This is all rather chilling.

Perhaps because so much relies on these standards, cryptography experts have been unwilling to face up to the problem.

Perfect Forward Secrecy

Perfect Forward Secrecy 01
One of the revelations in the information provided by Edward Snowden is that “another program, code-named Cheesy Name, was aimed at singling out SSL/TLS encryption keys, known as ‘certificates,’ that might be vulnerable to being cracked by GCHQ supercomputers.”

That these certificates can be “singled out” strongly suggests that 1024-bit RSA encryption (commonly used to protect the certificate keys) is weaker than previously thought. The NSA and GCHQ could therefore decrypt it much more quickly than expected.

In addition to this, the SHA-1 algorithm widely used to authenticate SSL/TLS connections is fundamentally broken. In both cases, the industry is scrambling fix the weaknesses as fast as it can. It is doing this by moving onto RSA-2048+, Diffie-Hellman, or  Elliptic Curve Diffie-Hellman (ECDH) key exchanges and SHA-2+ hash authentication.

What these issues (and the 2014 Heartbleed Bug fiasco) clearly highlight is the importance of using perfect forward secrecy (PFS) for all SSL/TLS connections.

This is a system whereby a new and unique (with no additional keys derived from it) private encryption key is generated for each session. For this reason, it is also known as an ephemeral key exchange.

Using PFS, if one SSL key is compromised, this does not matter very much because new keys are generated for each connection. They are also often refreshed during connections. To meaningfully access communications these new keys would also need to be compromised. This makes the task so arduous as to be effectively impossible.

Unfortunately, it is common practice (because it’s easy) for companies to use just one private encryption key. If this key is compromised, then the attacker can access all communications encrypted with it.

OpenVPN and PFS

The most widely used VPN protocol is OpenVPN. It is considered very secure. One of the reasons for this is because it allows the use of ephemeral keys.

Sadly this is not implemented by many VPN providers. Without perfect forward secrecy, OpenVPN connections are not considered secure.

It is also worth mentioning here that the HMAC SHA-1 hashes routinely used to authenticate OpenVPN connections are not a weakness. This is because HMAC SHA-1 is much less vulnerable to collision attacks than standard SHA-1 hashes. Mathematical proof of this is available in this paper.

The Takeaway – So, is Encryption Secure?

To underestimate the NSA’s ambition or ability to compromise all encryption is a mistake. However, encryption remains the best defense we have against it (and others like it).

To the best of anyone’s knowledge, strong ciphers such as AES (despite misgivings about its NIST certification) and OpenVPN (with perfect forward secrecy) remain secure.

As Bruce Schneier, encryption specialist, fellow at Harvard’s Berkman Center for Internet and Society, and privacy advocate famously stated,

Trust the math. Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That’s how you can remain secure even in the face of the NSA.”

Remember too that the NSA is not the only potential adversary. However, most criminals and even governments have nowhere near the NSA’s ability to circumvent encryption.

The Importance of End-to-end Encryption

End-to-end (e2e) encryption means that you encrypt data on your own device. Only you hold the encryption keys (unless you share them). Without these keys, an adversary will find it extremely difficult to decrypt your data.

Encryption

Many services and products do not use e2e encryption. Instead they encrypt your data and hold the keys for you. This can be very convenient, as it allows for easy recovery of lost passwords, syncing across devices, and so forth. It does mean, however, that these third parties could be compelled to hand over your encryption keys.

A case in point is Microsoft. It encrypts all emails and files held in OneDrive (formerly SkyDrive), but it also holds the encryption keys. In 2013 it used these to unlock the emails and files of its 250 million worldwide users for inspection by the NSA.

Strongly avoid services that encrypt your data on their servers, rather than you encrypting your own data on your own machine.

HTTPS

Although strong encryption has recently become trendy, websites have been using strong end-to-end encryption for the last 20 years. After all, if websites were not secure, then online shopping or banking wouldn’t be possible.

The encryption protocol used for this is HTTPS, which stands for HTTP Secure (or HTTP over SSL/TLS). It is used for websites that need to secure users’ communications and is the backbone of internet security.

When you visit a non-secure HTTP website, data is transferred unencrypted. This means anyone watching can see everything you do while visiting that site. This includes your transaction details when making payments. It is even possible to alter the data transferred between you and the web server.

With HTTPS, a cryptographic key exchange occurs when you first connect to the website. All subsequent actions on the website are encrypted, and thus hidden from prying eyes. Anyone watching can see that you have visited a certain website, but cannot see which individual pages you read, or any data transferred.

For example, the BestVPN.com website is secured using HTTPS. Unless you are using a VPN while reading this web page, your ISP can see that you have visited www.bestvpn.com, but cannot see that you are reading this particular article. HTTPS uses end-to-end encryption.

Secured website Firefox

It is easy to tell if you visit a website secured by HTTPS – just look for a locked padlock icon to the left of the main URL/search bar.

There are issues relating to HTTPS, but in general it is secure. If it wasn’t, none of the billions of financial transactions and transfers of personal data that happen every day on the internet would be possible. The internet itself (and possibly the world economy!) would collapse overnight.

For a detailed discussion on HTTPS, please see here.

Metadata

An important limitation to encryption is that it does not necessarily protect users from the collection of metadata.

Even if the contents of emails, voice conversations, or web browsing sessions cannot be readily listened in on, knowing when, where, from whom, to whom, and how regularly such communication takes place can tell an adversary a great deal. This is a powerful tool in the wrong hands.

For example, even if you use a securely encrypted messaging service such as WhatsApp, Facebook will still be able to tell who you are messaging, how often you message, how long you usually chat for, and more. With such information, it would be easy to discover that you were having an affair, for example.

Although the NSA does target individual communications, its primary concern is the collection of metadata. As NSA General Counsel Stewart Baker has openly acknowledged,

“Metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.

Technologies such as VPNs and Tor can make the collection of metadata very difficult. For example, an ISP cannot collect metadata relating to the browsing history of customers who use a VPN to hide their online activities.

Note, though, that many VPN providers themselves log some metadata. This should be a consideration when choosing a service to protect your privacy.

Please also note that mobile apps typically bypass any VPN that is running on your device, and connect directly to their publishers’ servers. Using a VPN, for example, will not prevent WhatsApp sending metadata to Facebook.

Identify Your Threat Model

When considering how to protect your privacy and stay secure on the internet, carefully consider who or what worries you most. Defending yourself against everything is almost impossible. And any attempt to do so will likely seriously degrade the usability (and your enjoyment) of the internet.

Identifying to yourself that being caught downloading an illicit copy of Game of Thrones is a bigger worry than being targeted by a crack NSA TAO teamfor personalized surveillance is a good start. It will leave you less stressed, with a more useable internet and with more effective defenses against the threats that really matter to you.

Of course, if your name is Edward Snowden, then TAO teams will be part of your threat model…

I will discuss steps you should take to help identify your threat model in an upcoming article on BestVPN.com. In the meantime, this article does a good job of introducing the basics.

Use FOSS Software

Ultimate Privacy Guide Illustration 03 01The terrifying scale of the NSA’s attack on public cryptography, and its deliberate weakening of common international encryption standards, has demonstrated that no proprietary software can be trusted. Even software specifically designed with security in mind.

The NSA has co-opted or coerced hundreds of technology companies into building backdoors into their programs, or otherwise weakening security in order to allow it access. US and UK companies are particularly suspect, although the reports make it clear that companies across the world have acceded to NSA demands.

The problem with proprietary software is that the NSA can fairly easily approach and convince the sole developers and owners to play ball. In addition to this, their source code is kept secret. This makes it easy to add to or modify the code in dodgy ways without anyone noticing.

Open source code

The best answer to this problem is to use free open source software (FOSS). Often jointly developed by disparate and otherwise unconnected individuals, the source code is available to everyone to examine and peer-review. This minimizes the chances that someone has tampered with it.

Ideally, this code should also be compatible with other implementations, in orderto minimize the possibility of a backdoor being built in.

It is, of course, possible that NSA agents have infiltrated open source development groups and introduced malicious code without anyone’s knowledge. In addition, the sheer amount of code that many projects involve means that it is often impossible to fully peer-review all of it.

Despite these potential pitfalls, FOSS remains the most reliable and least likely to be tampered with software available. If you truly care about privacy you should try to use it exclusively (up to and including using FOSS operating systems such as Linux).

Steps You Can Take to Improve Your Privacy

With the proviso that nothing is perfect, and if “they” really want to get you “they” probably can, there are steps you can take to improve your privacy.

Pay for Stuff Anonymously

One step to improving your privacy is to pay for things anonymously. When it comes to physical goods delivered to an actual address, this isn’t going to happen. Online services are a different kettle of fish, however.

It is increasingly common to find services that accept payment through Bitcoin and the like. A few, such as VPN service Mullvad, will even accept cash sent anonymously by post.Ultimate Privacy Guide Illustration 04 01

Bitcoin

Bitcoin is a decentralized and open source virtual currency that operates using peer-to-peer technology (much as BitTorrent and Skype do). The concept is particularly revolutionary and exciting because it does not require a middleman to work (for example a state-controlled bank).

Whether or not Bitcoins represent a good investment opportunity remains hotly debated, and is not within the remit of this guide. It is also completely outside of my area of expertise!

Source: Bestvpn.com

Modupe Gbadeyanka is a fast-rising journalist with Business Post Nigeria. Her passion for journalism is amazing. She is willing to learn more with a view to becoming one of the best pen-pushers in Nigeria. Her role models are the duo of CNN's Richard Quest and Christiane Amanpour.

Advertisement
1 Comment

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Airtel Africa, SpaceX to Launch Starlink Direct-to-Cell Connectivity

Published

on

By Modupe Gbadeyanka

An agreement for a satellite-to-mobile service that will benefit millions of people in Africa has been entered into between Airtel Africa Plc and SpaceX.

This service is through the introduction of Starlink Direct-to-Cell satellite connectivity across all the 14 markets of Airtel Africa that serve 174 million customers.

Through this partnership, Airtel Africa customers with compatible smartphones in regions without terrestrial coverage can have network connectivity through Starlink, which is the world’s largest 4G connectivity provider (by geographic reach).

The satellite-to-mobile service will begin in 2026 with data for select applications and text messaging.

This agreement also includes support for Starlink’s first broadband Direct-to-Cell system, with next-generation satellites that will be capable of providing high-speed connectivity to smartphones with 20x improved data speed. The rollout will proceed in line with country-specific regulatory approvals.

Airtel Africa is the first mobile network operator in Africa to offer Starlink Direct-to-Cell service, powered by 650 satellites to provide seamless connectivity to its customers in remote areas.

The partnership reinforces Airtel Africa’s commitment to bridge digital divide and offer seamless connectivity to its customers.

Airtel Africa and Starlink will continue to explore additional collaboration opportunities to further advance digital inclusion across the continent.

“Airtel Africa remains committed to delivering great experience to our customers by improving access to reliable and contiguous mobile connectivity solutions.

“Starlink’s Direct-to-Cell technology complements the terrestrial infrastructure and even reaches areas where deploying terrestrial network solutions are challenging.

“We are very excited about the collaboration with Starlink, which will establish a new standard for service availability across all our 14 markets,” the chief executive of Airtel Africa, Mr Sunil Taldar, said.

Also commenting, the Vice President of Sales for Starlink, Ms Stephanie Bednarek, said, “For the first time, people across Africa will stay connected in remote areas where terrestrial coverage cannot reach, and we’re so thrilled that Starlink Direct-to-Cell can power this life-changing service.

“Through this agreement with Airtel Africa, we’ll also deliver our next-generation technology to offer high-speed broadband connectivity, which will offer faster access to many essential services.”

Continue Reading

Technology

Simplify Your Mobile Life with eSIM and Virtual Numbers

Published

on

eSIM Plus

Managing phone numbers used to be a constant hassle. Between personal lines, work numbers, online registrations, and international travel, people often juggled multiple SIM cards, devices, or expensive roaming plans just to stay reachable. Today, eSIMs and virtual phone numbers offer a smarter way to handle communication. One device can manage multiple lines, switch between them instantly, and keep work and personal contacts separate—all without a physical SIM. For travelers, remote workers, and tech professionals, this setup offers efficiency, control, and flexibility that traditional SIM cards simply cannot match.

A virtual phone number is a digital line that exists independently of any physical SIM. Calls and messages are routed through the cloud, meaning the same number can function across multiple devices: smartphone, tablet, or computer. You can pick a local number in another country without actually being there, or maintain separate lines for freelance projects while keeping your personal number private. Virtual numbers also help protect privacy and streamline online activity. They are perfect for temporary projects, online sign-ups, or situations where you do not want to share your main number.

When paired with eSIM technology, virtual numbers become extremely convenient. Platforms like eSIM Plus let users download multiple numbers onto a single device, switch between them instantly, and manage personal and business lines without touching a physical SIM card. Travelers can maintain local numbers abroad, freelancers can manage multiple client contacts, and tech-savvy users gain complete control over their connectivity. eSIM Plus simplifies this process, allowing for seamless integration of digital numbers and minimizing the complications associated with traditional SIMs.

Businesses also find virtual numbers invaluable. They enable companies to create a local presence in multiple regions without the need for physical offices. Calls can be forwarded to employees anywhere, while integration with CRM tools allows monitoring and analytics of communication. For individuals, virtual numbers enhance privacy and simplify digital life. Whether signing up for online services, running a side business, or protecting personal information, virtual numbers provide flexibility and control that traditional numbers cannot offer.

Everyday Scenarios for Virtual Numbers

Virtual numbers are not just a tech gimmick—they solve real problems.

  • International Travel: A traveler can maintain a local number in multiple countries, avoiding expensive roaming fees while staying reachable by family, friends, and colleagues.
  • Remote Work and Freelancing: A consultant or freelancer can separate client communications from personal calls without carrying multiple phones. Multiple virtual lines can support different projects simultaneously.
  • Privacy Protection: Individuals can use temporary numbers for online registrations, dating apps, or marketplace accounts, significantly reducing spam and unwanted contacts.
  • Small Businesses and Startups: Companies can create local contact points in different regions, forward calls to employees, and integrate with communication software for better workflow management.

With eSIMs, managing these numbers becomes effortless. Instead of swapping physical SIM cards, users download the eSIM profile to their device, and virtual numbers become instantly available. This combination provides unparalleled flexibility for modern digital lifestyles.

How Virtual Numbers Work

Getting a virtual number is straightforward. Providers allow you to select a number online, link it to your smartphone or VoIP service, and manage it through an app. Common features include:

  • Call forwarding to any device
  • Text messaging and multimedia messaging

  • Voicemail management

  • Temporary numbers for short-term projects or verification purposes

When integrated with eSIM, the activation process is even faster. Download the eSIM profile to your device, and all your virtual numbers are ready to go. This approach is ideal for travelers, remote workers, and anyone managing multiple lines on a single phone without extra hardware.

Leading eSIM Providers

Several providers lead the market in combining eSIM technology with virtual numbers:

  • eSIM Plus: Offers digital SIMs integrated with virtual numbers, allowing multiple lines on one device. Users can manage personal, business, and international numbers seamlessly, making it perfect for remote workers, travelers, and freelancers.
  • Truphone: Provides global coverage with quick activation. Users can switch numbers without changing SIM cards, ideal for business professionals moving across regions.
  • Airalo: Focused on international travelers, offering cost-effective eSIMs for data and voice in over 190 countries. Airalo simplifies connectivity for tourists and remote workers abroad.
  • GigSky: Offers pay-as-you-go and subscription eSIM plans suitable for frequent travelers and digital nomads. GigSky supports multiple virtual lines on one device.
  • Ubigi: Enterprise-focused, enabling companies to deploy eSIMs and virtual numbers to distributed teams. Employees maintain local numbers across regions without physical SIM swaps.
  • Nomad: Travel-oriented eSIM provider supporting multiple virtual lines on one device. Ideal for digital nomads, remote professionals, and long-term travelers.

These services show how eSIMs and virtual numbers have evolved from niche tech to mainstream tools for managing modern communication efficiently.

Advantages Over Traditional Numbers

Virtual numbers have several key advantages over regular SIM-based numbers:

  • Multiple lines on one device: Manage work, personal, and international numbers without carrying multiple phones.
  • Privacy and control: Easily change or deactivate numbers for temporary projects, online registrations, or spam prevention.
  • Global accessibility: Make and receive calls from anywhere without costly roaming charges.
  • Integration with software: Works with VoIP apps, cloud platforms, and CRMs. Supports automated call routing, analytics, and communication tracking.

Traditional numbers cannot match this flexibility, efficiency, or convenience. Virtual numbers are built for modern workflows and digitally connected lifestyles.

Combining eSIM and Virtual Numbers

The combination of eSIMs with virtual numbers creates a flexible communication system. One device can handle multiple lines for home, work, or international use. Businesses can provide employees with local numbers in multiple regions without physical offices. Travelers can maintain home and foreign numbers without swapping SIM cards.

Consider a freelance consultant traveling across Europe: a virtual number in France, one in Germany, and a personal line—all on a single device. Clients reach local numbers, costs are minimized, and management happens from one interface. This setup highlights the efficiency eSIMs and virtual numbers provide.

Real-World Examples

  1. Remote Work Across Time Zones: An employee in Asia receives calls from North American clients using a local virtual number, avoiding international fees. eSIM profiles allow switching lines based on work hours.
  2. Maintaining Local Presence While Traveling: A business owner visiting multiple countries can maintain virtual local numbers. Clients call local numbers, but calls are forwarded seamlessly.
  3. Privacy and Online Security: Individuals use temporary virtual numbers for online registrations, reducing spam to their primary number.

These examples show why eSIMs combined with virtual numbers are essential for modern digital workflows.

The Future of Connectivity

With the rise of 5G, cloud communications, and AI-powered tools, eSIMs and virtual numbers will become increasingly integral to daily life. Expect tighter integration with business applications, enhanced security features, and instant switching between personal and professional lines.

For travelers, remote workers, and anyone managing multiple contacts, eSIMs paired with virtual numbers are more than a convenience—they’re a smarter, more efficient way to control communication in today’s digital world.

Continue Reading

Technology

Lagos’ Team Nevo Wins 3MTT Southwest Regional Hackathon

Published

on

Lagos 3MTT Hackathon Team Nevo

By Adedapo Adesanya

Lagos State’s representative, Team Nevo, won the 3 Million Technical Talent (3MTT) South-West Regional Hackathon, on Tuesday, December 9, 2025.

The host state took the victory defeating pitches from other south west states, including Oyo, Ogun, Osun, Ekiti, and Ondo States.

This regional hackathon was a major moment for the 3MTT Programme, bringing together young innovators from across the South-West to showcase practical solutions in AI, software development, cybersecurity, data analysis, and other key areas of Nigeria’s digital future.

Launched by the Federal Ministry of Communications, Innovation, and Digital Economy, the hackathon brought together talented young innovators from across the Southwest region to showcase their digital solutions in areas such as Artificial Intelligence (AI)/Machine Learning, software development, data analysis, and cybersecurity, among others.

“This event not only highlights the potential of youth in South West but also advances the digital economy, fosters innovation, and creates job opportunities for our young people,” said Mr Oluwaseyi Ayodele, the Lagos State Community Manager.

Winning the hackaton was Team Nevo, made up of Miss Lydia Solomon and Mr Teslim Sadiq, whose inclusive AI learning tool which tailors academic learning experiences to skill sets of students got the top nod, with N500,000 in prize money.

Team Oyo represented by Microbiz, an AI business tool solution, came in second place winning N300,000 while Team Ondo’s Fincoach, a tool that guides individuals and businesses in marking smarter financial decisions, came third with N200,000 in prize money.

Others include The Frontiers (Team Osun), Ecocycle (Team Ogun), and Mindbud (Team Ekiti).

Speaking to Business Post, the lead pitcher for Team Nevo, Miss Solomon, noted, “It was a very lovely experience and the opportunity and access that we got was one of a kind,” adding that, “Expect the ‘Nevolution’ as we call it, expect the transformation of the educational sector and how Nevo is going to bring inclusion and a deeper level of understanding and learning to schools all around Nigeria.”

Earlier, during his keynote speech, the chief executive officer (CEO) of Sterling Bank, Mr Abubakar Suleiman, emphasised the need for Nigeria’s budding youth population to tap into the country’s best comparative advantage, drawing parallels with commodities and resources like cocoa, soyabeans, and uranium.

“Tech is our best bet to architect a comparative advantage. The work we are doing with technologies are very vital to levelling the playing field.”

Continue Reading

Trending