The Ultimate Online Privacy Guide

Image

By Douglas Crawford

Introduction

Edward Snowden’s NSA spying revelations highlighted just how much we have sacrificed to the gods of technology and convenience something we used to take for granted, and once considered a basic human right – our privacy.

It is just not just the NSA. Governments the world over are racing to introduce legislation that allows to them to monitor and store every email, phone call and Instant Message, every web page visited, webinar software and every VoIP conversation made by every single one of their citizens.

The press has bandied parallels with George Orwell’s dystopian world ruled by an all-seeing Big Brother about a great deal. They are depressingly accurate.

Encryption provides a highly effective way to protect your internet behavior, communications, and data. The main problem with using encryption is that its use flags you up to organizations such as the NSA for closer scrutiny.

Details of the NSA’s data collection rules are here. What it boils down to is that the NSA examines data from US citizens, then discards it if it’s found to be uninteresting. Encrypted data, on the other hand, is stored indefinitely until the NSA can decrypt it.

The NSA can keep all data relating to non-US citizens indefinitely, but practicality suggests that encrypted data gets special attention.

If a lot more people start to use encryption, then encrypted data will stand out less, and surveillance organizations’ job of invading everyone’s privacy will be much harder. Remember – anonymity is not a crime!

How Secure is Encryption?

Following revelations about the scale of the NSA’s deliberate assault on global encryption standards, confidence in encryption has taken a big dent. So let’s examine the current state of play…

Encryption Key Length

Encryption Key 01Key length is the crudest way of determining how long a cipher will take to break. It is the raw number of ones and zeros used in a cipher. Similarly, the crudest form of attack on a cipher is known as a brute force attack (or exhaustive key search). This involves trying every possible combination to find the correct one.

If anyone is capable of breaking modern encryption ciphers it is the NSA, but to do so is a considerable challenge. For a brute force attack:

  • A 128-bit key cipher has 3.4 x10(38) possible keys. Going through each of them would thousands of operations or more to break.
  • In 2011 the fastest supercomputer in the word (the Fujitsu K computer located in Kobe, Japan) was capable of an Rmax peak speed of 10.51 petaflops. Based on this figure, it would take Fujitsu K 1.02 x 10(18) (around 1 billion) years to crack a 128-bit AES key by force.
  • In 2016 the most powerful supercomputer in the world is the NUDT Tianhe-2 in Guangzhou, China. Almost 3 times as fast as the Fujitsu K, at 33.86 petaflops, it would “only” take it around a third of a billion years to crack a 128-bit AES key. That’s still a long time, and is the figure for breaking just one key.
  • A 256-bit key would require 2(128) times more computational power to break than a 128-bit one.
  • The number of years required to brute force a 256-bit cipher is 3.31 x 10(56) – which is about 20000….0000 (total 46 zeros) times the age of Universe (13.5 billion or 1.35 x 10(10) years!

The NUDT Tianhe-2 supercomputer in Guangzhou, China

128-bit Encryption

Until the Edward Snowden revelations, people assumed that 128-bit encryption was in practice uncrackable through brute force. They believed it would be so for around another 100 years (taking Moore’s Law into account).

In theory, this still holds true. However, the scale of resources that the NSA seems willing to throw at cracking encryption has shaken many experts’ faith in these predictions. Consequently, system administrators the world over are scrambling to upgrade cipher key lengths.

If and when quantum computing becomes available, all bets will be off. Quantum computers will be exponentially more powerful than any existing computer, and will make all current encryption ciphers and suites redundant overnight.

In theory, the development of quantum encryption will counter this problem. However, access to quantum computers will initially be the preserve of the most powerful and wealthy governments and corporations only. It is not in the interests of such organizations to democratize encryption.

For the time being, however, strong encryption is your friend.

Note that the US government uses 256-bit encryption to protect ‘sensitive’ data and 128-bit for ‘routine’ encryption needs.

However, the cipher it uses is AES. As I discuss below, this is not without problems.

Ciphers

Encryption key length refers to the amount of raw numbers involved. Ciphers are the mathematics used to perform the encryption. It is weaknesses in these algorithms, rather than in the key length, that often leads to encryption breaking.

By far the most common ciphers that you will likely encounter are those OpenVPN uses: Blowfish and AES. In addition to this, RSA is used to encrypt and decrypt a cipher’s keys. SHA-1 or SHA-2 are used as hash functions to authenticate the data.

AES is generally considered the most secure cipher for VPN use (and in general). Its adoption by the US government has increased its perceived reliability, and consequently its popularity. However, there is reason to believe this trust may be misplaced.

NIST

The United States National Institute of Standards and Technology (NIST) developed and/or certified AES, RSA, SHA-1 and SHA-2. NIST works closely with the NSA in the development of its ciphers.

Given the NSA’s systematic efforts to weaken or build backdoors into international encryption standards, there is every reason to question the integrity of NIST algorithms.

NIST has been quick to deny any wrongdoing (“NIST would not deliberately weaken a cryptographic standard”). It has also has invited public participation in a number of upcoming proposed encryption-related standards in a move designed to bolster public confidence.

The New York Times, however, has accused the NSA of introducing undetectable backdoors, or subverting the public development process to weaken the algorithms, thus circumventing NIST-approved encryption standards.

News that a NIST-certified cryptographic standard – the Dual Elliptic Curve algorithm (Dual_EC_DRGB) had been deliberately weakened not just once, but twice, by the NSA destroyed pretty much any existing trust.

Encryption

That there might be a deliberate backdoor in Dual_EC_DRGB had already been noticed before. In 2006 researchers at the Eindhoven University of Technology in the Netherlands noted that an attack against it was easy enough to launch on ‘an ordinary PC.’  Microsoft engineers also flagged up a suspected backdoor in the algorithm.

Despite these concerns, where NIST leads, industry follows. Microsoft, Cisco, Symantec and RSA all include the algorithm in their products’ cryptographic libraries. This is in large partbecause compliance with NIST standards is a prerequisite to obtaining US government contracts.

NIST-certified cryptographic standards are pretty much ubiquitous worldwide throughout all areas of industry and business that rely on privacy (including the VPN industry). This is all rather chilling.

Perhaps because so much relies on these standards, cryptography experts have been unwilling to face up to the problem.

Perfect Forward Secrecy

Perfect Forward Secrecy 01
One of the revelations in the information provided by Edward Snowden is that “another program, code-named Cheesy Name, was aimed at singling out SSL/TLS encryption keys, known as ‘certificates,’ that might be vulnerable to being cracked by GCHQ supercomputers.”

That these certificates can be “singled out” strongly suggests that 1024-bit RSA encryption (commonly used to protect the certificate keys) is weaker than previously thought. The NSA and GCHQ could therefore decrypt it much more quickly than expected.

In addition to this, the SHA-1 algorithm widely used to authenticate SSL/TLS connections is fundamentally broken. In both cases, the industry is scrambling fix the weaknesses as fast as it can. It is doing this by moving onto RSA-2048+, Diffie-Hellman, or  Elliptic Curve Diffie-Hellman (ECDH) key exchanges and SHA-2+ hash authentication.

What these issues (and the 2014 Heartbleed Bug fiasco) clearly highlight is the importance of using perfect forward secrecy (PFS) for all SSL/TLS connections.

This is a system whereby a new and unique (with no additional keys derived from it) private encryption key is generated for each session. For this reason, it is also known as an ephemeral key exchange.

Using PFS, if one SSL key is compromised, this does not matter very much because new keys are generated for each connection. They are also often refreshed during connections. To meaningfully access communications these new keys would also need to be compromised. This makes the task so arduous as to be effectively impossible.

Unfortunately, it is common practice (because it’s easy) for companies to use just one private encryption key. If this key is compromised, then the attacker can access all communications encrypted with it.

OpenVPN and PFS

The most widely used VPN protocol is OpenVPN. It is considered very secure. One of the reasons for this is because it allows the use of ephemeral keys.

Sadly this is not implemented by many VPN providers. Without perfect forward secrecy, OpenVPN connections are not considered secure.

It is also worth mentioning here that the HMAC SHA-1 hashes routinely used to authenticate OpenVPN connections are not a weakness. This is because HMAC SHA-1 is much less vulnerable to collision attacks than standard SHA-1 hashes. Mathematical proof of this is available in this paper.

The Takeaway – So, is Encryption Secure?

To underestimate the NSA’s ambition or ability to compromise all encryption is a mistake. However, encryption remains the best defense we have against it (and others like it).

To the best of anyone’s knowledge, strong ciphers such as AES (despite misgivings about its NIST certification) and OpenVPN (with perfect forward secrecy) remain secure.

As Bruce Schneier, encryption specialist, fellow at Harvard’s Berkman Center for Internet and Society, and privacy advocate famously stated,

Trust the math. Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That’s how you can remain secure even in the face of the NSA.”

Remember too that the NSA is not the only potential adversary. However, most criminals and even governments have nowhere near the NSA’s ability to circumvent encryption.

The Importance of End-to-end Encryption

End-to-end (e2e) encryption means that you encrypt data on your own device. Only you hold the encryption keys (unless you share them). Without these keys, an adversary will find it extremely difficult to decrypt your data.

Encryption

Many services and products do not use e2e encryption. Instead they encrypt your data and hold the keys for you. This can be very convenient, as it allows for easy recovery of lost passwords, syncing across devices, and so forth. It does mean, however, that these third parties could be compelled to hand over your encryption keys.

A case in point is Microsoft. It encrypts all emails and files held in OneDrive (formerly SkyDrive), but it also holds the encryption keys. In 2013 it used these to unlock the emails and files of its 250 million worldwide users for inspection by the NSA.

Strongly avoid services that encrypt your data on their servers, rather than you encrypting your own data on your own machine.

HTTPS

Although strong encryption has recently become trendy, websites have been using strong end-to-end encryption for the last 20 years. After all, if websites were not secure, then online shopping or banking wouldn’t be possible.

The encryption protocol used for this is HTTPS, which stands for HTTP Secure (or HTTP over SSL/TLS). It is used for websites that need to secure users’ communications and is the backbone of internet security.

When you visit a non-secure HTTP website, data is transferred unencrypted. This means anyone watching can see everything you do while visiting that site. This includes your transaction details when making payments. It is even possible to alter the data transferred between you and the web server.

With HTTPS, a cryptographic key exchange occurs when you first connect to the website. All subsequent actions on the website are encrypted, and thus hidden from prying eyes. Anyone watching can see that you have visited a certain website, but cannot see which individual pages you read, or any data transferred.

For example, the BestVPN.com website is secured using HTTPS. Unless you are using a VPN while reading this web page, your ISP can see that you have visited www.bestvpn.com, but cannot see that you are reading this particular article. HTTPS uses end-to-end encryption.

Secured website Firefox

It is easy to tell if you visit a website secured by HTTPS – just look for a locked padlock icon to the left of the main URL/search bar.

There are issues relating to HTTPS, but in general it is secure. If it wasn’t, none of the billions of financial transactions and transfers of personal data that happen every day on the internet would be possible. The internet itself (and possibly the world economy!) would collapse overnight.

For a detailed discussion on HTTPS, please see here.

Metadata

An important limitation to encryption is that it does not necessarily protect users from the collection of metadata.

Even if the contents of emails, voice conversations, or web browsing sessions cannot be readily listened in on, knowing when, where, from whom, to whom, and how regularly such communication takes place can tell an adversary a great deal. This is a powerful tool in the wrong hands.

For example, even if you use a securely encrypted messaging service such as WhatsApp, Facebook will still be able to tell who you are messaging, how often you message, how long you usually chat for, and more. With such information, it would be easy to discover that you were having an affair, for example.

Although the NSA does target individual communications, its primary concern is the collection of metadata. As NSA General Counsel Stewart Baker has openly acknowledged,

“Metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.

Technologies such as VPNs and Tor can make the collection of metadata very difficult. For example, an ISP cannot collect metadata relating to the browsing history of customers who use a VPN to hide their online activities.

Note, though, that many VPN providers themselves log some metadata. This should be a consideration when choosing a service to protect your privacy.

Please also note that mobile apps typically bypass any VPN that is running on your device, and connect directly to their publishers’ servers. Using a VPN, for example, will not prevent WhatsApp sending metadata to Facebook.

Identify Your Threat Model

When considering how to protect your privacy and stay secure on the internet, carefully consider who or what worries you most. Defending yourself against everything is almost impossible. And any attempt to do so will likely seriously degrade the usability (and your enjoyment) of the internet.

Identifying to yourself that being caught downloading an illicit copy of Game of Thrones is a bigger worry than being targeted by a crack NSA TAO teamfor personalized surveillance is a good start. It will leave you less stressed, with a more useable internet and with more effective defenses against the threats that really matter to you.

Of course, if your name is Edward Snowden, then TAO teams will be part of your threat model…

I will discuss steps you should take to help identify your threat model in an upcoming article on BestVPN.com. In the meantime, this article does a good job of introducing the basics.

Use FOSS Software

Ultimate Privacy Guide Illustration 03 01The terrifying scale of the NSA’s attack on public cryptography, and its deliberate weakening of common international encryption standards, has demonstrated that no proprietary software can be trusted. Even software specifically designed with security in mind.

The NSA has co-opted or coerced hundreds of technology companies into building backdoors into their programs, or otherwise weakening security in order to allow it access. US and UK companies are particularly suspect, although the reports make it clear that companies across the world have acceded to NSA demands.

The problem with proprietary software is that the NSA can fairly easily approach and convince the sole developers and owners to play ball. In addition to this, their source code is kept secret. This makes it easy to add to or modify the code in dodgy ways without anyone noticing.

Open source code

The best answer to this problem is to use free open source software (FOSS). Often jointly developed by disparate and otherwise unconnected individuals, the source code is available to everyone to examine and peer-review. This minimizes the chances that someone has tampered with it.

Ideally, this code should also be compatible with other implementations, in orderto minimize the possibility of a backdoor being built in.

It is, of course, possible that NSA agents have infiltrated open source development groups and introduced malicious code without anyone’s knowledge. In addition, the sheer amount of code that many projects involve means that it is often impossible to fully peer-review all of it.

Despite these potential pitfalls, FOSS remains the most reliable and least likely to be tampered with software available. If you truly care about privacy you should try to use it exclusively (up to and including using FOSS operating systems such as Linux).

Steps You Can Take to Improve Your Privacy

With the proviso that nothing is perfect, and if “they” really want to get you “they” probably can, there are steps you can take to improve your privacy.

Pay for Stuff Anonymously

One step to improving your privacy is to pay for things anonymously. When it comes to physical goods delivered to an actual address, this isn’t going to happen. Online services are a different kettle of fish, however.

It is increasingly common to find services that accept payment through Bitcoin and the like. A few, such as VPN service Mullvad, will even accept cash sent anonymously by post.Ultimate Privacy Guide Illustration 04 01

Bitcoin

Bitcoin is a decentralized and open source virtual currency that operates using peer-to-peer technology (much as BitTorrent and Skype do). The concept is particularly revolutionary and exciting because it does not require a middleman to work (for example a state-controlled bank).

Whether or not Bitcoins represent a good investment opportunity remains hotly debated, and is not within the remit of this guide. It is also completely outside of my area of expertise!

Source: Bestvpn.com

Share
Related Stories
Image
09-February-2024

Stakeholders Explore AI in Cybersecurity at Tek Experts C-Suite Forum

By Adedapo Adesanya Cytek Security, the sister company of Tek Experts, a leading provider of tech talent solutions, recently hosted its inaugural c-suite roundtable, bringing together industry leaders across financial services, tech, and consulting sectors to explore the evolving landscape of cybersecurity and the critical role of artificial intelligence (AI) in bolstering defences in today’s world. This is part of efforts by Tek Experts and Cytek Security to foster knowledge-sharing initiatives in the industry while innovating to adapt to the evolving cybersecurity landscape in Nigeria. At the event themed Beyond Automation – Unleashing the Strategic Power of AI for Cybersecurity,

Image
06-February-2024

NDPC Records 12.7% Increase in Revenue to N6.2bn in 2023

By Adedapo Adesanya The Nigeria Data Protection Annual Report has revealed that the country’s data protection cumulative revenue in 2023 rose by 12.73 per cent to N6.2 billion from N5.5 billion in 2022. The report was unveiled at the second-anniversary dinner and awards organised by the Nigeria Data Protection Commission (NDPC) recently in Abuja. Established on February 4, 2022, the NDPC was mandated to ensure data privacy and protection in the country, and that the rights of citizens are in line with global standards. The report stated, “Other areas that the rates increased included Compliance Audit Report which recorded 3,451

Image
17-January-2024

AI-Based Test Automation Tools: Shaping the Future of Software Testing

In the dynamic landscape of software development, things are changing fast for the betterment of everyone. DevOps, Agile, Continuous Testing, TestOps, DevTestOps, all these practices are taking product quality to a new peak every day. The emergence of AI-based test automation tools marks a pivotal shift towards more intelligent, efficient, and reliable testing processes. These tools are not mere enhancements to traditional testing methods; they are revolutionizing the way developers and testers approach software quality assurance. By harnessing the power of artificial intelligence, these tools are addressing some of the most pressing challenges in software testing, offering innovative solutions that

Image
06-February-2024

The Growing Importance of Privacy Amongst Customers and How Businesses Should Cater to it

By Kehinde Ogundare and Veerakumar Natarajan Privacy is a growing concern for technology consumers worldwide. While there was a time when that may not have been the case for countries like Nigeria and Kenya, that’s no longer the reality. As connectivity becomes more affordable and ubiquitous, Kenyans and Nigerians have become increasingly tech-savvy and conscious regarding how much data they share with technology companies and what the latter is doing with it. In the face of these growing concerns, companies operating in Africa need to be mindful of the increasing privacy mindset of their customers. Aside from regulatory compliance, companies

More Stories
Image
21-July-2020

SEC to Digitalise Operations for Investor-Friendly Market

By Dipo Olowookere Efforts are currently being made by the management to fully automate operations of the Securities and Exchange Commission (SEC). Director-General of the agency, Mr Lamido Yuguda, said on Monday that this move will not only reduce cost but also increase efficiency. Speaking during a visit to the Minister for Communication and Digital Economy, Mr Isa Ali Pantami, in Abuja, he said this step was being taken to conform to the current technological trends to bring about a more efficient capital market. According to him, automating most of the commission’s processes would also make the capital market friendlier

Image
05-August-2019

DMO Begins Sale of Fresh 2, 3-Year FGN Savings Bonds

By Adedapo Adesanya The Federal Government of Nigeria (FGN), through the Debt Management Office (DMO), has commenced the issuance of new 2-year and 3-year Saving Bonds maturing in August 2021 and August 2022 respectively. The bonds, according to a circular released by the debt office, would be offered to investors at 10.30 percent for the 2-year paper and 11.30 percent for the 3-year notes. In the notice to investors, the DMO said subscription for the monthly exercise commenced on Monday, August 5 and is expected to close on Friday, August 9, with the settlement date set for August 14, 2019.

Image
02-September-2022

Crude Oil Plunges as Fresh Chinese Lockdown Grips Market

By Adedapo Adesanya Crude oil tumbled more than 3 per cent on Thursday as new COVID-19 lockdown measures in China added to worries of high inflation and interest rate hikes the market was already battling with. The price of Brent crude plunged by $3.28 or 3.4 per cent to trade at $92.36 a barrel while the US West Texas Intermediate (WTI) crude fell by $2.94 or 3.3 per cent to $86.61 per barrel. Investors are wary about the impact of the latest COVID-19 curbs in China, where the city of Chengdu on Thursday was the latest to order a lockdown

Image
30-June-2023

Naija Super 8 Unveils Akwa United, Sporting Lagos as Wildcard Teams

By Dipo Olowookere Akwa United and Sporting Lagos have been unveiled as the wildcard teams for the 2023 edition of Naija Super 8 by the organisers of the competition. The two teams were announced at Naija Super 8 draws broadcast live on SuperSport on Wednesday night. They will join six other teams which earlier qualified for the finals of the football tournament fixed for July 7 to 16, at the Mobolaji Johnson Arena in Lagos. Wednesday’s draws were conducted by former Super Eagles player, Victor Ikpeba, and Bendel Insurance player, Okon Ini-Obong, who won the best goal at the just-concluded

Image
28-December-2020

Richway MFB Emerges 2020 Best-in-Class Microfinance Bank

By Adedapo Adesanya Richway Microfinance Bank, one of Nigeria’s leading microfinance banks, has emerged as the 2020 Overall Best-in-class Microfinance Bank in Nigeria at the Developments in Africa Merit Awards held recently in Lagos. It was disclosed that the bank emerged the overall winner ahead of several other reputable small lenders in the country. The bank was adjudged based on its commitment to supporting small and medium scale enterprises, strong digital banking structure, excellent corporate governance, robust risk management framework and diverse financial products for entrepreneurs across Nigeria. The award, according to the organisers, is in recognition of Richway Microfinance

Image
20-October-2016

Gunmen Kill Ondo Governor Convoy’s CSO

By Dipo Olowookere Chief Security Officer (CSO) to the Ondo State Government Office in Akure, Mr Idowu Oyewole, has been murdered by some unidentified gunmen in the state. Mr Oyewole was a Deputy Superintendent of Police (DSP) before his murder. He was reportedly killed at midnight on Wednesday on a street close to his residence located on Akure/Owo Expressway. About six gunmen stormed his area and killed him during a raid. A bullet was said to have hit him on the chest when he engaged the alleged armed robbers in a gun battle. According to reports, the robbers had stormed

Image
12-October-2023

Crude Oil Down as Saudi, Russia Promise to Stabilise Market

By Adedapo Adesanya  Crude oil prices fell further on Wednesday as fears of disruption to supplies due to conflict in the Middle East receded a day as Saudi Arabia and Russia pledged to help stabilise the market. Brent futures dropped $1.83 or 2.1 per cent to settle at $85.82 a barrel while the US West Texas Intermediate (WTI) crude was down by $2.48 or 2.9 per cent to quote at $83.49 a barrel. Brent and WTI had surged more than 4 per cent on Monday as the clashes raised fears that the conflict could spread beyond Gaza but bounced off

Image
03-March-2023

Ooredoo Tunisia Enhances Customers’ Loyalty Via Personalized Offers

By Aduragbemi Omiyale To strengthen its customers’ loyalty and engagement, a leading mobile communication services provider in Tunisia, Ooredoo, is deploying the MobiLytix Marketing Studio platform of Comviva. Both parties agreed to the use of MobiLytix to leverage real-time customer interaction data in conjunction with a rich unified customer profile to enable real-time, contextual digital experience across all customer touchpoints. Through this means, customers would be segmented across various categories and provided with an interactive best-fit offer leading to better value propositions and increased revenue. In addition, Comviva would provide its data science services with pre-built AI/ML models for faster

Ad
Ad
Recent Stories
Image
02-March-2024

MTF Class of 2023 to Premiere Her Dark Past, Grown

By Modupe Gbadeyanka Two feature films will be premiered this weekend exclusively on the Africa Magic Showcase channel 151 and Africa Magic Urban channel 153 by the students of the MultiChoice Talent Factory (MTF). The two pieces of art titled Grown and Her Dark Past are the final projects of the MTF Class of 2023 students, a statement from the organisation said. The MTF is a leading film school in West Africa for young, talented and passionate filmmakers. It was established by the media platform to grow the region’s creative industry. Grown premieres on Africa Magic Showcase at 8.30 pm

Image
02-March-2024

Mandela’s Heirs Lose Power in South Africa

By Alexander Braterskiy South African authorities warn that if the opposition wins the parliamentary elections, the country may change course and leave the informal BRICS economic bloc, which includes Russia. The position of the African National Congress party, which has been in power since the collapse of apartheid, is indeed not the best, as shown by the municipal elections held earlier in the country. The opposition accuses the president of corruption and abuse of power, as well as an inability to cope with the country’s energy crisis. The ANC crisis occurred on the 30th anniversary of the first free elections

Image
02-March-2024

CAA Reaffirms Commitment to Climate Innovation for Sustainable Future

By Modupe Gbadeyanka A leading social enterprise focused on environmental sustainability, Climate Action Africa (CAA), has reaffirmed its commitment to being at the forefront of driving climate innovation for a sustainable future. The organization, which is a key participant at the four-day Omniverse Summit 2024 in Lagos, emphasised the need to integrate environmental sustainability models, technology, and community-driven innovation to address climate change challenges. It promised to foster an inclusive climate action ecosystem through innovation, which it said can be used to identify and scale solutions to address the imminent climate crisis in Nigeria and Africa as a whole, The

Image
02-March-2024

Endosurvivors Foundation Set For Another Endometriosis Awareness

By Adedapo Adesanya EndoSurvivors International Foundation (ESIF), an NGO championing endometriosis awareness in Nigeria, has announced its upcoming events in commemoration of the Global Endometriosis Advocacy Month in March, fondly tagged March4Endo by advocates all over the world.  Endometriosis is a chronic and inflammatory condition that affects approximately 1 in 10 girls and women in Nigeria and on a global scale. This sums up to about 190 million affected girls/women around the world, about the population of Nigeria in 2018.  The World Health Organisation (WHO) recognizes that endometriosis has significant social, public health, and economic implications leading to a decrease

Image
02-March-2024

CSCS, FrieslandCampina Lift NASD OTC Bourse by 0.31%

By Adedapo Adesanya The NASD Over-the-Counter (OTC) Securities Exchange returned to the positive territory after it gained 0.31 per cent on Friday, March 1, thanks to the duo of Central Securities Clearing System (CSCS) Plc and FrieslandCampina Wamco Nigeria Plc. CSCS Plc added 81 Kobo to its value to sell for N19.46 per unit compared with the preceding day’s N18.65 per unit, and FrieslandCampina improved by N1.15 to settle at N71.4o per share, in contrast to Thursday’s closing price of N70.25 per share. However, Aradel Holdings Plc continued its price depreciation yesterday as it shed N6.75 to sell at N2,395.00

Image
02-March-2024

Naira Now N1,548.25 at Official Market, N1,560/$1 at Black Market

By Adedapo Adesanya The Naira sustained its gradual recovery against the US Dollar in the Nigerian Autonomous Foreign Exchange Market (NAFEM) on Friday, March 1, appreciating by 2.94 per cent or N46.86 to sell at N1,548.25/$1, in contrast to the N1,595.11/$1 it was traded on Thursday. Also, in the spot market, the Nigerian currency improved its value against the Pound Sterling during the trading day by N90.13 to close at N1,956.06/£1 versus the previous day’s N2,046.19/£1 and against the Euro, it gained N76.39 to trade at N1,675.25/€1, in contrast to the N1,751.64/€1 it closed a day earlier. The supply of

Image
02-March-2024

Crude Oil Jumps 2% as Traders Sight Possible OPEC+ Cuts

By Adedapo Adesanya Crude oil appreciated by about 2 per cent on Friday as traders awaited a decision from the Organisation of the Petroleum Exporting Countries and allies (OPEC+) on supply agreements for the second quarter. Yesterday, the price of Brent futures went up by $1.64 or 2 per cent to $83.55 per barrel and the US West Texas Intermediate (WTI) futures rose by $1.71 or 2.19 per cent to $79.97 a barrel. For the week, Brent added around 2.4 per cent while WTI gained more than 4.5 per cent. Analysts noted that the expectation that OPEC+ is going to

Image
02-March-2024

NGX Indices Nosedive by 1.23% as Traders Resume Profit-Taking

By Dipo Olowookere The bears made a quick return to the Nigerian Exchange (NGX) Limited after leaving the stage for the bulls for a day as investors reassessed the impact of the hike in the benchmark interest rate by the Central Bank of Nigeria (CBN) on Tuesday on their investments. On Friday, the key performance indicators of the bourse closed lower by 1.23 per cent as a result of renewed selling pressure, especially in the energy and industrial goods sectors. Business Post reports that at the close of transactions on the first trading session of March 2024, the industrial goods

Image
01-March-2024

CBN Revokes Operational Licences of 4,173 BDC Operators [FULL LIST]

By Aduragbemi Omiyale The operational licences of 4,173 Bureaux De Change (BDC) operators have been revoked by the Central Bank of Nigeria (CBN). A statement signed by the acting Director of the Corporate Communications Department of the apex bank, Mrs Hakama Sidi Ali, on Friday disclosed that the action was taken because the affected BDCs did not adhere to regulatory provisions. The central bank said the BDCs did not pay all necessary fees, including licence renewal, within the stipulated period in line with guidelines. It also said they failed to give account of returns in line with the guidelines, and

Image
01-March-2024

BREAKING: Popular Yoruba Comic Actor Sisi Quadri Dies

By Modupe Gbadeyanka A popular Yoruba comic actor, Mr Tolani Quadri Oyebamiji, otherwise known as Sisi Quadri, has died, according to reports. However, the cause of his death is still unclear as of the time of filing this report. There are speculations that he briefly fell ill before his passing, though he was seen publicly some months ago with a fellow comic actor, Sanusi Izihaq, who is well-known as Apa or Apankufor. Sisi Quadri, who died at the age of 44, was recently gaining fresh public attention with his comic act with Apa and others. His demise has hit the