Featured

RIP Tony Lindo

As the years unfold, the inevitability of mortality becomes increasingly apparent, leading to the passing of individuals who have made significant contributions to our nation’s development. With profound sadness, we bid farewell to Basil Anthony “Tony” Lindo, a dear cousin and close friend to my parents, Joan Lindo and Rupert Lindo. Tony Lindo was a paragon of kindness, thoughtfulness, and unwavering loyalty to his family. His absence will be deeply felt by Jamaica, a nation that will mourn the loss of a steadfast and beloved figure. May his soul find eternal peace, and extend our heartfelt condolences to his bereaved family. Tony Lindo’s legacy will continue to inspire and resonate with those who cherished his memory.

From Joan Lindo and Alexander Lindo

Valjour Royale

My Advice To You

There was a demonic cult came after my family and I but I, Alexander Lindo want to make it clear to every individual on earth that is part of the remains: no-one has anything to get from me, not time, not money, NOTHING. I owe no-one any obligation and if someone misled you to believe that you have something to get from me then you are greatly mistaken. Envying, grudging and trying to spite me will do NOTHING to change that fact. Save the lies, fake smiles and hypocrisy. I love myself more than ever, and love myself more and more each day, I make no apologies to any human being on earth for that. It is how I have managed to achieve such greatness and success, despite several acts of “the cult” to destroy me. Hundreds of thousands tried to break me, do not even try. I have nothing to hide, nothing to prove. I am as naked as the day I was born.

Moving Out

I noticed many people have been coming up to my mother and I and asking us when we are leaving Jamaica. I want to set the record straight and assure everyone, we will be here for 2026 and beyond. Oh yeah. And our home is still Not For Sale in case you were asking. No lawyer and no law firm has any control or say over us or our empire. If you find anyone speaking in support of that illusion then what you are dealing with is as such, criminals part of the cult. Our estate is not and never was at any time in court, The probate was granted and all taxes were payed off in full. The slate is clean.

I would also like to return the question: When are you moving out. After attempted murder harassment, espionage. Imagine while I am in the privacy of my home, in my room and on my computer or phone, these criminals have setup devices from within their homes to observe what I am doing in an effort to stop me from progress. The individuals’ homes involved in these attacks must be raided and the perpetrators arrested, this area must be completely cleansed of the illegal cult. For there can be no peace without justice.

My mother and I are entitled to a public apology and compensation from all those involved for the treason committed against us for over 2 decades. Officials passing on the streets would be completely oblivious as to what is taking place in our community as the community may appear to be quiet while passing through, meanwhile the scammers terrorize us in our own house while residing in nearby houses with the use of these illegal devices. Criminals in secret societies such as lodge/freemason (who clearly run many businesses in the private sector) blacklisted my mother and I in an attempt to block us from getting any prosperity or progress while they all continue to parasite off of us. Stalking us and penetrating our contacts, if they have wealth, inviting them to be a part of their cult, scamming them if they have money and destroying their businesses as well and eventually sacrificing them and dissolving their business.

Did you think committing treason against us, our government and our country, would make us run away from what is ours? Did you think that creating illusions and trying to bully them into reality, would make them exist. Whats real is real and what is fake is fake. What are you gonna do now, you’re gonna undermine the government and turn off their water or light in the entire area? While you are at it, why not just KILL YOURSELF, it would make the world a better place. Even on Christmas and New Years Eve, these parasites in their desperation were working very hard trying to undermine or government, our allies and us, trying hard to make us uncomfortable in our home and sabotaging our entire community in the process.

As if Hurricane Melisa was not enough, despite our very own estate sustaining damage and many are now homeless in the west, north, southern. The parasites who should be working to rebuild Jamaica are up here in our area, doing no work, fighting us and our government, for our own empire that they can never have, no matter who they align themselves with, how many goats, pigs or people they sacrifice.

Proverbs 23:10-11

10 “Do not move an ancient boundary marker Or encroach on the field of the fatherless. 11  For their Defender* is strong; He will take up their cause against you..”

Deuteronomy 19:14

“Do not move your neighbor’s boundary stone set up by your predecessors in the inheritance you receive in the land the LORD your God is giving you to possess.”

Micah 2: 2-4

2 “They desire fields and seize them; Also houses, and they take them; They defraud a man of his house, A man of his inheritance. 3  Therefore this is what Jehovah says: ‘Here I am devising against this family a calamity from which you will not escape.* You will no longer walk haughtily, for it is a time of calamity. 4  In that day people will recite a proverb concerning you,And they will bitterly lament over you. They will say: “We are completely devastated!”

Isaiah 5:8

“Woe to you who add house to house and join field to field till no space is left and you live alone in the land.”

You’re gonna play loud music at 3am and pretend like anyone is at your fake “non-existant” party having fun? Are you going to pretend that you are happy, when you have wasted your life, trying to steal ours? Spending countless hours pretending to be someone of virtue and someone who is hardworking when all the money you’ve made is from scamming, stealing real estate and murdering victims. Pretending to control what you do not own. Now your bones are brittle and you fade away like those who came before you, who all left empty handed. Do you think that anything you do or say is going to change that. The slate remains clean.

Manipulation

Be cautious of manipulation. Members of the satanic cult will be loitering around you, stalking you, physically and online, penetrating everyone around you, through needs they may have: whether it be helping to pay off their loans, medical bills, etc. Through this endeavor your allies will become a puppet of the cult, totally under their control; be aware of this. Money will also be used as a weapon of control. We have learned first hand how these demons work. Your enemy will play the victim, and try to invoke their sins into you, they will try to make you out to be the one with the problem, even though they are the one creating and contributing to the problem. Using these methods they will try to isolate you and create war and contention between you and your allies.

Ephesians 4:14

“So we should no longer be children, tossed about as by waves and carried here and there by every wind of teaching by means of the trickery of men, by means of cunning in deceptive schemes.”

Look out for those who come on strong then use “silent treatment” whereby they go MIA expecting you to chase after them. Do not chase them, instead rebuke them and if necessary, let them go. They will rapture your peace and create chaos to keep you on edge, making you walk on eggshells. This gives them “power” over you. They will work hard at creating tension, turning allies against you to further their demonic agenda; Be cautious of this! In continuation, members of this cult will try to make you feel isolated. Always remember that there are billions of people on our planet. Nobody can be backed into a corner, you are never alone. Speak up, let others know how you feel, who hurt you, and who is trying to rape you of your youth, pride, sanity and dignity.

1 Peter 3:10-23

10 “For whoever would love life and see good days must guard his tongue from bad and his lips from speaking deception. 11  Let him turn away from what is bad and do what is good; let him seek peace and pursue it. 12  For the eyes of Jehovah are on the righteous, and his ears listen to their supplication, but the face of Jehovah is against those doing bad things.”

Hypocrisy

Unless you are for us we couldn’t care less who you think you are. Do not bring me your hypocrisy. Do not give me your advice or your lips. It means absolutely nothing to me. Do not ask me if I am ok, while you hide behind hypocrisy doing nothing to help.

James 2

15  “If any brothers or sisters are lacking clothing and enough food for the day, 16  yet one of you says to them, “Go in peace; keep warm and well fed,” but you do not give them what they need for their body, of what benefit is it? 17  So, too, faith by itself, without works, is dead. 18  Nevertheless, someone will say: “You have faith, and I have works. Show me your faith without the works, and I will show you my faith by my works.”

Do not act as if there is a massive weight or burden on our shoulders that we cannot manage, that we have problems that cannot be solved, deceiving others and issuing fake narrative. As mentioned before earlier on we have no loans and no debts, thankfully. We have no shame for WE HAVE NOTHING TO HIDE AND NOTHING TO PROVE!

Proverbs 10

“The one walking in integrity will walk in security, But the one making his ways crooked will be found out.”

Cease and desist from stalking us and conducting espionage on us and our property, using illegal surveillance equipment (originally intended to rescue civilians) to intercept our movements, vibrations and conversations, to further your agenda of defamation and sabotage: spreading lies, hate, envy, in an effort to block prosperity.

Matthew 5:11 (Jesus’ words)

“Blessed are you when others revile you and persecute you and utter all kinds of evil against you falsely on my account.”

Leviticus 19:16

“You shall not go around as a slanderer among your people, and you shall not stand up against the life of your neighbor: I am the LORD.”

Proverbs 6:16-19

“There are six things that the LORD hates, seven that are an abomination to him: haughty eyes, a lying tongue, and hands that shed innocent blood, a heart that devises wicked plans, feet that make haste to run to evil, a false witness who breathes out lies, and one who sows discord among brothers.”

We will be looking compensation from all those involved in the illegal espionage. Do not mention our name in any derogatory manner, we will be making an account for defamation. Do to not discuss “debts” unless it is the debts that are to be paid to us. We are debt free. Envying, grudging and trying to spite us will do NOTHING to change that fact. Do not try to invoke your sins into us. Your burden of hate, envy is not ours to bear.

Job 34: 22-26

22  “There is no darkness or deep shadow

Where wrongdoers can conceal themselves.

23  For God has not set an appointed time for any man

To appear before him in judgment.

24  He breaks the powerful without needing to investigate

And sets up others in their place.

25  For he knows what they are doing

He overthrows them during the night, and they are crushed.

26  He strikes them for their wickedness,

In a place where all can see.”

Repentance

You need to repent for sins and ask Jehovah to forgive you. I am not your scapegoat. You did it all by yourselves. I have no regrets, God shines through and through.

Act 3

19  “Repent, therefore, and turn around so as to get your sins blotted out, so that seasons of refreshing may come from Jehovah himself.”

TO MY FANS

Love Yourself and others, 

Whether white, yellow, brown, black, Jewish, Asian, Indian, gay or straight.

1 John 4:8-20

“If anyone says, “I love God,” and yet is hating his brother, he is a liar. For the one who does not love his brother, whom he has seen, cannot love God, whom he has not seen. 21 And we have this commandment from him, that whoever loves God must also love his brother.”

Matthew 22:37-40

37  “He said to him: ‘You must love Jehovah your God with your whole heart and with your whole soul and with your whole mind. 38  This is the greatest and first commandment. 39  The second, like it, is this: ‘You must love your neighbor as yourself.’ 40  On these two commandments the whole Law hangs, and the Prophets.”

Matthew 7:1-2

1 “Stop judging that you may not be judged; 2  for with the judgment you are judging, you will be judged, and with the measure that you are measuring out, they will measure out to you.”

Luke 6:37

“Moreover, stop judging, and you will by no means be judged; and stop condemning, and you will by no means be condemned.

James 3:9

“With it we praise Jehovah, the Father, and yet with it we curse men who have come into existence “in the likeness of God.”

Romans 14:4

“Who are you to judge the servant of another? To his own master he stands or falls.”

Galatians 3:28

“There is neither Jew nor Greek, there is neither slave nor freeman, there is neither male nor female, for you are all one in union with Christ Jesus.”

I have deliberately quoted the above great scriptures from the Bible written by inspired servants of God. On the other side of things, there are many deceptive workers of Satan out there that try to use the Bible further their own blasphemous agenda as a weapon to condemn, segregate and spread hate.

Remember that when the KKK was established it was a Christian organization claiming to do the work of God, by murdering those who were not deemed “pure” in “the eyes of God”. Many of the quotes used by the KKK to carry out their hate was taken from the First Testament of the original Bible.

Genesis 9:20-27

“Now Noah started off as a farmer, and he planted a vineyard. 21  When he drank of the wine, he became intoxicated, and he uncovered himself inside his tent. 22  Ham, the father of Caʹnaan, saw his father’s nakedness, and he told his two brothers outside. 23  So Shem and Jaʹpheth took a garment and put it upon both their shoulders and walked in backward. Thus they covered their father’s nakedness while their faces were turned away, and they did not see their father’s nakedness. 24  When Noah woke up from his wine and learned what his youngest son had done to him, 25  he said: “Cursed be Caʹnaan. Let him become the lowest slave to his brothers.” 26  And he added: “Praised be Jehovah, the God of Shem, And let Caʹnaan become a slave to him. 27  Let God grant ample space to Jaʹpheth, And let him reside in the tents of Shem. Let Caʹnaan become a slave to him also.”

This was by far the most prominent “justification” for racial hierarchy and subjugation (including violence to enforce it). The passage describes Noah cursing his grandson Canaan (son of Ham) after Ham sees Noah naked and dishonors him. The KKK and pro-slavery/pro-segregation advocates falsely claimed:

  • Ham’s descendants (misidentified as Black Africans) were eternally cursed to servitude.
  • Black people were inherently inferior and destined for enslavement or control by whites (descendants of Shem and Japheth).

Genesis 11:1-10

11 “Now all the earth continued to be of one language and of one set of words.* 2  As they traveled eastward, they discovered a valley plain in the land of Shiʹnar,a and they began dwelling there. 3  Then they said to one another: “Come! Let us make bricks and bake them with fire.” So they used bricks instead of stone, and bitumen as mortar. 4  They now said: “Come! Let us build a city for ourselves and a tower with its top in the heavens, and let us make a celebrated name for ourselves, so that we will not be scattered over the entire face of the earth.” 5  Then Jehovah went down to see the city and the tower that the sons of men had built. 6  Jehovah then said: “Look! They are one people with one language, and this is what they have started to do. Now there is nothing that they may have in mind to do that will be impossible for them. 7  Come! Let us go down there and confuse their language in order that they may not understand one another’s language.” 8  So Jehovah scattered them from there over the entire face of the earth, and they gradually left off building the city. 9  That is why it was named Baʹbel,* because there Jehovah confused the language of all the earth, and Jehovah scattered them from there over the entire face of the earth. 10  This is the history of Shem”

This scripture claimed God intentionally separated races/languages for segregation.

Acts 17:26

“From one man he made all the nations… and he marked out their appointed times in history and the boundaries of their lands”

Misapplied to argue God ordains racial/national separation and segregation.

Ephesians 6:5

“Slaves, be obedient to your human masters, with fear and trembling in the sincerity of your hearts, as to the Christ.”

Used workers of Satan to defend slavery as biblical, extending to racial subjugation.

In the old testament Ezra 9-10 and Nehemiah 13 was used criminalize interracial marriage and justify racism.

In contrast:

Genesis 1:27 says

“So God created mankind in his own image, in the image of God he created them; male and female he created them.”

Another instance is the practice of gay conversion therapy refers to a range of discredited practices aimed at changing, suppressing, or “curing” a person’s sexual orientation. These efforts have subjected many gay and lesbian individuals—especially youth—to severe psychological, emotional, physical, and sometimes sexual abuse. Major medical and mental health organizations (e.g., American Psychological Association, World Health Organization) have long concluded that conversion therapy is ineffective, unethical, and harmful, often increasing risks of depression, anxiety, substance abuse, self-harm, and suicide.

In the bible Jesus spoke about various topics including marriage, divorce, adultery, sexual immorality in general, love, mercy, judgment, forgiveness, and more but never specifically same-sex behavior.

Hate toward Jews (antisemitism) has a long, tragic history, often intertwined with religious justifications, including misuse of Bible passages—primarily from the New Testament—to portray Jews collectively as enemies of God, “Christ-killers,” or demonic. This has fueled persecution, pogroms, expulsions, blood libels (false accusations of ritual murder), and contributed to the Holocaust.

I must reinforce: These references are not being used as a weapon or to pour salt on old wounds but merely as an illustration to show Satan’s sinful desires to create chaos spread hate, segregation and make God’s followers hate him and each other in an effort to break families apart under the theme divide and conquer. Based upon ones motives the bible can be used to spread love or hate. Through Satan’s hate and envy for God, he wishes to destroy everything and everyone he created. If you cast judgement, or use the words of other “imperfect” inspired men to justify your actions to condemn others based upon race, religion or sexual orientation then not only are you a hypocrite but you have committed the greatest sin and are no better than Satan himself.

James 4:12

“There is one lawgiver and judge who is able to save and to destroy. So who, then, are you to judge your neighbor?”

Romans 14:10–12

“Why do you pass judgment on your brother or sister? … For we will all stand before the judgment seat of God.”

John 8:1-11

1 “Jesus went unto the mount of Olives. 2 And early in the morning he came again into the temple, and all the people came unto him; and he sat down, and taught them. 3 And the scribes and Pharisees brought unto him a woman taken in adultery; and when they had set her in the midst, 4 They say unto him, Master, this woman was taken in adultery, in the very act. 5 Now Moses in the law commanded us, that such should be stoned: but what sayest thou? 6 This they said, tempting him, that they might have to accuse him. But Jesus stooped down, and with his finger wrote on the ground, as though he heard them not. 7 So when they continued asking him, he lifted up himself, and said unto them, He that is without sin among you, let him first cast a stone at her. 8 And again he stooped down, and wrote on the ground. 9 And they which heard it, being convicted by their own conscience, went out one by one, beginning at the eldest, even unto the last: and Jesus was left alone, and the woman standing in the midst. 10 When Jesus had lifted up himself, and saw none but the woman, he said unto her, Woman, where are those thine accusers? hath no man condemned thee? 11 She said, No man, Lord. And Jesus said unto her, Neither do I condemn thee: go, and sin no more.”

Pride, Pleasure & Happiness

When you have achieved, be proud, you are here on earth for a limited time,

Have no shame in celebrating yourself and your achievements, 

Cherish others, make them feel wanted and special,

Let no-one bully you or steal your pride, pleasure, and happiness.

Ecclesiastes 3:12-13

12 “I have concluded that there is nothing better for them than to rejoice and to do good during their life, 13  also that everyone should eat and drink and find enjoyment for all his hard work. It is the gift of God.”

Psalms 128:2

“You will eat what your hands worked hard to produce. You will be happy and will enjoy prosperity.”

Do not allow anyone to make you sway from God, because they try to lead you to believe that he hates you.

Rebuke blasphemous demons who attempt to invoke illusions, 

and attempt to steal God’s blessings and opportunities from you,

Speak your mind, let no-one bully you into submission,

Refrain from allowing anyone to make you feel apprehensive or uncomfortable.

Proverbs 29

25  “Trembling at men is a snare,

But the one trusting in Jehovah will be protected.”

Psalm 27

27  “Jehovah is my light and my salvation.

Whom should I fear?”

Remember that no human can destroy you, once you have God as your protector and defender,

Conclusion

Never to be broken, never to be shaken, the slate is clean.

Psalm 27

2  “When evil men attacked me to devour my flesh,

My adversaries and my enemies were the ones who stumbled and fell.”

I HAVE NO REGRETS, NO TIME TO LOSE!

Acts 24:16

“Because of this I always strive to maintain a clear conscience before God and men.”

Romans 8:1

“Therefore, those in union with Christ Jesus have no condemnation.

This is from the heart. I meant every word.

You won’t be bulling me to weaken or remove this post.

It will be here indefinitely.

The actions taken by our advisories will not change our way of thinking, acting or living.

I will never bow to Satan, even when cloaked as a saint. There are many false prophets in our world, be strong and have discernment. Discernment is the heavenly ability to judge and perceive differences and make wise decisions and to understand complex situations.

Romans 12:2

“Do not be conformed to this world, but be transformed by the renewal of your mind, that by testing you may discern what is the will of God, what is good and acceptable and perfect.”

Philippians 1:9-10

“And this is my prayer: that your love may abound more and more in knowledge and depth of insight, so that you may be able to discern what is best…”

Like a person who has endured in an abusive relationship, where the predator uses threats and mentalities of bully-ism to keep their victim silent, enslaved and submitted to them do not tolerate abuse of any kind whether it be verbal, physical or sexual. Call out the oppressor and fight back for your rights, freedom, peace, prosperity and happiness. Do not wait until you are dead to live. God blessed us with one life here on this beautiful earth, do not allow mere mortals to deprive you of it.

Psalm 94:20–23

“Can a corrupt throne be allied with you—one that brings on misery by its decrees? … The LORD will repay them for their sins and destroy them for their wickedness.”

Matthew 18:6

“But who so shall offend one of these little ones which believe in me, it were better for him that a millstone were hanged about his neck, and that he were drowned in the depth of the sea.”

After reading this post, I hope the message is clear.

God keeps shining through.

We remain thankful and loyal to God, our allies and our government.

God is in control!

Cybersecurity

Both my mother and I are highly security-conscious individuals. Despite our vigilance, we recently fell victim to a WhatsApp hack through a zero-day vulnerability. A zero-day vulnerability refers to a security hole or vulnerability in a computer system that remains undisclosed to its developers or anyone capable of mitigating it. Until the vulnerability is patched, threat actors can exploit it through a zero-day exploit or zero-day attack. The term “zero-day” originally denoted the number of days since a new software release to the public. Consequently, “zero-day software” was obtained by hacking into a developer’s computer before its release. Over time, the term was extended to encompass the vulnerabilities that enabled this hacking and the number of days that the vendor had to address them.

As mentioned before and is common knowledge, demonic forces descended upon us and our people. Our devices were compromised without any involvement or error from our part. Subsequently, the device was utilized against us for surveillance purposes. As the Government of Jamaica endeavors to combat cybercrime and enhance security, it is imperative to emphasize that individuals of wealth, prominence, or possessing extensive empires that unscrupulous entities seek to exploit may become potential targets of this hazardous attack. It is crucial to recognize that these threats extend beyond governments, journalists, and other entities. 

The Ministry of National Security recently posted on the topic of Cyber Security, designating October as Cybersecurity month. discussing their push for enhanced cyber security. I am 100% percent behind this initiative as we recently became victims despite our rigid security methods. 

Coming from an IT background. I used to build and sell PC’s running Linux and Windows. Through various meetings and functions with diplomats and friends of my mother and father I used to repair their PCs and install security software to protect them and their loved ones. I was part of the Spread Firefox movement which helped dethrone Microsoft’s Internet Explorer as the world’s most popular web browser. Internet Explorer was a terrible web browser that deliberately fought against open standards compliance, breaking the web for all browsers that was not Internet Explorer ensuring Microsofts dominance. 

Essentially most websites were designed specifically for Internet Explorer’s broken engine and would refuse to run in any other web browser. Back then, you had to have Windows and Internet Explorer to login to your bank, insurance, email etc. If you used any other browser, it simply would not work. From the ashes of Netscape, Firefox fought for open standards compliance and thus paved the way for alternatives like Safari. Now thanks to open standards compliance, all important websites work in most web browsers regardless of browsing engine. 

Microsoft eventually joined the party and released Microsoft Edge as part of Windows, which is based on Chromium, the open-source web browser that Google Chrome is based on. Chromium is based on a modified version of Apple’s Webkit, which is one of the most robust browsing engines available to date. Through the iPhone, Steve Jobs and Apple fought to eliminate the monopolistic, unstable, and insecure Adobe Flash player, which at the time was required to view video on most websites, including YouTube. He took the initiative to enforce the open standard known as HTML5 video, refusing to support Flash on the iPhone. He prioritized stability, performance, security, and battery life, all of which would have been compromised if he had allowed Adobe to dictate the future. Consequently, all website developers who were either lazy or had their hands in Adobe’s pocket were forced to support open standards, such as HTML5, in this instance.

While I digressed briefly, all of this information is highly pertinent and contributes to the point I am attempting to convey. Steve Jobs recognized that Adobe Flash posed a threat to his iPhone. Instead of succumbing to its dominance as the primary platform for online video and animation, he made a decision guided by his intuition and decisively halted its installation. He understood that this action would compromise his infrastructure and advocated for positive change. Returning to my main point, my intuition consistently prevented me from using WhatsApp and Meta. However, since most Jamaicans rely on these platforms for communication, I disregarded my gut feeling and installed them on both my mother’s and my phone. I will elaborate on this further in a later discussion.

As an avid Apple user, I have always been impressed by the durability and security of Apple computers. While Apple has consistently produced some of the most stable and secure devices globally, the increasing popularity of the Apple iPhone, iPad, and iOS operating system has made their devices vulnerable to exploitation. In contrast, Android devices face a more challenging security situation due to the fragmentation within its ecosystem. Essentially, Android devices are inherently less secure than Apple devices. Furthermore, the majority of Jamaicans utilize third-party Android devices from manufacturers such as Samsung and LG, which often lack a strong track record of updating their devices. Consequently, these devices leave customers exposed to exploits that cannot be patched or remedied. 

If you prioritize security, consider purchasing an iPhone. Apple prioritizes your privacy and well-being, as their primary revenue stream originates from the sale of their hardware, software, and services. In contrast, Google, Meta, and other companies generate their income by selling your data to advertisers. Before engaging in a debate about iPhones vs Android, it is essential to exercise common sense.

Ok, On to the topic at hand: 

As Jamaica is one of the most technically advanced, estate rich and one of the most coveted nations in the Caribbean, it has been plagued by many cyber crimes. 

JaCIRT recommends against entering emails and passwords on unsecured websites. This means for example a website that is http://www.nameofwebsite.com  is un-encrypted. The website must display https://www.nameofwebsite.com which means it is encrypted. Pay close attention to the website address you enter in your address bar as an incorrectly entered website could also take you to an imposture site that will gladly steal your credentials. 

Furthermore as posted by the Most Honorable Andrew Holness, JaCIRT recommends that you:

✔️ Review your digital footprint and reduce unnecessary exposure.

✔️ Keep your devices updated and properly secured.

✔️ Guard your digital secrets, your passwords, your Wi-Fi access, your networks at home and at work.

✔️ And avoid oversharing on Social Media

Finally Lt. Col. Sterling emphasized the importance of reporting incidents.

I agree very much so. If you were hacked or you think you are compromised do not keep it to yourself. Talk, report it, if nobody talks nothing gets solved and everyone remains exposed. This not only goes for security but also for software bugs. Throughout the years whenever I encountered a bug, or exploit I have always made it a point of my duty to report it the manufacturer and in the case of security, the government. Nothings perfect, nothing is permanent, everything has flaws but those flaws cannot be patched if no-one speaks when they encounter them.

In addition to these measures mentioned by Lt. Col. Sterling and JaCIRT, it is imperative to configure your device to screen incoming calls and messages from unidentified senders. Refrain from opening unsolicited emails, messages or attachments from strangers or individuals you do not trust.

Implement Two-Factor Authentication (2FA): Enhance the security of your Apple ID by enabling 2FA (Settings > [Your Name] > Sign-In & Security > Two-Factor Authentication). This robust authentication method safeguards against account-based attacks that exploit vulnerabilities to gain unauthorized access to iCloud data. Additionally, it is imperative to enable 2FA for all your online accounts and applications to reinforce your digital security posture.

Whenever feasible, avoid using your phone number as the second factor of authentication and opt for an authenticator application instead.

This issue has garnered global recognition and demands attention. Most Banks and institutions that assert their security still rely on unsecured phone numbers as a method of authentication. This practice poses a substantial risk. A few weeks ago, my mother’s SIM card was compromised. Consequently, her phone displayed “No Service”, and when someone attempted to call her, they either received an unknown individual or received no response at all.

To retrieve her phone number, we had to report the incident to the carrier and the Government of Jamaica. In a SIM swap scam, an individual approaches the carrier, claiming to have lost or stolen their phone, and requests that the representative port “their” number to a new SIM card. If the individual possesses substantial resources, they can persuade a corrupt or unscrupulous individual within the telecommunications company to comply with their request. Consequently, they obtain your phone number. Your phone will display “No Service,” and your SIM card will become inactive.

If her phone number was tied to any of her online accounts, that malicious actor would have had complete access to everything. For example if the hacker knew her email but did not have her password, but had access to her phone number that receives the one time authorization codes and password reset requests, that malevolent party would have complete access to everything. 

Let us now return to the technical analysis. Regarding the zero-day exploit that necessitated no user interaction, WhatsApp is configured by default to accept all incoming media automatically. This setting serves as an ideal vector for transmission, akin to a vulnerable individual readily accepting any information from any source.

If you must use WhatsApp, disable auto-downloading of all content (Photos, Videos, Documents, etc). While I do not consider WhatsApp to be secure even though it features end-to-end encryption, Update your smartphone and WhatsApp to the latest version as Meta claims they have patched the zero-day exploit in their latest update. 

Disable MMS messaging on your device as zero-day exploits can also travel via this method. If you are on iPhone, set up Messages to Filter Messages form Unknown Senders. This can be done by going to Settings > Apps > Messages > Message Filtering > Filter Unknown Senders. This setting will put messages from senders not in your contacts list in a separate list. 

Now for FaceTime: Go to Settings > Apps > FaceTime > Calls > Silence Unknown Callers. Set this toggle to On. This means that people who are not in your contacts list will silenced when they try to FaceTime you. 

Now, thoroughly review your contacts list in the Phone app (Phone > Contacts) and in WhatsApp, and block all individuals you do not trust or communicate with. Upon completion, akin to ending a romantic relationship, you can safely delete them from your device. These contacts will be blocked, preventing any potential harm or infection. If you anticipate the need to contact them in the future (which is unlikely), consider writing down their information on a separate piece of paper before deleting them. 

Do not click on any links or view unsolicited emails from strangers or people you do not trust as exploits can also travel via this method. Setup the mail app to NOT download remote images. Go to Settings > Apps > Mail > Composing > Load Remote Images and disable it.

Maintain iOS Security: Regularly update your iPhone to the most recent iOS version. Apple frequently releases patches for vulnerabilities, even if not publicly disclosed, as part of minor updates. Access Settings > General > Software Update and enable automatic updates to ensure timely resolution of security issues.

Enhance Device Security with Strong Passcode and Biometrics: To safeguard your device against unauthorized access, it is imperative to establish a robust passcode. Opt for a complex passcode that comprises at least six digits, preferably incorporating alphanumeric characters. Additionally, enable Face ID or Touch ID to provide an additional layer of security. To configure these features, navigate to the Settings menu and select the appropriate option, such as Face ID & Passcode or Touch ID & Passcode.

Enable Data Protection: By default, your iPhone should encrypt data, which is a standard security feature on iOS devices with a passcode. Avoid jailbreaking your device, as it disables this protection and makes your device vulnerable to exploits.

Limit App Permissions: Review and restrict the permissions granted to applications to only those essential for their functionality. Access the Settings > Privacy menu to manage access to location, contacts, photos, and other sensitive data. Exercise caution when applications request excessive permissions, as they may pose security risks and exploit vulnerabilities.

Ensure Security by Installing Apps from Reputable Sources: To safeguard your device, exclusively download applications from the official Apple App Store. This platform undergoes rigorous security verification by Apple. Refrain from utilizing third-party app stores or sideloading unless absolutely necessary, as these methods can inadvertently introduce malicious code. Most users of iPhone does this by default but I mentioned it non-the-less. However, this precaution is particularly crucial for Android users, which allows sideloading much more easily. Apple was looking out for you by making sure all Apps come from their app store.

Utilize Safari with Default Security Settings: Safari’s Intelligent Tracking Prevention and fraud alerts effectively reduce the risk of web-based zero-day attacks. Refrain from clicking suspicious links and enable Settings > Safari > Fraudulent Website Warning. While disabling JavaScript (Settings > Safari > Advanced) can enhance security for sensitive browsing, be aware that it may render certain websites inaccessible.

Disable Unnecessary Features: To minimize potential vulnerabilities, disable features such as AirDrop, Bluetooth, and Wi-Fi when not actively utilized. This can be accomplished by accessing the Control Center or navigating to Settings > Bluetooth/Wi-Fi and toggling off these connections. Additionally, refrain from connecting to public Wi-Fi networks without employing a virtual private network (VPN) to safeguard your data.

Monitor for Suspicious Activity: Regularly monitor Settings > Battery or Settings > General > iPhone Storage for anomalous app behavior or unexplained battery drain, which may signify a security breach. Utilize Settings > Screen Time to scrutinize app usage patterns.

When compromised, your device may become unbearably slow, freeze, and exhibit erratic behavior. It may experience poor battery life even when hardly used, leading you to believe that a battery replacement is necessary. When viewed through a DNS catching service you may see suspicious private domains that do not relate to the (OS) Operating System or any of the applications installed on your device. In one instance, my iPhone became completely frozen, preventing me from opening applications or turning it off. I had to forcefully reboot it.

Following device exploitation, we had to wipe all our devices (both macOS and iOS thoroughly) using the “Erase and Reset” functions. Navigate to Settings > General > Transfer or Reset > Erase all Content and Settings“. This option completely erases and reformats the iPhone or Mac’s user data partition on its internal SSD, effectively deleting all applications, settings, and files. After the initial boot, it is crucial to refrain from restoring from any backups, as the exploit could still be present and re-install itself from the backup. I cleared all backups stored from apps that send and receive calls and text from my iCloud and local backups prior to wiping my device. 

If you are a person of high risk Do not use Android and do not install any third party apps. Use iMessage and FaceTime as they are end-to-end encrypted with AES-256, They are owned and run by a company who’s profit does not come from harvesting your data. Be sure to enable Apple’s “Advanced Data Protection” (also found in the Settings app) which end-to-end encrypts backups to iCloud as well.

Regularly monitor Settings > Safari > Downloads for the presence of unidentified files and Settings > General > Profiles & Device Management for the detection of unauthorized profiles. These indicators may suggest the presence of an exploit.

Enable Find My iPhone: In the event of your device being lost or stolen, Find My iPhone provides remote access to lock or erase it, safeguarding your data. To enable this feature, navigate to Settings > [Your Name] > Find My > Find My iPhone.

On your Mac

Enable Gatekeeper and XProtect

Gatekeeper restricts app installations to trusted sources, such as the App Store or signed developers. To ensure its activation, please check System Settings > Privacy & Security and set it to “App Store and identified developers” to strike a balance between security and flexibility.

XProtect, an integrated malware detection tool by Apple, automatically updates without the need for manual configuration. To verify its active status, ensure that macOS is up to date, as XProtect signatures are distributed through system updates.

To enhance cybersecurity, enable the macOS firewall (System Settings > Network > Firewall) to prevent unauthorized incoming connections. For enhanced monitoring and blocking capabilities, consider employing a third-party firewall such as Little Snitch. This firewall can effectively detect and prevent suspicious outbound traffic, which could potentially be utilized for command-and-control communication by zero-day exploits.

Disable Unnecessary Services: Turn off features such as File Sharing, Remote Management if not in use. To do this, navigate to System Settings > General > Sharing.

Implement Strong Passwords and Enable FileVault: To safeguard your data, it is imperative to establish a robust user password. Additionally, enable FileVault (located under System Settings > Privacy & Security > FileVault) to encrypt your disk. This encryption will serve as a protective barrier, safeguarding your data even if an exploit gains unauthorized access.

Utilize a privacy-oriented browser such as Safari, configured with its default settings (Intelligent Tracking Prevention and sandboxing), or a hardened alternative like Firefox, which is designed with stringent privacy settings.

Enable Content & Privacy Restrictions in Safari (Settings > Safari) to block pop-ups and limit cross-site tracking.

Install browser extensions like uBlock Origin (Firefox) or AdGuard (Safari) to block malicious scripts and ads, which are common vectors for zero-day exploits.

Only download applications from reputable sources such as the Mac App Store or verified developers. Refrain from downloading pirated software, as it frequently contains vulnerabilities and exploits.

Disable automatic login: Go to System Settings > Users & Groups and ensure automatic login is off to prevent unauthorized access.

Use tools like Apple’s built in Activity Monitor to watch for unusual processes or high resource usage, which could indicate an exploit.

Utilize Time Machine or an alternative backup mechanism to establish a consistent and encrypted backup system. This proactive approach ensures the ability to restore your system without data loss in the event of a zero-day compromise affecting your Mac.

Device Setup and App Installation

Upon setting up your device as new, install applications one by one, prioritizing those essential for your needs. Thoroughly review the permissions granted to each application before installation. Exercise caution and refrain from granting permissions to applications that do not require those features for their functionality.

If setting up your device anew, I recommend referring to my article and following the outlined steps in addition to those posted by JaCIRT. Maintaining a minimal setup is crucial for effective device management, security, and clarity. After you have done the above, Following the aforementioned steps, it is imperative to regularly back up your device. Utilize encrypted backups via iCloud (Settings > [Your Name] > iCloud > iCloud Backup) or a computer equipped with iTunes/Finder. In the unfortunate event that a zero-day vulnerability compromises your device, you will be able to restore from a pristine backup.

Other Common Sense things

Purchase an up-to-date brand name router, connect it to your ISP’s modem/router and disable the Wifi feature on your ISP’s modem/router as you will be using your more secure and up-to date router for this.

Change the default Wifi Password and admin password on your router. On the router that you have purchased Create a separate “Guest” network for your guests, which will have a separate password from your “main” network. Keep the password for your main network secret.

Change your DNS service from your default ISP to a security focused provider like Quad9 that blocks malicious domains at the source. This will provide improved protection for all devices connected to your router including your smart home devices.

Featured

80K Streams

Alexander Lindo achieves a remarkable milestone of 80,000 streams, a testament to the power of independent artistry. This accomplishment stands as a significant achievement for Alexander Lindo, who has successfully navigated the music industry without support from the recording industry. To experience the depth and brilliance of Alexander Lindo’s music, be sure to explore his catalog. Immerse yourself in a symphony of unparalleled sensations that will elevate your auditory experience to new heights. While you are at it do not forget to follow Alexander Lindo on all social media platforms and show your support for true talent, innovation, and excellence.

Featured

Take The World By Storm

Take the World By Storm, the latest release by Alexander Lindo, the brilliant and multitalented Singer, songwriter, producer and audio engineer. Featuring “Take The World By Storm” and “Our Love Lights The Way” is available everywhere. Join the impervious Alexander Lindo and be a part of something great, join the unstoppable and indestructible movement. Are You Ready to be inspired, be a part of something powerful and positive, making this world a greater place? 

Show your support for Alexander Lindo by purchasing “TAKE THE WORLD BY STORM” today. Share with your family, friends, co-workers and everyone you meet.  

Words from the man himself:

This album is about empowerment and guiding others towards greatness. This album features elements of rock, pop and electronic. Opening tracks “Take the World By Storm” and “Our Love Lights The Way” brings new and exciting electronic elements into the mix, expanding and demonstrating more abilities and further expanding coverage. Fans of bands like Queen, George Michael, Prince, U2, Depeche Mode, Green Day, Thirty Seconds to Mars etc will be right at home. The closing track entitled “God’s Clarity”, demonstrates Alexander’s opera ability publicly for the first time. My past hits like “Power”, “Sunlight” and “The Fight Is Ours” has been updated for higher fidelity.  

To my powerful, strong, resilient, courageous, inspirational and independent mother Joan Verisales-Lindo and to all who have assisted and supported me in the past and present; to all my fans, thank you! You hold the key to create a positive change in your life and others by embracing your greatness and empowering yourself and others to fight against inequality, injustice. 

To all my enemies and haters, you have helped build and strengthen me, making me impervious to distractions and negative energy.

No quote is more applicable than the words of the legendary Steve Jobs: 

“Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma – which is living with the results of other people’s thinking. Don’t let the noise of other’s opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.” 

I am proud of this release. It has been the result of hard work and dedication.

Cheers! All links for purchasing and streaming the album can be found at the top of this website. Take yourself on a musical journey only Alexander Lindo can with TAKE THE WORLD BY STORM!

Featured

God’s Clarity

Alexander Lindo releases the official music video for his song entitled “God’s Clarity” (A Prayer to God). The world needs love, peace and unity. This is a universal call for the world to unite for the betterment of our human race. Enjoy! Do not forget to share and subscribe.