vr

Facebook Virtual Reality or a tool to collect your facial biometric

Alright , in this digital world I feel we are turning into a zombie. A zombie whose emotions are now more capable to be calculated by the digital robots. In the individual’s digital world , his emotions , his thoughts , his awareness , his condition , his whole life is now remain forever on the social networking site.

Facebook a famous social networking site with trillions of pictures , selfies with individuals identifications and now they are introducing the next generation’s technology “VR”.

I first read about the VML back in 1999 , but It was a baby language of that time and I guess it was released too soon before we had any kind of digital VR devices like occulus. I learned the markup language and then I was ended up in thought that its too early for us to read this language. Today facebook has introduced the coolest technology on the internet and its called real time augmented virtual reality with fusion of social networking.

Now with this technology you can play with your friends even if you are at your own home , you can select Rome , Paris , Karachi or Toronto and all your friends through the internet will be gathered in one place. You and your friends can have great funny faces , they will be digitally converted into the cartoon caricatures type faces , you can create whatever you can imagine from a single sword or a cartoon car. Check out the cool video in the end of this article.

Now I will discuss about the problem, well , if you can see if you will use this technology your Eye’s Iris , Your Facial Features , Your body segmentation , Your hairs all will be saved inside the Facebook database. That means even though your all actions were saved previously by Facebook walls but now through virtual reality they are doing a lot more things behind the scene.

VR.png

Again, now your every single data , related to you is under the roof of Facebook , where ever you will go you will be identified easily. Your real time faces in shape of videos will be saved inside the Facebook knowledge-base , if anyone will ever hack this Facebook , or if they will sale your data without your knowledge then …. believe me nothing will happen right.🙂

This is the world where you are being watched and you are monitored for your all kind of actions.

issue2

Windows 10 with High DPI Scaling issues (how existing Apps turns into tiny)

I have recently purchased my new laptop HP envy convertible surface (Windows 10) and found everything looks cool but few applications were not displaying appropriately.
Netbeans Visibility Tiny Splash Screen and Menus
After new the installation of my Netbeans I have discovered that its menus and splash screen looks very tiny that even a man with the magnifying glass will have a problem to work on it. The splash screen was very tiny and the menu and some parts were very small on the screen, including Netbeans welcome screen from left and right sides.
issue2issue3
Vmware 10 with Tiny resolution of guest os a
I also faced another big issue with my vmware menu and vmware guest OS screen resolution. For which I have tried everything in order to fix it by changing its display configuration or windows configuration but all efforts were gone in vain till I found a workaround.
issue1
 
Tiny menu under File menu and Tiny Guest OS ubuntu running with small resolution. I even tried myself with full screen option but believe me It didn’t work.
 
Microsoft Solutions didnt work for me:
My very first attempt was to check in the microsoft forums and then I have found the following link. Even though I followed all the steps they mentioned but I was unable to get this thing fix. https://www.microsoft.com/surface/en-sa/support/apps-and-windows-store/app-display-issues?os=windows-10&=undefined#S1
Research
I did not realize that there are some new display issues with windows 10 available for user like us as a gift. After some research I found that the new windows 10 with High definition laptops by default it query every application on their startup that if the following app is aware with respect to the high DPI scaling, if they receive true flag from the application then they force to have the high DPI scaling . I even had test the compatibility issue and tried all options but in the end I have selected the “report to microsoft” option and found the below information.
4
Microsoft is responsible: 
As far as I believe this is the microsoft responsibility to mention this issue appropriately for users like us. Also they need to put some intelligence in their algorithm to detect should scaling be used or not for an app. Many vendors by mistake put true in the DPIScale flag of the executable’s manifest or maybe they don’t even consider it to add this information but again microsoft windows 10 should take this responsibility to adjust all those applications with visibility issue. They suppose to work seamlessly on all windows version if they are working fine of windows 7 , 8 or 8.1 with other laptop’s resolution.
How to Fix this:  
Since I faced two application visibility issue e.g. vmware and netbeans so I will be strictly try to fix these two.
1) Download Resource Hacker since now you must fix this manually by yourself
2) Go to this link to download http://www.angusj.com/resourcehacker/ (And dont worry resource hacker is not bad application or anything which you should doubt , its information is available on all over on google and wikipedia as well)
3) Now open the resource hacker and open the executable of vmware or the netbeans
4) You will see following resource folders for vmware
5
5)Suppose you could not find this than no problem try to check a folder called 24 (You can find maybe in any other folder like below)
6
6) Suppose if you still dont find this then dont worry it means the developer of the app has not added any menifest file. It means you have to create that file by your self just like the below text.
<?xml version=”1.0″ encoding=”UTF-8″ standalone=”yes”?> 
<assembly xmlns=”urn:schemas-microsoft-com:asm.v1″ manifestVersion=”1.0″> 
  <application xmlns=”urn:schemas-microsoft-com:asm.v3″> 
    <windowsSettings> 
      <dpiAware xmlns=”http://schemas.microsoft.com/SMI/2005/WindowsSettings”>False</dpiAware> 
    </windowsSettings> 
  </application> 

</assembly>
7) In my case I were able to find the menifest file inside the vmware.exe, so I copied the whole menifest information and closed the resource hacker. (Do not change anything there its just to copy it)
8) Then with your notepade create a file inside the vmware directory beside vmware exe as “vmware.exe.manifest”.
9) Now change the following tag to FALSE
From
To
9) Suppose if you couldnt find that dpi aware tag then you can add below application tags just right after the assembly tags as below
<assembly xmlns=”urn:schemas-microsoft-com:asm.v1″ manifestVersion=”1.0″>
<application xmlns=”urn:schemas-microsoft-com:asm.v3″> 
    <windowsSettings> 
      <dpiAware xmlns=”http://schemas.microsoft.com/SMI/2005/WindowsSettings”>False</dpiAware> 
    </windowsSettings> 
  </application> 
9) Thats it , now we need to force our windows to use external menifest of the application as high priority, so for this open the registry regedit.
10) Go to the hkeylocal machine
7
11) After this restart the machine and look what the cool stuff (You need to restart only one time due to the changes in registry so dont worry next time for any manifest addition you do not need to restart it again)
8
Now the full screen works the way i want and i can now see the menu as well properly. Now go inside the guest os in full screen mode , then go in View menu of the vmware and press auto scale to Stretch.
12) For the netbeans when you will open the executable e.g. netbeans.exe or netbeans64.exe inside the resource hacker you will find inside the menifest something like below tags
<?xml version=”1.0″ encoding=”UTF-8″ standalone=”yes”?>
<assembly xmlns=”urn:schemas-microsoft-com:asm.v1″ manifestVersion=”1.0″>
<assemblyIdentity version=”8.0.0.0″
   processorArchitecture=”ia64″
   name=”netbeans64.exe”
   type=”win32″/>
<description>nbexec Process.</description>
<dependency>
  <dependentAssembly>
    <assemblyIdentity
      type=”win32″
      name=”Microsoft.Windows.Common-Controls”
      version=”6.0.0.0″
      processorArchitecture=”*”
      publicKeyToken=”6595b64144ccf1df”
      language=”*”
    />
  </dependentAssembly>
</dependency>
<!– Identify the application security requirements. –>
<trustInfo xmlns=”urn:schemas-microsoft-com:asm.v3″>
  <security>
    <requestedPrivileges>
      <requestedExecutionLevel
        level=”asInvoker”
        uiAccess=”false”/>
      </requestedPrivileges>
     </security>
</trustInfo>
</assembly>
11) Here you can see the developer of the netbeans somehow are not using dpi aware tag thats why windows 10 was forcing it the way windows want and that caused the big visibility issue. So now add the application tag with dpiaware as false like below
<?xml version=”1.0″ encoding=”UTF-8″ standalone=”yes”?>
<assembly xmlns=”urn:schemas-microsoft-com:asm.v1″ manifestVersion=”1.0″>
 
<application xmlns=”urn:schemas-microsoft-com:asm.v3″>
    <windowsSettings>
    </windowsSettings>
</application>
<assemblyIdentity version=”8.0.0.0″
   processorArchitecture=”ia64″
   name=”netbeans64.exe”
   type=”win32″/>
<description>nbexec Process.</description>
<dependency>
  <dependentAssembly>
    <assemblyIdentity
      type=”win32″
      name=”Microsoft.Windows.Common-Controls”
      version=”6.0.0.0″
      processorArchitecture=”*”
      publicKeyToken=”6595b64144ccf1df”
      language=”*”
    />
  </dependentAssembly>
</dependency>
<!– Identify the application security requirements. –>
<trustInfo xmlns=”urn:schemas-microsoft-com:asm.v3″>
  <security>
    <requestedPrivileges>
      <requestedExecutionLevel
        level=”asInvoker”
        uiAccess=”false”/>
      </requestedPrivileges>
     </security>
</trustInfo>
</assembly>
12) Save the new manifest like below inside the netbeans folder.
9
13) Now just run the application you will see perfect splash screen with perfect menu and perfect scaling of your applications.
10
Summary: 
I think windows 10 is not smart enough to understand when and where it should force the High DPI scaling on Apps. I have purchased this laptop with windows 10 yesterday and more than 5 hours I have tried all kinds of display settings of the windows 10. So If you are facing the same thing then kindly do not waste your time. Just follow this tutorial and do these manual workaround for your those apps which has a display issues on Windows 10.
There are many other apps like android studio or phpstorm ide they works fine on this HDPI win10, so do not think if you need to apply this hack for all kinds of apps.
My previous laptop has windows 10 too,  but the resolution of the laptop was lesser than this one , so I think not all will face the same issue unless they will move to the HDPI with wide screen laptops along windows 10.
Note: If you have any better solution than this one then kindly share your solution in the comments.
public_key_encryption

How to use RSA public and private keys to encrypt and decrypt your data

public_key_encryption

Public and Private keys cryptography: RSA is one of the famous technique where you do not need shared key to encrypt or decrypt data between two or more people.

A person who would like to send you a secret message can encrypt that message using your public key. Public key is a way to encrypt data which cannot be open by any other key but the private key. For example  Mr.ABC would like to send an encrypted message to Mr.DXY and both would like to use  RSA encryption, where both parties does not require shared encrypted password or key.

In this case Mr.DXY will send his public key to the MR.ABC , a public key like its name can be used anywhere as a public, so you do not need to worry about your privacy. Even if a hacker gets your public key he can not do anything , since a public key is used in our case to encrypt the data which can only be open by the magical private key.

So once Mr.ABC will receive a public key from Mr.DXY , then he will write any message and encrypt it using DXY_PUBLIC_KEY. Once the data is encrypted , Mr.ABC will send this data to Mr.DXY.

In the middle of this conversation a hacker on the network able to extract the encrypted data , and he had snatched the public key in previous conversation when Mr.ABC sent the public key to Mr.DXY.  But the good thing, when the hacker tries the decryption using the public key he will see nothing but the encrypted data. The only key that can decrypt this text is under the custody of Mr.DXY and that is called Private Key. So public key is for all the people who likes to send Mr.DXY an encrypted message.

Once Mr.DXY will receive an encrypted data he will open it using his Private key  DXY_PRIVATE_KEY. This key will decrypt the message correctly… Now suppose Mr.DXY would like to send an encrypted message to Mr.ABC then again the same procedure will occour but this time Mr.DXY will obtain a public key of Mr.ABC  before encrypting any data to send him e.g. ABC_PUBLIC_KEY. On the other side Mr.ABC must have his own private key to decrypt whatever come to him…

How you can generate Public and Private Keys on your windows System:

It is very simple, in my case I am using LAMP package “easyPHP” which provides me Apachi , MySQL , PHP with OpenSSL utilities for Windows. So just jump into the configuration directory of your apachi server’s binaries.

e.g. C:\EasyPHP\binaries\apache\bin

Run the command file , OpenSSL.exe

(In case you just want openSSL then you can install openssl from their official site openssl.org pr any other RSA generator which you can find from the internet)

Generate Your Private Key:

OpenSSL> openssl genrsa -out mylovelykeys.pem 1024
The above command will create a file within the same directory as mylovelykeys.pem this file is our private key.

Generate your Public Key:
OpenSSL> rsa -in mylovelykeys.pem -pubout -out mylovelykey.pub
The above command will create a file within the same directory as mylovelykey.pub this file is our public key, so you can share this to your friends.

Lets see how it can be work inside PHP case:
$plaintext = ‘Hello whats up’;$publicKey = openssl_pkey_get_public(file_get_contents(‘\\mylovel ykey.pub’));
$encrypted = ”;if (!openssl_public_encrypt($plaintext, $encrypted, $publicKey))
die(‘Failed to encrypt data’);
openssl_free_key($publicKey);echo “Enc: “.$encrypted; // Hurray your text is encrypted with public key//————————————————————————————-$privateKey = openssl_pkey_get_private(file_get_contents(‘\\mylovelykeys.pem’));
$decrypted = ”;if (!openssl_private_decrypt($encrypted, $decrypted, $privateKey))
die(‘Failed to decrypt data’);
openssl_free_key($privateKey);

echo “Dec”.$decrypted; // Hurray your text is decrypted with private key

android-vs-ios-vs-windows-phone-590x433

Secure your smart phone in 34 Steps

1 ) Use your smartphone’s built-in security features , common security features contain keystroke pattern , PIN or password lock option. By going in android Settings>Location & Security you can enable these security features.

2) To more securely lock your device, you should instead use a pattern lock or a PIN code. Pattern locking has you draw a specific pattern on the screen, while a PIN code has you enter a numeric code to unlock the device.

3 )Smudges could also be a security loop-hole due to the screen of android. Suppose if you unlock your phone and then look at it from an angle, you will likely see a trail of smudges showing what your pattern looks like, or what digits your PIN code consists of. Such smudges appear because of our finger tips so to avoid such threat better to clean those smudges by a smudges cleaner or by using random patterns once you open your android phone. Doing that no one can detect your password pattern or pin code by checking smudges.

4) Avoid using free and unsecured WIFI access , because accessing a web via an open WI-FI network could be free and easy but it does come with many RISKS.

5) Don’t allow your android phone to connect automatically on any free Wi-Fi network. Automatically accessing Wi-Fi network means opening the door to just about anyone. If someone is on the same network with spy intentions then he could see your private chat, browsing or pictures etc. To stop automatic connectivity on Wi-Fi go to Settings>Wireless & Networks> Wi-Fi

6) There are many best antivirus available in the APP market which can be useful for your phone. You must Install an antivirus APP and track your phone because many times malicious code or existing installed app can become security threat for you. Two of the best free mobile antivirus apps are AVG’s Antivirus Free and Lookout they can be downloaded from the Google Play website.

7) Avoid third party websites who offers you new android apps but the best place to download new Apps is Google Play App market which is an official trusted website for android.

8) If you download any APP from non trusted website then you should be careful that a hidden Trojan , virus or malicious code could also be downloaded from the non trusted website within the APP. Always use Google App store for new applications.

9) Scrutinize every app that you download regardless of source, doing that you can figure out easily if the app which you are trying to download is harmless for your phone. Best way to do this is by checking reviews , numbers of stars and user community comments.

10) When you install any application try to understand the permission you are allowing before moving to the next step. Usually applications which require “Full Access to Internet” , “Authority to send Text Messages” or “Access to online accounts” are APPs that can be harmful for your privacy in android. So always be careful before allowing such permission to any APP, otherwise try to avoid such APPS.

11) Granting permission to APP means they can access your personal information , there was a virus that used to take silent pictures and spread it on the internet. Always be careful before granting permission even for the Camera Access.

12) Smart phones are not just phones but a complete package of your private information and data , when you give someone your phone make sure he can’t access your information.

13) Avoid mobile banking transactions on non private networks, they can be very harmful for your private data.

14) To stay protected anywhere anytime you can rely on solutions like “Tend micro mobile security for android” this protect digital files and provide security for mobile banking transaction.

15) Don’t let your Bluetooth connection always ON unless you need bluetooth communication. There are some intelligent malicious codes which spread through bluetooth communication and if a user accepts malicious bluetooth communication then it could even harm the Operating system of android.

16) Always accept blue tooth communication if you really know the computer Id or the phone ID of the person who will receive. Sometimes without assuring the receiver’s mobile ID person can do mistakes by sending his personal data or pictures to an unknown mobile phones.

17) Do not use a forever login session by your social Apps because some mobile apps asks you to should they remember your account password. This feature can enable your application to save your sessions where you don’t need to provide password again and again. It is advisable to always log off from your applications like Skype , Facebook , Google , MSN or twitter rather than granting your APP to remember your passwords. Few seconds of login password process is much more secure than having an unexpired online session for online App or website.

18) Always log out from your social APPs even if you are allowing some one to use your phone. This can protect your dataleak and prevent anyone to misuse your APP’s data.

19) Always remove chat and browser history for better security. This can also make your android run such application fast and optimize.

20) Device administrator permission is very useful for APPs like antivirus or spyware detectors. This gives them special powers, and makes them more difficult to uninstall. This can be a good thing—in the case of Lookout or other antivirus apps—but most applications should work without the extra permissions. As a general rule of thumb, you should only set an app as a device administrator if you trust it and have need of its extended features. A security app may ask to be made an administrator to help better protect your phone, but games and the like have no reason to make the same request. To review your device list with administrator permission follow these steps , access Settings > Security > Device administrators.

21) There are many good data protection application available on GOOGLE PLAY that can secure your videos , images and data by password. So if some one access your mobile phone he cant access those private images , videos unless he provide further password for the given folder or image.

22) If you have a rooted phone, be extra cautious about granting super-user/administrator access to any app. Make sure you understand the purpose of the Super-User access, and trust the developer enough to grant it. This is the highest level of access that anyone (or anything) can have on your Android device, so be really careful with this one.

23) Avoid Piracy under all circumstances; pirated apps that you obtain through illegitimate sources are dangerous for your android phone. Not only is it wrong ethically, it also poses the biggest threat, in that you never know how the pirated APK has been modified. Saving few dollers can be harmful than purchasing the non pirated APPs.

24) Always enable screen lock’s auto locking feature of your phone so it will lock the phone with pattern base password or pin-code.

25) keep updating the Operating System & Apps of your Android phone to reduce the risk of malware attack and for better security protection. If you regularly using internet through your phone then you will get notification when any update of your OS and apps will available.

26) Delete corrupt or faulty applications at any time when any app of your Android phone will get error or will show some warnings then instantly delete those apps because those error applications will harm your cell phone as a malware.

27) Keep checking if there is no duplicate APP exists in your android installed applications. Now a days many hackers are making duplicate apps which are most popular in Android market and if you use those apps then they can easily hack your phone. So it’s a recommendation that always download any type of application and game from Google Play Store

28) Encryption of data means translation of data into a secret code. This option is available for Android 3.0 & greater versions. To secure your data you must encrypt your phone data. To enable this option just go to Settings->>Security->>Check Enable Encryption. Suppose if your phone is stolen then also no one can’t access your data. So always enable the encryption option.

29) Use “SeekDroid” Application for minimizing the risk of losing your phone. If whenever you lost your phone then don’t be panic because this “SeekDroid” will help you to get back your phone. Just Log in to SeekDroid website and from there you can track your phone’s location easily. You can get this app from trusted Google Play Store.

30) Always backup your phone data, contacts & settings in a regular interval to Google website or to your personal computer. If anytime you face any type of problems then you can easily backup those data from your computer or from Google.

31) Pin-code with pattern lock helps to avoid too many fake pattern tries to unlock phone. After the limit of pattern tries security app opens the Pin-Code dialog to avoid data theft and assure if user is authentic. This way if user ever forgets his pattern he can unlock his phone by providing the Pin-Code or password.

32) There are some serious threats using bluetooth including Bluebugging,Bluejacking and Bluesnarfin by which hackers can hack your mobile phone with different techniques. So always use bluetooth when you are 100% sure about the other end is not a hacker or someone unknown to you.

33) Bluejacking is a technique for hackers, in which they get into cell phones and send strange or flirtatious messages to other Bluetooth users within a 10-meter range. The hackers wait to see the kinds of reactions they provoke from those receiving the messages, either through phone messages or the faces of the people receiving the messages. Avoid unknown bluetooth connection unless you trust the other end.

34) Another dangerous threat using bluetooth with non trusted person is Bluebugging. Which allows hackers to gain access to the command system of a phone without owners knowledge.Then hacker can easily extract contact diary, can listen to phone conversations, use the Internet, send emails from accounts and make phone calls.

Two types of human and password, Stupid and Aggressive

theef

You are happy that you got the computer , mobile and different devices and you are happy how your life is so cool with no worries, you want everything simple. You love simple words , simple life style and you love everyone in this world … you hate aggression in people or on work or in your life style…because you are a simple guy.

If you think in this way then you are the first one who will lose his password and I mean it. Because the cyber life is not simple enough because the responsibility of cyber mess has been taken by some  robbers ,looters, blackmailer , fraudsters , secret enemies , Bots , viruses , spyware , hackers and you… ! Yes I said you …. because your life is so simple even in the cyber world with loving simplicity too much…so its time to rethink especially about your password…  change your attitude from stupid to aggressive … because your password will represent you how much a risk taker , aggressive person you are.

Following are the four rules defined by the Einstein which you have to follow forever in your life time as long as you are on cyber world.  Alright I lied  it is all defined by me and I am just messing with you…so kindly continue your reading…

 

0) Never become a Shorty:

Like the head says “never become a shorty”…in simple words “do not make your password short” , the most hacked password are shorter than seven letters…

1) My Password is so Good !

Do not make stupid passwords like 12345678910 , abcdefghj , i love you , and shit.

– Use logical passwords with the combination of words which are not connected to each other let say making a password like mydob1999 is clearly showing that a particular person dob is 1999 …or in other words “an easy password of a dummy”. Try something like skygameof1999 ..a little secure than the old one but not secure enough. But atleast skygame has nothing to do with the date side of 1999.

2) Put something disturbing:

!@#$%%^&&*()0000  excuse me!  I am not abusing here but this is what I believe a disturb character set!!!! And yes It should be inside your password always …. suppose lets take skygameof1999 password and make it little bit more secure …so here is the conversion $kyg@meof1999 …as you can see now I am using symbols $  , @ and 0 between ‘e’ and ‘f’. Now your password looks harder to read…pretty good than before..now lets make this insecure password more secure .. (Note:- if your server does not allow you to use symbols in start then you can use symbols next to the first letter e.g.   sk!g@meof1999 )

3) Camel Case :  

The one of the unique thing about the camel is it has curves on its body sometimes two and sometimes one…depends on the genetic nature of particular camel anyhow …the topic is not about an animal but how to change the password to camel case…

So here is the sample of  “iamgood” which turns into “iAmGoOd”…every after small character a big character or uppercase character must be use. Now lets try on our password e.g. $kyg@meof1999  can be changed into $KyG@mEoF1999  …yeah we are getting stronger more and more…

Now this password is much more stronger since it contain some digits , some symbols and some capital and obviously some lower characters…now this password does looks scary not stupid.

I am not scared with Scary password But how i will remember:

How you will remember your password like  $KyG@mE0F1999 ?  For this suppose if you have followed the 4 way rules which i have explained above then you have to do a little meditation ..

Close your eyes and now think what was the simple password you made it

1) and suddenly you will remember it was  mydob1999! NOOOOOO  Dummy ! you forgot rule number ‘0’ and according to it your password is now  skygameof1999

Now again close your eyes😉 and think about the rule number 2

2) something disturbing you ….yup !@#$%^&*() 0

now apply the alphabets according to symbols you remember yes $ and @ and 0 (zero)….. $kyg@meof1999

Now again close your eyes and apply rule number 3

3) the beautiful animal Camel :D….now apply it from the beginning

Tadaaaaaaaaaa!  $KyG@mE0F1999  your password is now in front of you…

 

Caution : Using above of the rules if you ever forgets your password then the author of this blog is not a responsible but again it will be you,  just like you are the reason of having silly passwords… Time for you to become mature enough and change your attitude, your password is the key of your cyber world keep your family and your identity secure before any predator hacked it. 

 

 

The secret of selfies and your security

selfi

How interesting these days we are seeing the trend of selfies …selfies …selfies …everywhere i look i find selfies … thousands and thousands of people are uploading their selfies pictures on their social media… Do you think it is the idea built based on the social network ? if you are like me then i would say yeah maybe…but technically the idea is spread with the term “selfi” in mind…just to take the visible picture of an individual more closely,  oh yeah!  … So what will happen if the organization like NSA would ask google or facebook to cooperate with them or any other social network sites to grab your data so they would build a huge giant database of human features…. ( Yup already they made it)

If you still did not get it then i can only pray for you , recently it has been revealed by the the ex NSA employee snowdin that how NSA is so much interested in watching you…. and now the news is already came that most of the selfies does not know their face features are being kept inside their huge database so they can build a system which can identify you from the group of millions of people…. Wake up ! These technologies are more harmful for you because they are built to keep you busy and behind you they are watching each and every single activity of you…Next time before taking your selfi better think twice …your identity is in your hand to make it public or private…