The Opinion about "SARAHAH"

                  """Sarahah"""(Anonymous)Read before Installing:-  Now a day Sarahah are very popular..Every body wants to chat on sarahah..Many Boys And girls are updated our status with sarahah and called for the anonynous message.In sarahah we can sent anonymously message(Hidden our identity) to anyone who use a sarahah.
The best part of this app is messager identity is not showing..But this is the dangerous part of the app.
We only view the message we unable to see the message sender's identity..At my lost blog Many guidelines about for our maintaining our privacy on internet..
 But normal people don't think that they use sarahah with our privacy issue..because not locatted sender's activity is the main risk for user..Suppose,A particular girl of sarahah user,and the cyco criminal minded background man who usese a sarahah,the person sent message freely to anyone and wants to targetted a girl,a child to abused..
 Because identity is hidden of sender's...So,its very very big issue of risk..Think aBout it..

 And the second thing while we installing a sarahah we read the all terms and condition. ANswer is..NO!!!!..

(i mention some terms and condition of sarahah which is very doubtable !!)
 1] Sarahah has the rights to block any user from accessing the website or using it's service in general...WHY??
 2] Sarahah has the rights to use the information input by users with agrement to the privacy policy.
                (I think why they want to use a user input infomation...We don't do anything because its a policy of sarahah)
 3]They rights to modify the terms and condition if they needed. 
   

  So, BHAIYYA JO BHI BOLNA HAIN DIRECT FACE PE HI BOLDENA,KAYKO IS KA USKA SAHARA LEKE BOLNA..
         
  THINK ABOUT IT..

                                                      STAY SAFE
                                                          ALWAYS BEALERTED WITH CSECURITY...

Comments

Post a Comment

Popular posts from this blog

Best Practices of Information Gathering with Tools and Techniques:- Hacker's Role