More Ridiculous Things You Could Buy with Apple’s Trillion Dollar Value

5:41 AM
More Ridiculous Things You Could Buy with Apple’s Trillion Dollar Value More Ridiculous Things You Could Buy with Apple’s Trillion Dollar Value Reviewed by TechDr on 5:41 AM Rating: 5

Vivo Y81 launched in India with 6.22-inch notched display and MediaTek Helio P22 SoC

3:16 AM

The budget and lower mid-range price segments in India are quite competitive right now. With phones such as the Xiaomi Redmi Note 5 Pro, Asus ZenFone Max Pro M1, and the Realme 1, it’s difficult for other companies to undercut the established competitors in this market. With the launch of the Vivo Y81 in India, Vivo is aiming to do that, but a preliminary look at the specifications leaves us skeptical as to whether it will be able to taken on phones that have better specifications.

The Vivo Y81 was initially launched in June in a few markets, and Vivo has now launched it in India. Its noticeable features include the 12nm MediaTek Helio P22 SoC, which also powers the Xiaomi Redmi 6. It’s also the first buget Vivo phone to feature a tall 6.22-inch HD+ display with a notch. Its specifications are noted in the table below.

SpecificationsVivo Y81
Dimensions and weight155.06 x 75.0 x 7.77 mm, 146.5g
SoftwareAndroid 8.1 Oreo with FunTouch OS 4.0
CPUOcta-core MediaTek Helio P22 (8x 2.0GHz Arm Cortex-A53 cores); PowerVR GE8320 GPU
RAM and storage3GB of RAM with 32GB of storage; microSD card slot
Display6.22-inch HD+ (1520×720) IPS LCD with 19:9 aspect ratio, Gorilla Glass
ConnectivityWi-Fi 802.11b/g/n (2.4GHz single band), Bluetooth 5.0
PortsmicroUSB port, Dual Nano SIM slots, 3.5mm headphone jack
Rear camera13MP with f/2.2 aperture
Front-facing camera5MP with f/2.2 aperture, selfie flash

The MediaTek Helio P22 SoC is manufactured on a 12nm process, giving it an efficiency advantage over the Qualcomm Snapdragon 625. In terms of performance, however, it doesn’t match even the older Snapdragon 630, to say nothing of newer SoCs such as the Snapdragon 636. MediaTek’s own higher-end Helio P60 is used by the Realme 1 at a lower price point (₹8,990), so the value proposition in terms of performance is missing in the Vivo Y81.

In terms of software, the Vivo Y81 runs Android 8.1 Oreo with FunTouch OS 4.0 on top. It has support for face detection.

Pricing and availability

The Vivo Y81 is already on sale on the Vivo online store, Amazon India, and Flipkart. It costs ₹12,999 ($186) in India, competing with phones such as the Asus ZenFone Max Pro M1, Indian Xiaomi Redmi Note 5, Xiaomi Redmi Y2, Honor 9N, and the Realme 1. Consumers can buy it now with delivery time stated as early as the next day, and the phone comes in Black and Gold colors. Exchange offers are available as well on Amazon and Flipkart.

In our view, the inclusion of the 12nm Helio P22 makes this an interesting phone in terms of power efficiency, but sadly, the Y81 is overpriced just like all other Vivo budget phones. Vivo as a brand typically sells well in offline channels, where phones such as the ZenFone Max Pro M1 and the Realme 1 are not available. In terms of specifications, Vivo is still holding back. If it could have been priced at around ₹10,000, the phone would have had a better value proposition.

Source: Vivo

Want more posts like this delivered to your inbox? Enter your email to be subscribed to our newsletter.

Vivo Y81 launched in India with 6.22-inch notched display and MediaTek Helio P22 SoC Vivo Y81 launched in India with 6.22-inch notched display and MediaTek Helio P22 SoC Reviewed by SocialDr. on 3:16 AM Rating: 5

Omnibus - Open Source Information Gathering Tool For Intelligence Collection Research And Artifact Management

3:16 AM

Omnibus - Open Source Intelligence Collection Research And Artifact Management

Omnibus – Open Source Information Gathering Tool For Intelligence Collection, Research And Artifact Management

An Omnibus is defined as a volume containing several novels or other items previously published separately and that is exactly what the InQuest Omnibus project intends to be for Open Source Intelligence collection, research, and artifact management.

By providing an easy to use interactive command line application, users are able to create sessions to investigate various artifacts such as IP addresses, domain names, email addresses, usernames, file hashes, Bitcoin addresses, and more as we continue to expand.

This project has taken motivation from the greats that came before it such as SpiderFoot, Harpoon, and DataSploit. Much thanks to those great authors for contributing to the world of open source.

The application is written with Python 2.7 in mind and has been successfully tested on OSX and Ubuntu 16.04 environments.

As this is a pre-release of the final application, there will very likely be some bugs and uncaught exceptions or other weirdness during usage. Though for the most part, it is fully functional and can be used to begin OSINT investigations right away.


Omnibus is built in a modular manner that allows the easy addition, or removal, of OSINT plugins. Each module is included in a single directory, and by adding a few lines of code, your module could be the next one!

As this README and the Wiki continues to grow, we will have full-fledged examples of how to write custom plugins and get them in as Pull Requests!


Before we begin we’ll need to cover some terminology used by Omnibus.

  1. An item to investigate

  2. Artificats can be created in two ways:

Using the new command or by being discoverd through module execution

  1. Cache of artifacts created after starting the Omnibus CLI

  2. Each artifact in a session is given an ID to quickly identify and retrieve the artifact from the cache

  3. Commands can be executed against an artifact either by providing it’s name or it’s corresponding session ID

  1. Python script that performs some arbitirary OSINT task against an artifact

Running Omnibus

Starting up Omnibus for investigation is a simple as cloning this GitHub repository, installing the Python requirements using pip install -r requirements.txt and running python2.7

API Keys

You must set any API keys you’d like to use within modules inside the omnibus/etc/apikeys.json file. This file is a JSON ocument with placeholders for all the services which require API keys, and is only accessed by Omnibus on a per module basis to retrieve the exact API key a module needs to execute.

It should be noted that most of the services requiring API keys have free accounts and API keys. Some free accounts may have lower resource limits, but that hasn’t been a problem during smaller daily investigations or testing the application.

A handy tip: Use the cat apikeys command to view which keys you do in fact have stored. If modules are failing, check here first to ensure your API key is properly saved.

Interactive Console

When you first run the CLI, you’ll be greeted by a help menu with some basic information. We tried to build the command line script to mimic some common Linux console commands for ease of use. Omnibus provides commands such as cat to show information about an artifact, rm to remove an artifact from the database, ls to view currently session artifacts, and so on.

One additional feature of note is the use of the > character for output redirection. For example, if you wish to retrieve the details of an artifact named “” saved to a JSON file on your local disk you’d simply run the command: cat > inquest-report.json and there it would be! This feature also works with full file paths instead of relative paths.

The high level commands you really need to know to use Omnibus are:

start a new session

  • new <artifact name>

create a new artifact for investigation
display list of available modules

  • open <file path>

load a text file list of artifacts into Omnibus as artifacts

  • cat <artifact name | session id>

view beautified JSON database records
show all active artifacts
remove an artifact from the database
clear the current artifact session

Also, if you ever need a quick reference on the different commands available for different areas of the application there are sub-help menus for this exact purpose. Using these commands will show you only those commands available relevant to a specific area:
overall commands such as help, history, quit, set, clear, banner, etc.
display commands specific to artifacts and their management
display helpful commands around managing sessions
show a list of all available modules


Most cyber investigations begin with one or more technical indicators, such as an IP address, file hash or email address. After searching and analyzing, relationships begin to form and you can pivot through connected data points. These data points are called Artifacts within Omnibus and represent any item you wish to investigate.

Artifacts can be one of the following types:

  • IPv4 address

  • FQDN

  • Email Address

  • Bitcoin Address

  • File Hash (MD5, SHA1, SHA256, SHA512)

  • User Name

Creating & Managing Artifacts

The command “new” followed by an artifact will create that artifact within your Omnibus session and store a record of the artifact within MongoDB. This record holds the artifact name, type, subtype, module results, source, notes, tags, children information (as needed) and time of creation. Every time you run a module against a created or stored artifact, the database document will be updated to reflect the newly discovered information.

To create a new artifact and add it to MongoDB for tracking, run the command new <artifact name>. For example, to start investigation the domain, you would run new

Omnibus will automatically determine what type the artifact is and ensure that only modules for that type are executed against the artifact.

When a module is created, new artifacts may be found during the discovery process. For example, running the “dnsresolve” command might find new IPv4 addresses not previously seen by Omnibus. If this is the case, those newly found artifacts are automatically created as new artifacts in Omnibus and linked to their parent with an additional field called “source” to identify from which module they were originally found.

Artifacts can be removed from the database using the “delete” command. If you no longer need an artifact, simply run the delete command and specify the artifacts name or the session ID if it has one.


Omnibus makes use of a feature called “sessions”. Sessions are temporary caches created via Redis each time you start a CLI session. Every time you create an artifact, that artifacts name is added to the Session along with a numeric key that makes for easy retrieval, searching, and action against the related artifact. For example if you’re session held one item of “”, instead of needing to execute virustotal you could also run virustotal 1 and you would receive the same results. In fact, this works against any module or command that uses an artiface name as it’s first argument.

Sessions are here for easy access to artifacts and will be cleared each time you quit the command line session. If you wish to clear the session early, run the command “wipe” and you’ll get a clean slate.

Eventually, we would like to add a Cases portion to Omnibus that allows users to create cases of artifacts, move between them, and maintain a more coherent OSINT management platform. Though for this current pre-release, we will be sticking with the Session. 🙂


Omnibus currently supports the following list of modules. If you have suggestions or modules or would like to write one of your own, please create a pull request.

Also, within the Omnibus console, typing the module name will show you the Help information associated with that module.



  • Censys

  • ClearBit

  • Cymon

  • DNS subdomain enumeration

  • DNS resolution

  • DShield (SANS ISC)

  • GeoIP lookup

  • Full Contact

  • Gist Scraping

  • GitHub user search

  • email search

  • Hurricane Electric host search

  • HIBP search


  • IPInfo

  • IPVoid

  • KeyBase

  • Nmap

  • PassiveTotal

  • Pastebin

  • PGP Email and Name lookup

  • RSS Feed Reader

  • Shodan

  • Security News Reader

  • ThreatCrowd

  • ThreatExpert

  • TotalHash

  • Twitter

  • URLVoid

  • VirusTotal

  • Web Recon


As these modules are a work in progress, some may not yet work as expected but this will change over the coming weeks as we hope to officially release version 1.0 to the world!


Machines are a simple way to run all available modules for an artifact type against a given artifact. This is a fast way if you want to gather as much information on a target as possible using a single command.

To perform this, simply run the command machine <artifact name|session ID>  and wait a few minutes until the modules are finished executing.

The only caveat is that this may return a large volume of data and child artifacts depending on the artifact type and the results per module. To remedy this, we are investigating a way to remove specific artifact fields from the stored database document to make it easier for users to prune unwanted data.

Quick Reference Guide

Some quick commands to remember are:

  • session – start a new artifact cache

  • cat <artifact name>|apikeys – pretty-print an artifacts document or view your stored API keys

  • open <file path> – load a text file list of artifacts into Omnibus for investigation

  • new <artifact name> – create a new artifact and add it to MongoDB and your session

  • find <artifact name> – check if an artifact exists in the db and show the results


Reports are the JSON output of an artifacts database document, essentially a text file version of the output of the “cat” command. But by using the report command you may specify an artifact and a filepath you wish to save the output to:

omnibus >> report /home/adam/intel/osint/reports/inq_report.json

This above command overrides the standard report directory of omnibus/reports. By default, and if you do not specify a report path, all reports will be saved to that location. Also, if you do not specify a file name the report will use the following format:



The output of commands can also be saved to arbitrary text files using the standard Linux character >. For example, if you wish to store the output of a VirusTotal lookup for a host to a file called “vt-lookup.json” you would simply execute:

virustotal > vt-lookup.json

By default the redirected output files are saved in the current working directory, therefore “omnibus/”, but if you specify a full path such as virustotal > /home/adam/intel/cases/001/vt-lookup.json the JSON formatted output will be saved there.

Monitoring Modules

Omnibus will soon be offering the ability to monitor specific keywords and regex patterns across different sources. Once a match is found, an email or text message alert could be sent to the user to inform them on the discovery. This could be leveraged for real-time threat tracking, identifying when threat actors appear on new forums or make a fresh Pastebin post, or simply to stay on top of the current news.

Coming monitors include:

  • RSS monitor

  • Pastebin monitor

  • Generic Pastesite monitoring

  • Generic HTTP/JSON monitoring

Download OSINT Omnibus

Omnibus - Open Source Information Gathering Tool For Intelligence Collection Research And Artifact Management Omnibus - Open Source Information Gathering Tool For Intelligence Collection Research And Artifact Management Reviewed by SocialDr. on 3:16 AM Rating: 5

US bans government personnel from using Huawei and ZTE devices

2:41 AM

While the two companies might lose clients due to the new law, it could have been much worse for ZTE. The Senate already voted to reinstate a ban that would continue preventing ZTE from working with American manufacturers. It could have been a death sentence for the tech giant, seeing as it relies on US chipmakers for parts. However, the House of Representatives passed a version of the Defense Authorization Act without the language that reinstates those sanctions. The two chambers worked on a compromise after the Senate gave up on trying to restore the ban, and this measure is what they came up with.

The US government considers Huawei and ZTE as security threats and has been seeing them as such for a long time. Back in 2012, the Congress published the results of an 11-month probe wherein the investigators noted how the companies failed to explain their ties to the Chinese government. Earlier this year, the Pentagon banned the companies’ phones from military base retailers, citing security concerns. And just recently, the Democratic National Committee advised candidates running in November not to allow their staff to use devices by either company, especially after what happened during the 2016 Presidential Elections.

US bans government personnel from using Huawei and ZTE devices US bans government personnel from using Huawei and ZTE devices Reviewed by TechDr on 2:41 AM Rating: 5

Carbyne raises $15M for its next-gen 911 service, as Founders Fund invests in its first Israeli startup

2:06 AM

911 and other emergency numbers have been a key route for people to contact medical, police or fire services, with some 240 million calls are made for urgent help in the US alone each year. But while calling the numbers is a breeze, sometimes passing on crucial information is far from that, with most of these services built and operating on legacy infrastructure that makes pinpointing accurate locations and getting more detail about the problem (including to determine whether the call might have been in error) is a challenge.

Now a company that has developed a system to improve emergency response is announcing a round of funding in the race to update those platforms.

Carbyne, a startup out of Israel that has developed a new emergency callout platform that helps providers pinpoint a callers’ exact location and enable other services to improve and speed up communication and response times — by some 65 percent on average — has raised $15 million in Series B funding.

The round is significant not just because of the boost that it will give to Carbyne itself, but because of who is doing the backing. Led by Elsted Capital Partners, it also includes Founders Fund, the VC that has backed the likes of Facebook and Airbnb, but also startups that have made strong inroads into working with government and other public sector organizations on data-based services, such as Palantir, Anduril and Deep Mind (now a part of Google).

Previous backers of Carbyne have included the former prime minister of Israel, Ehud Barak, who is also the company’s chairman, and the company has now raised about $24 million, with a valuation that I understand to be in the region of $100 million, although the company is not commenting on the number.

Most of the emergency calling services that are in place around the world were built to be used with legacy wired phone networks. In many countries, however, not only are people doing away with their fixed lines, but they are making these calls from mobile phones — in some cases up to 80 percent of all emergency calls are coming from mobile phones. This means that not only are some inbound calls to public safety answering points (PSAPs) unable to provide the data that the legacy systems need, but — coming from smartphones — they potentially could provide a far richer set of data, if the systems were set up to receive it.

On top of this, it can simply take too long, or be impossible, for a reporter of an emergency to convey crucial information through a phone conversation. (Indeed, the idea for the service was hatched after founder Amir Elichai discovered how long it took to identify his location and other details to emergency services after he was mugged.)

Carbyne — originally called Reporty and rebranded earlier this year to the word for what is now considered to be the world’s strongest substance — lets emergency response providers connect with reporters through two products to fill that gap.

There is an app, called C-Now, that people can download on iOS or Android to provide instant video, down-to-one-meter location data, and lots of other details when making a report to emergency response call centre. (This potentially can include whatever an emergency response organization might want to collect, within the scope of a phone and the data that it can pick up either directly or via APIs from other devices, such as heart rate monitors.) The app is live in 161 countries.

There is also a service, C-Lite, that plugs directly into legacy 911 services, which lets PSAPs send links to reporters to collect additional information without the reporter needing to download an app, and without the PSAP needing to upgrade its legacy systems. Both C-Lite and the app are cloud-based to create more redundancy in case of service outages. The company also says that it is GDPR compliant and uses “military-grade” security protocols to protect people’s information when they call.

Between all of that, the company has also developed technology to pinpoint locations in indoor spaces, and also a platform that monitors all calls and other data (such as video coming from a surveillance camera) at a specific location in order to build a more comprehensive picture of the emergency.

Carbyne is not the only startup that is looking to fill the gap between legacy 911 offerings and the promises of what the next generation of cloud-based communication and mobile technology can bring to improve efficiency in these services. RapidSOS provides a bridge between mobile phone calls to 911 and legacy 911 PSAP services, so that those making calls on mobile can still provide location data. RapidSOS also serves as a supplement that works just on mobile in the event that the legacy system falls over, and it really came into its own during the trio of tropical disasters last autumn across Puerto Rico, Texas and Florida.

Like Carbyne, RapidSOS has some big-name supporters: it is backed by former FCC chairmen Tom Wheeler and Julius Genachowski, in addition to a range of other investors. It’s also now integrated with services like Uber and Apple’s iOS for faster reporting of location.

One of the points of differentiation between RapidSOS and Carbyne is that the latter is potentially a full replacement for the 911 system in the event that an organization was considering that route. Elichai said that there are several organizations evaluating Carbyne now in across Europe, and it is already rolling out its service in Fayette County in Georgia.

But by and large there aren’t many startups looking to disrupt this area, which was one reason why Founders Fund was interesting in backing the company. “I’m looking for businesses that aren’t massively competitive, and Carbyne stands alone in a really unpopular industry,” Trae Stephens, a partner at the firm who is leading the investment, told TechCrunch. “In the world of emergency services, it’s really important for tech to contribute to fixing some of the antiquated systems, and that is what excited me. I definitely looked at other companies in emergency services, but but nothing came remotely close to the approach that Carbyne has taken, which is platform-agnostic.”

Longer term, Elichai said that while emergency services will remain a primary interest, there are potential other areas where its technology could be applied.

“We see ourselves connecting any device to the platform,” he said in an interview. “Because of the fact that we have a strong real-time communications platform, we have received request from other industries.” These have included, for example, insurance companies.

“If you ski in Aspen or Chamonix, you get extreme sports insurance. If you have to make a claim, most people ski with their cell . phones now, and if you use Carbyne you would be able to open the claim automatically with evidence from the scene, making checking and processing much more efficient.”

Carbyne raises $15M for its next-gen 911 service, as Founders Fund invests in its first Israeli startup Carbyne raises $15M for its next-gen 911 service, as Founders Fund invests in its first Israeli startup Reviewed by NewsDr. on 2:06 AM Rating: 5

Reports of Election Site Hacking Rankle Florida Officials

1:55 AM

Child’s play or a signs of a serious security problem in one of the nation’s swing states?

That’s the question confronting Florida election officials who are pushing back against reports that an 11-year-old hacked a replica of the state’s election website.

Multiple media outlets over the weekend reported that children at a hacking conference in Las Vegas were able to easily hack into a version of the website that reports election results to the public. An 11-year-old boy got into Florida’s site within 10 minutes, while an 11-year-old girl did it in 15 minutes, according to the organizers of the event called DEFCON Voting Machine Hacking Village.

State officials contend there’s no way that the replica used by hackers is an actual representation of the state’s website.

“This was a mock site with likely very few, if any, security measures in place,” said Sarah Revell, a spokeswoman for Secretary of State Ken Detzner. “It is not a real-life scenario and it offers a wholly inaccurate representation of the security of Florida’s elections websites, online databases and voting systems that does not take into account the state-of-the-art security measures the Florida Department of State has in place to prevent any possible hacking attempts from being successful.”

Florida’s election website that displays results is not connected to the actual local election systems responsible for tabulating votes. Instead, on election night supervisors upload unofficial results to state officials through a completely different network.

Still if someone was able to manipulate the website it could create confusion and sow doubts about the actual results once they were announced. Investigators in May found evidence of a cyberattack on a Tennessee county’s elections website from a computer in Ukraine, which likely caused the site to crash just as it was reporting vote totals during a primary.

Nico Sell, one of the organizers of the event, told PBS Newshour on Sunday that the replicas used at the conference were accurate representations.

“The site may be a replica but the vulnerabilities that these kids were exploiting were not replicas, they’re the real thing,” the television network quoted her. “I think the general public does not understand how large a threat this is, and how serious a situation that we’re in right now with our democracy.”

Mark Earley, the elections supervisor in Leon County who is a cybersecurity liaison between state and local officials, questioned how outsiders could obtain the security protocols used by Florida if they weren’t already behind the system’s firewalls. He said that all this “hacking noise” and “misinformation plays into the hands of the folks who are trying to undermine democracy.”

Jeff Kosseff, a lawyer and assistant professor at the United States Naval Academy Cyber Studies Department, said states are struggling with election security threats. He said they should work with outsiders in order to see if there are flaws in their systems.

“All states should look at this as a wake-up call,” Kosseff said. “What were the shortcomings identified and how they can fix it. I don’t think it should be an adversarial.”

The reports of hacking into Florida’s website that reports election results coincide with a dust-up between U.S. Sen. Bill Nelson and Gov. Rick Scott over possible Russian meddling in other parts of the state’s election system.

Nelson last week said Russians were able to get inside the election systems of “certain counties” and “now have free rein to move about.” He added that “the threat is real and elections officials — at all levels — need to address the vulnerabilities.”

The senator has not provided any more details, saying that additional information is classified. Scott has demanded that Nelson provide proof of his claims. Last Friday two Republicans who are on the Senate intelligence community declined to confirm or deny Nelson’s statements.

Russian hackers targeted at least 21 states, including Florida, ahead of the 2016 election and breached the voter registration system in at least one, Illinois, investigators say. An indictment released last month said Russian operatives sent over 100 fake emails to elections offices and personnel in Florida as part of the hacking effort. State officials have never acknowledged how many counties were targeted by the Russians.

Reports of Election Site Hacking Rankle Florida Officials Reports of Election Site Hacking Rankle Florida Officials Reviewed by NewsDr. on 1:55 AM Rating: 5

White House: Trump Aide Bolton Met Turkish Envoy to Discuss US Pastor 

1:55 AM

White House national security adviser John Bolton met on Monday with Turkey’s ambassador to the United States to discuss Turkey’s detention of American pastor Andrew Brunson, the White House said.

“At the Turkish ambassador’s request, Ambassador John Bolton met with Ambassador Serdar Kilic of Turkey (on Monday) in the White House. They discussed Turkey’s continued detention of Pastor Andrew Brunson and the state of the U.S.-Turkey relationship,” White House spokeswoman Sarah Sanders said.

“The fact that there’s ongoing discussions between the two countries regarding Brunson’s return to the U.S. is positive,” said Jay Sekulow, an attorney for U.S. President Donald Trump who is also representing Brunson’s family. “I look forward to the Brunson family returning to the U.S.”

Turkish Ambassador to the United States Serdar Kilic speaks to the Conference on U.S.-Turkey Relations in Washington, May 22, 2017.

Turkish Ambassador to the United States Serdar Kilic speaks to the Conference on U.S.-Turkey Relations in Washington, May 22, 2017.

Relations between NATO allies Turkey and the United States are at a low point, hurt by Brunson’s detention, as well as diverging interests in Syria. Trump doubled tariffs on Turkish steel and aluminum imports last week, contributing to a precipitous fall in the lira.

U.S. officials have given no indication that the United States has been prepared to give any ground over the Brunson issue, with Trump seemingly content to keep up economic pressure.

The United States is also considering a fine against Turkey’s state-owned Halkbank for allegedly helping Iran evade U.S. sanctions. Earlier this month, the United States imposed sanctions on two top officials in Erdogan’s cabinet in an attempt to get Turkey to turn over Brunson.

Last week, Trump tweeted that “our relations with Turkey are not good at this time!”

White House economic adviser Kevin Hassett said the Trump administration was carefully monitoring the financial situation in Turkey after its currency fell to a record low against the U.S. dollar on Monday.

“We’re monitoring it very closely. Treasury Secretary (Steven) Mnuchin is monitoring it very closely,” Hassett, the chairman of the White House Council of Economic Advisers, told MSNBC.

White House: Trump Aide Bolton Met Turkish Envoy to Discuss US Pastor  White House: Trump Aide Bolton Met Turkish Envoy to Discuss US Pastor  Reviewed by NewsDr. on 1:55 AM Rating: 5
Powered by Blogger.

Action Required

Sorry !!Friends We are Earn Some Money from Ads and Manage Our Site.If You Like To Support US Please Disable ADS Blocker and Continue Reading. Thank You


Thank 4R Your Support