

43·
4 months agoThis is for only one item:
Anker has issued a recall for its PowerCore 10000 power bank (model A1263) due to a “potential issue with the lithium-ion battery” that could pose a fire safety risk. The company has received 19 reports of fires and explosions
The recall covers about 1,158,000 units that were sold online through Amazon, Newegg, and eBay between June 2016 and December 2022. The affected batteries can be identified by the Anker logo engraved on the side with the model number A1263 printed on the bottom edge. However, Anker is only recalling units sold in the US with qualifying serial numbers.
If you’re going to be giving out advice, you should at least know that Mozilla VPN is rebranded Mullvad VPN. So most of the information on your chart should be exactly the same for both.
https://www.mozilla.org/en-US/products/vpn/features/
Scroll down to “Convenient,” then “More than 500 servers in 30+ countries,” and click on the link “See our list of servers,” which takes you to the Mullvad website server list here:
https://mullvad.net/en/servers
Unless something has changed, the VPN that Malwarebytes sells is also rebranded Mullvad.
In my opinion, if you’re going to include a VPN like PIA, you should also include who owns them (Kape Technologies - owner of multiple VPNs), and instruct people to do an internet search for “Kape Technologies malware.” I’m not saying don’t get PIA, but people should be able to at least make an informed decision:
“Kape Technologies, originally known as Crossrider, has a history of distributing malware through its ad injection platform before rebranding and focusing on VPN services. While it has since shifted its business model, concerns about its past and corporate practices remain prevalent in discussions about its VPN offerings.”
https://www.malwarebytes.com/blog/detections/adware-crossrider
Additional reading: https://en.wikipedia.org/wiki/Teddy_Sagi#Kape_Technologies
Likewise, inform people to search for “Nord data breach,” so people can again make an informed decision. It wasn’t the fact that there was a data breach, but how it was handled that some had a problem with:
“Evidence indicates the attack most likely happened some time between January 31st, 2018, when the server came online, and March 5th, 2018. The attack was made via a compromised data center account, not an account managed by NordVPN. The data center deleted this account on March 20th, 2018, blocking any further access to the server. NordVPN claims not to have been notified about the breach until April 13th, 2019, more than a year after it happened. It took down the server the same day, and began an immediate audit of its 5,000 servers. The company wouldn’t go public until evidence of the hack emerged some six months later. Why? The blog post stated: ‘thoroughly reviewing the providers and configurations for over 5,000 servers around the world takes time. As a result, we decided we should not notify the public until we could be sure that such an attack could not be replicated anywhere else on our infrastructure.’”
Again, not saying there is a problem with PIA and Nord, just that people should know about these things before making a decision.