0 0
Read Time:45 Second

Stop oppressing your people

Following the hostile and exclusive action of Google Play against Iranian platforms and removing them from users’ phones, it is suggested to use Iranian programs as an alternative to Google services.

Search engine:
Yandex: yandex.com
Magnifier: zarebin.ir

Map and navigation:
Logo: neshan.org

Cloud storage space:
Picofile: picofile.com

Translation:
Translator: https://targoman.ir/

Listening to podcasts and music:
Shenoto: http://www.shenoto.com
Namlik: http://www.namlik.me

Downloading applications:
Sibche: http://www.my.sibche.ir
Sibapp: http://www.sibapp.com
Cafe Bazaar: http://www.cafebazaar.ir
Myket: http://www.myket.ir

Reading sites:
Taghche: http://www.taghche.com
Fidibo: http://www.fidibo.com

Watch movies and videos:
Aparat: http://www.aparat.com
Namava: http://www.namava.ir
Filimo: http://www.filimo.com

Download music:
Beeptunes: http://www.beeptunes.com
Navaak: http://www.navaak.com
Nex One Music: http://www.nex1music.ir

Email services:
Chapar: http://www.chmail.com
Mihan Mail: http://www.mihanmail.ir
Post email: http://www.mail.iran.ir
Mail Yandex: http://www.mail.yandex.com

Pasdaran Cyber Corps

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence