It's another day to expose Peter Alabi @pastorpeealabi of @HoFChurchNG & @ChristTribe. More victims have reached out to us. Unknown to many, Peter Alabi is actually an unrepentant serial sexual abuser. We know that he's been lying that he has repented and that the stories...

... we have put out so far are only with reference to what happened years back. But we can also confirm that he continued to prey on more victims even after he left Ife in 2016. We also know that Peter Alabi made serious attempts to sleep with some ladies during the lockdown...
A victim, who was one of those Peter Alabi tried to sleep with during the Covid-19 lockdown has shared with us some of the chats between her and Peter Alabi, which were initiated by Peter Alabi. According to the victim, when Peter Alabi's intentions became obvious, she decided...
... to play along and act like she was in concert with him. This eventually made Peter Alabi to reveal his covert intentions to sleep with her. The chat began on Instagram in March 2020 and continued on WhatsApp till June 2020. We will be sharing screenshots of the Instagram...
... chats below. Later today, we will share the WhatsApp chats which are more revealing and expository. Please see the screenshots of the Instagram chats between Peter Alabi (peterayoalabi) and the victim below👇🏾 @oauchristians @HoFChurchNG @peterayoalabi @funlola_alabi
@PremiumTimesng @MobilePunch @TheNationNews @thecableng @GuardianNigeria @OmoKakafiala @lady_dimpled @Orifunke @FarindeKemi @DejiOnadeko @samjay01 @sharon_ebiere @Amypebbles_
@OAUSecDep @TheGreatestIFE @TunjiOgunoye @ApeteAbiodun2 @goke_sola @EdemaOluwasegun @HoFChurchNG @ChristTribe @feminist_co @Olushola_k @sweeterdanhony @raphtovan
https://t.co/kfvtG98pVZ
@TunjiOgunoye @Mz_phoebe
https://t.co/5vBqjRaadN
We are not done with Peter Alabi @pastorpeealabi of @HoFChurchNG @ChristTribe yet. More victims are speaking up and their voice must be heard!
This is the part 2 (WhatsApp chats) of the conversation that started on Instagram between Peter Alabi ("peterayoalabi" or "pp") and the victim. Please see below. 👇🏾 @oauchristians @TheGreatestIFE @OmoKakafiala @pastorpeealabi @EdemaOluwasegun @Oluwa_kaycee @TunjiOgunoye
@PremiumTimesng @MobilePunch @feminist_co @instablog9ja @Lindaikeji_Blog @thecableng @Olushola_k @FarindeKemi @samjay01 @DejiOnadeko
@Amypebbles_ @sharon_ebiere @ChristTribe @goke_sola @BSAbiola @akinrinadetobi @Mz_phoebe
@Oluwa_kaycee @HoFChurchNG @funlola_alabi @ChristTribe @raphtovan @sweeterdanhony
@OAUSecDep @TheGreatestIFE @vanguardngrnews
https://t.co/sOV022qiRp

More from Crime

My students @maxzks and Tushar Jois spent most of the summer going through every piece of public documentation, forensics report, and legal document we could find to figure out how police were “breaking phone encryption”. 1/


This was prompted by a claim from someone knowledgeable, who claimed that forensics companies no longer had the ability to break the Apple Secure Enclave Processor, which would make it very hard to crack the password of a locked, recent iPhone. 2/

We wrote an enormous report about what we found, which we’ll release after the holidays. The TL;DR is kind of depressing:

Authorities don’t need to break phone encryption in most cases, because modern phone encryption sort of sucks. 3/

I’ll focus on Apple here but Android is very similar. The top-level is that, to break encryption on an Apple phone you need to get the encryption keys. Since these are derived from the user’s passcode, you either need to guess that — or you need the user to have entered it. 4/

Guessing the password is hard on recent iPhones because there’s (at most) a 10-guess limit enforced by the Secure Enclave Processor (SEP). There’s good evidence that at one point in 2018 a company called GrayKey had a SEP exploit that did this for the X. See photo. 5/

You May Also Like