freemexy's Blog

How the Titanic was lost and found

Many historical accounts of the sinking of the RMS Titanic describe the 882.5-foot-long passenger ship as “slipping beneath the ocean waves,” as though the vessel and its passengers drifted tranquilly off to sleep, but nothing could be further from the truth. Based on years of careful analysis of the wreck, which employed then state-of-the-art flooding models and simulations used in the modern shipping industry, experts are able to paint a gruesome portrait of Titanic’s last hours and minutes.To get more titanic remains, you can visit shine news official website.

Earlier this month, research on the ship continued as a team of experts completed five manned submersible dives at the site over an eight day span. Using high tech equipment, the team captured footage and images of the wreck that can be used to create 3D models for future augmented and virtual reality. The assets will help researchers further study the past and future of the ship.

The Titanic is in severe decay caused by salt corrosion and metal eating bacteria, Caladan Oceanic, the company overseeing the expedition, said in an announcement about the dives. A manned submersible reached the bottom of the north Atlantic Ocean in August.

The Titanic dive is being filmed by Atlantic Productions for the documentary special, "Mission Titanic", which will air globally on National Geographic in 2020.

“The most shocking area of deterioration was the starboard side of the officers’ quarters, where the captain’s quarters were,” said Titanic historian Parks Stephenson. The hull had started to collapse taking staterooms with it.

Scientists expect the erosion of the Titanic to continue.

“The future of the wreck is going to continue to deteriorate over time, it’s a natural process,” said scientist Lori Johnson.The Titanic's fate was sealed on its maiden voyage from Southampton, England to New York City. At 11:40 p.m. on April 14, 1912, the Titanic sideswiped an iceberg in the north Atlantic, buckling portions of the starboard hull along a 300-foot span and exposing the six forward watertight compartments to the ocean’s waters. From this moment onward, sinking was a certainty. The demise may have been hastened, however, when crewmen pushed open a gangway door on the port side of Titanic in an aborted attempt to load lifeboats from a lower level. Since the ship had begun listing to port, gravity prevented the crew from closing the massive door, and by 1:50 a.m., the bow had settled enough to allow seawater to rush in through the gangway.

By 2:18 a.m., with the last lifeboat having departed 13 minutes earlier, the bow had filled with water and the stern had risen high enough into the air to expose the propellers and create catastrophic stresses on the middle of the ship. Then the Titanic cracked in half.

Once released from the stern section, the bow fell to the ocean floor at a fairly steep angle, nosing into the mud with such massive force that its ejecta patterns are still visible on the seafloor today.

The stern, lacking a hydrodynamic leading edge like the bow, tumbled and corkscrewed for more than two miles down to the ocean floor. Compartments exploded. Decks pancaked. Heavier pieces such as the boilers dropped straight down, while other pieces were flung off into the abyss.


Back to the Hanfu-ture: Young Chinese revive ancient fashion

Dressed in a flowing long robe adorned with beaded floral embroidery from a bygone era, stylist Xiao Hang looks like she surfaced from a time machine as she strides across the bustling Beijing metro, attracting curious glances and inquisitive questions.To get more hanfu dress, you can visit shine news official website.

China has embraced Western fashion and futuristic technology as its economy boomed in recent decades, but a growing number of young people like Xiao are looking to the past for their sartorial choices and donning traditional "hanfu", or "Han clothing".

These historic costumes of the Han ethnic majority are enjoying a renaissance in part because the government is promoting traditional culture in a bid to boost patriotism and national identity.

Period dramas have also contributed to the surge in interest for traditional Chinese garb -- "The Story of Minglan", a TV series set in the Song Dynasty, garnered more than 400 million viewers in three days when it debuted earlier this year.

There is no uniform definition of what counts as hanfu since each Han-dominated dynasty had its own style, but the outfits are characterised by loose, flowing robes that drape around the body, with sleeves that hang down to the knees."When we were little, we would also drape sheets and duvets around ourselves to pretend we were wearing beautiful clothes," Xiao told AFP.

Xiao, who used to work at a state-owned machine manufacturing company, now runs her own hanfu business, where she dresses customers for photo shoots and even plans hanfu-style weddings.In modern China, the hanfu community spans the gamut: from history enthusiasts to anime fans, to students and even young professionals.

Yang Jiaming, a high school student in Beijing, wears his outfit under his school uniform.

"Two-thirds of my wardrobe is hanfu," he said, decked out in a Tang-style beige gown and black boots at a hanfu gathering, adding that his classmates and teachers have been supportive of his style.

A government-supported revival in Chinese culture has given the hanfu community a boost: since he entered office in 2012, President Xi Jinping has supported the idea of promoting a Han-centric version of heritage.

In April, the Communist Youth League of China launched a two-day conference for traditional Chinese garb, including hanfu.A live broadcast of the event drew some 20 million viewers, alongside a visceral outpouring of emotions.

"Chinese people have abandoned their own culture and chosen Western culture. The red marriage gown has now become a wedding dress," wrote on user on Bilibili, a video streaming platform popular among young anime, comic and gaming fans in China.

Clothes are the "foundation of culture," said Jiang Xue, who is part of Beijing-based hanfu club Mowutianxia, which has received funding from the Communist Youth League."If we as a people and as a country do not even understand our traditional clothing or don't wear them, how can we talk about other essential parts of our culture?" she said.


March of the Volunteers

2019’s The Wandering Earth is a 2019 Chinese film adaptation of Liu Cixin’s novella of the same name (which I have not read). It is directed by Frant Gwo and stars Qu Chuxiao, Li Guangjie, Ng Man-tat, Zhao Jinmai, Wu Jing, and Qu Jingjing. A major hit in China, it was stealth-released on Netflix on May 6, 2019. To get more march of the volunteers, you can visit shine news official website.
Bad news for Earth! The Sun is transitioning from a main sequence star to a red giant five billion years ahead of schedule. Life within the Solar System will soon become impossible.
There’s an alternative to extinction, at least for humanity. Simply move the Earth to the Alpha Centauri system.

Humanity unites in the face of calamity. Under the United Earth Government, gigantic fusion engines are constructed across the planet, as are vast underground cities. Earth’s rotation is halted (dooming a considerable fraction of humanity as tsunamis wash across the world) and the Earth is propelled out of its orbit towards Alpha Centauri. The journey will take 2500 years.
Astronaut Liu Peiqiang (Wu Jing) is assigned to the giant space station that will precede the Earth on its trek to the stars. Although this will part him from his family for almost twenty years, it earns his family a place in the underground cities that will protect the surviving humans. Despite the best efforts of the UEG, not everyone can be saved. Liu’s terminally ill wife elects to halt her medical treatment so that her father Han Zi’ang (Ng Man-tat) can take her place and care for Liu and her son, Liu Qi (Qu Chuxiao).
Seventeen years after launch, Peiqiang’s tour of duty is coming to its end, just as the Earth is approaching Jupiter. Down on Earth, Qi has grown into a rebellious young man who blames his mother’s death on his absentee father. Rather than look forward to reunion with a father he has not seen since childhood, Qi leads his adopted sister Han Duoduo into a life of delinquency.
Qi steals Zi’ang’s ID, then (accompanied by Duoduo) borrows a transport truck. Qi’s crime is very nearly perfect, save for the fact he cannot master the truck’s user-unfriendly UI. Arrested almost immediately, Qi and Duoduo are thrown into a holding cell, from which they hope their grandfather will rescue them. Zi’ang attempts to bribe the guards; he is thrown into the same cell.
Qi’s teenage hijinks may have saved his and his family’s lives. As the Earth approaches Jupiter, Jupiter’s gravity spikes trigger earthquakes across the planet. Large swathes of the underground cities collapse. The prison facility is damaged but some areas are spared. Qi, Duoduo, Zi’ang, and fellow prisoner Tim escape unscathed.
All across Earth fusion drives flicker out. Without them, the Earth will approach too closely to Jupiter. Unless the drives can be repaired in time, Earth will be torn apart and fall into Jupiter. Millions of people across the world are drafted into a desperate bid to save planet-bound humanity from certain doom.
Up on the space station, artificial intelligence MOSS calculates the odds of success. The effort to restart the engines in time cannot succeed. Alternative plans to save the Earth are likewise doomed to failure. Only the vast space station and its trove of information, hibernating staff, and genetic samples of terrestrial life can be preserved.
It was only by accident that I discovered that Netflix had released The Wandering Earth. One wonders why they chose to release a megahit film without any publicity.
First, the bad: I have no idea what gravity spikes are supposed to be, or why, having had seventeen years to prepare for them, UEG seems to be surprised by the damage that ensues as Earth approaches Jupiter. In general, UEG makes a lot of counter-intuitive decisions, building trucks with user-hostile user-interfaces, sending rescue teams on routes vulnerable to earthquake and collapse. The space station seems to have been designed to maximize the mishap potential. And don’t get me started on the part where they propose setting hydrogen-rich Jupiter on fire.
(It may be relevant that I wasn’t able to work out how to ensure that subtitling would appear on high contrast backgrounds; I missed some dialogue. Perhaps it all makes sense with added info.)
The Wandering Earth may have pretensions of being hard SF, but it is also a large-scale disaster film. Qi and Duoduo have plot armour, but other characters don’t. Any time the viewer guesses that ​“this supporting character will not survive the next scene,” the viewer is almost certainly correct.
(Tim gets plot armour too, as the comic relief.)
The Wandering Earth is filled with heroic figures sacrificing their lives to save their world. Initially, neither Qi nor the almost entirely useless Duoduo are among this legion of willing heroes; they are concerned with personal survival rather than their duty to the planet as a whole. Qi, Duodou and Zi’ang are eventually drafted into the save-the-planet effort, but it takes them a surprisingly long time to realize that they won’t survive unless the planet does.


The rise of obfuscated VPN servers and their use cases

VPNs continue to be used extensively as tools to protect data security and user privacy. Yet, as to be expected, there are many providers available, and many options within those providers – so buyer confusion can reign.VPN download

A virtual private network, by itself, is the secure, private connection between your device and your intended destination. When dealing with VPN servers, the options start to broaden. There are a number of server categories to choose from; standard servers, double VPN servers, where the traffic is encrypted twice, ‘Onion over VPN’, which involves the Onion network, dedicated IP servers, P2P servers, and obfuscated servers.Buy VPN

Increasingly, obfuscated VPN servers are becoming a useful tool, particularly for users in countries with limited internet access. So what are obfuscated VPN servers? How do they work? And what are your options?
An obfuscated server can bypass internet restrictions such as network firewalls. In countries with restricted access, these types of servers are recommended. Why is this necessary? Although many people feel as if the internet should be free to roam and use as they wish, that’s not always the case. Consider VPN blocks – they aren’t just for government entities. You will find VPN blocks like ISPs, streaming services, universities and schools that also prevent the use of VPNs.

Obfuscation, also known as OBFU, restricts reverse engineering in programs, making it hard for hackers to access metadata. In other words, this VPN helps take data and makes it look like a jumbled mess.
Some people may refer to this as “stealth” or “camouflage” mode. VPN providers can’t physically put their VPN servers in countries that have strict censorship rules, so they use virtual servers with obfuscation to bypass their firewalls. It disguises data passing through the VPN app to look like regular HTTPS traffic.

Here’s a good example of an obfuscated VPN server and how it can be used. Consider Netflix and how it distributes shows among regions at different costs. In Australia the service may be $7.10, while in Australia that same service could cost $11.90. The server levels the playing field, allowing the user to get the $7.10 deal instead of having to pay $11.90. For online gamers, this is gold. If their ISP is charging more for gaming but a lesser price for general browsing, the VPN traffic can be altered to look like the user is just browsing the web. While the ethics of this can be questioned, there is no doubt that this trend helps drive VPN usage.
Even with the ability to use an obfuscated VPN server, a handful of countries have banned the use of VPNs or have otherwise made them illegal. Here are those countries and why:

China: China has the Great Firewall (GFW) that was designed to filter and block restricted websites and services. It is one of the largest and most intricated technologies designed for censoring and mass surveillance. China passed CL97 legislation that not only criminalizes cybercrime, but people found to use VPNs in some parts of China can be fined or worse. Some of the websites blocked from mainland China include Google, Gmail, Instagram, Pinterest, YouTube, Dropbox, The New York Times, Facebook and Twitter.

Russia: Russia is another country that bans the use of VPNs to restrict the spread of extremist and unlawful conduct. The Russian government wants to restrict what content can be accessed in the country. Anyone found using an VPN can be fined up to $5,100, and VPN providers can be fined up to $12,000.

Iran: Iran has given harsh penalties to anyone using a VPN in their country since 2013. There are a few government-approved VPNs regulated by the government that are allowed. If caught using a VPN, the user can face up to one year in prison.

UAE: The United Arab Emirates also considers VPN usage a federal offense or crime. If found using a VPN, the user can be fined between $136,000 to $544,000 U.S. dollars. This ban is only imposed on individuals using VPNs for personal use. Banks and other institutions can freely use VPNs. Law No 5 of 2012 states local residents can only use state-owned VPNs and can face life imprisonment.When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN.Qwer432
http://www.buyexpressvpn.net/
http://www.buyvpnservice.net/


NSA Warns of Vulnerabilities in Multiple VPN Services

Nation-state actors are actively exploiting vulnerabilities in three different virtual private network services to gain access to users’ devices, according to the National Security Agency.unblock websites

In an advisory issued Monday, NSA said international hackers were taking advantage of bugs in older versions of virtual private network applications produced by Pulse Secure, Fortinet and Palo Alto Networks. Users of the products are “strongly recommended” to update their systems, the agency said.

Virtual private networks, or VPNs, allow users to safely share data across public Wi-Fi and other potentially insecure networks.

According to the advisory, the vulnerability in the Pulse Secure product allows nefarious actors to remotely execute code and download files, as well as intercept encrypted network traffic. The bugs in the other two systems both allow for remote code execution, the NSA said.

The National Cyber Security Centre, a component of the United Kingdom’s intelligence agency, the GCHQ, published its own warning about the vulnerabilities on Oct. 2. The NSCS advisory said the exploits could allow hackers to download user credentials.

After upgrading to the latest version of the VPN software, users should reset their credentials before reconnecting to the network, NSA said. The agency also listed a handful of other protective measures users can take to prevent nefarious actors from infiltrating their devices.

Neither NSA nor NCSC disclosed which foreign actors were exploiting the vulnerabilities, though the advisories come roughly a month after reports that a Chinese hacker ring known as APT5 was targeting Fortinet and Pulse Secure servers. According to the cybersecurity company FireEye, the group has been active since 2007 and targets organizations across numerous industries, with a particular focus on the tech and telecom sectors.When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN.Qwer432
http://www.vpnsnetflix.net/
http://www.buysecurevpn.com/


Best business VPN providers of 2020

Keeping data safe, particularly for small to medium businesses, has never been more crucial than now.fast VPN

Using one of the best VPNs is extremely important for any modern business which has a flexible and mobile workforce. As a VPN helps you protect business data by keeping a secure company network and internet connection. Which in turn, allows you to ensure and maintain high levels of privacy and security.

This is especially helpful in the world of small businesses, which usually have limited resources to devote to managing security. Fortunately, there are business VPNs out there which are a breeze to set up and manage, plus they can be scaled to fit the organisation’s needs as it grows.
Perimeter 81, powered by SaferVPN, offers a great business VPN experience for users who work across multiple devices and switch from one to another frequently.

It has well-designed clients for Windows, Mac, iOS and Android, is compatible with Linux and Chromebook, and includes a single-click web management console.

While the server coverage may be slightly limited, it didn’t bother us as we got above-average speeds in our performance tests. The provider upholds a strict no-logging policy. Perimeter 81 supports IKEv2, OpenVPN, L2TP and PPTP security protocols, features automatic Wi-Fi security, and business clients enjoy priority support around the clock.

Perimeter 81 has two business plans to choose from, depending on the number of users needed – including a custom plan if required. The packages available are:
TechRadar readers get 25% off VyprVPN annual plans ($45 USD for 1 year). VyprVPN is a fast, highly secure VPN without third parties. Get VyprVPN here

VyprVPN manages all of its own servers which definitely shows when it comes to performance levels. In our tests, we found our download speeds more than doubled compared to our normal rates with the VPN turned off – it doesn’t come any better than that.

Vypyr provides you with easy-to-use and intuitive software for overall account management, as well as apps for all major platforms. In addition to OpenVPN, PPTP and L2TP/IPsec protocols, VyprVPN offers additional security features like a NAT Firewall and its own Chameleon technology for preventing deep packet inspection (DPI), VPN blocking and throttling. 24/7 live chat support is in place for when you need assistance.

Interestingly, there isn't much information listed on the website regarding the business plans. To find out more about them, and discover the exact pricing, you have to apply for a free trial or contact customer support. There are two of these plans pitched pretty closely together, starting from $299 and $349 respectively. The packages available are:
On the downside, the number of server locations is rather low, while this business VPN doesn’t offer any management software so you only have native apps at your disposal.

The privacy policy is favorable, not keeping any logs, and on the security front you get all the usual protocols. Additional features include private browsing and virtual locations, among others. There’s dedicated customer support in case you run into any hiccups.When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN.Qwer432
http://www.fastvpnproxy.com/
http://www.vpnsnetflix.com/


Top VPNs secretly owned by Chinese firms

Almost a third (30%) of the world’s top virtual private network (VPN) providers are secretly owned by six Chinese companies, according to a study by privacy and security research firm VPNpro.VPN service

The study shows that the top 97 VPNs are run by just 23 parent companies, many of which are based in countries with lax privacy laws.Six of these companies are based in China and collectively offer 29 VPN services, but in many cases, information on the parent company is hidden to consumers.Researchers at VPNpro have pieced together ownership information through company listings, geolocation data, the CVs of employees and other documentation.

In some instances, ownership of different VPNs is split amongst a number of subsidiaries. For example, Chinese company Innovative Connecting owns three separate businesses that produce VPN apps: Autumn Breeze 2018, Lemon Cove and All Connected. In total, Innovative Connecting produces 10 seemingly unconnected VPN products, the study shows.

Although the ownership of a number of VPN services by one company is not unusual, VPNpro is concerned that so many are based in countries with lax or non-existence privacy laws.

For example, seven of the top VPN services are owned by Gaditek, based in Pakistan. This means the Pakistani government can legally access any data without a warrant and data can also be freely handed over to foreign institutions, according to VPNpro.

The ability to access the data held by VPN providers, the researchers said, could enable governments or other organisations to identify users and their activity online. This potentially puts human rights activists, privacy advocates, investigative journalists and whistleblowers in jeopardy.This lack of privacy, the study notes, extends to ordinary consumers, who are also coming under greater government surveillance.

“We’re not accusing any of these companies of doing anything underhand. However, we are concerned that so many VPN providers are not fully transparent about who owns them and where they are based,” said Laura Kornelija Inamedinova, research analyst at VPNpro.

“Many VPN users would be shocked to know that data held on them could be legally requested by governments in countries such as China and Pakistan.“Our recommendation is that people do a lot of due diligence on the VPN that they want to use, since they aren’t all created equal and simply using a VPN does not guarantee privacy or security.”

VPNpro identified a further four companies: Super VPN & Free Proxy, Giga Studios, Sarah Hawken, and Fifa VPN, which together own 10 VPN services – where the parent company, and therefore company of origin, is completely hidden.

In February 2019, two US senators raised concerns about this issue and the potential threat to consumers and government agencies, calling on the Department of Homeland Security to investigate the possibility that VPNs are allowing valuable information to be routed to foreign adversaries.

In a letter, Democrat Ron Wyden and Republican Marco Rubio asked Christopher Krebs, director of the Cybersecurity and Infrastructure Security Agency (CISA) under the DHS, to perform a VPN threat assessment to determine potential risks to the US government, SearchSecurity reported.When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN.Qwer432
http://www.fastexpressvpn.com/
http://www.fastritavpn.com/


Private Internet Access VPN has been blocked in Hong Kong

we have been able to successfully unblock our servers in Hong Kong, and our VPN is working well there currently. See: “Private Internet Access No Longer Blocked in Hong Kong” for details. VPN

Private Internet Access’s Virtual Private Network (VPN) is being blocked in Hong Kong. Last week, it was leaked that Hong Kong’s (HK) internet service providers (ISPs) had made plans to shut down internet dependent services and apps used by the protesters that have been marching and organizing for over a month as a way to try and end the HK protests. At the time, media reports focused on the likely possibility that the HK ISPs, under order from the HK government (under order from the Chinese Communist Party), would ban messaging apps such as Telegram or Messenger. It’s now clear that the government’s plan to limit the protests from a technological perspective are starting with the VPNs. It is now official: The Great Firewall of China has expanded to block in Hong Kong. These are the beginning salvos of the HK VPN block.

Private Internet Access (PIA) users in Hong Kong are either completely unable to connect, or they are shown by their ISP that they are connected, but then are unable to navigate to any websites. Private Internet Access believes in an open internet that is accessible by all. We entirely condemn the blocking of VPN services, or any apps at all, in Hong Kong and are actively searching for solutions to continue providing our services to the Hong Kong internet users that depend on an open internet to continue their freedom of expression.
Some particularly vocal anti-Beijing protestors have pointed out that their social media accounts, on non Chinese social media platforms like Facebook, are being turned off. This points at dedicated and coordinated action from the CCP internet troll army. Trolls from the Chinese internet army have long been known to be active in Western corners of the internet. The CCP internet troll army even recently went on an online campaign to drum up fake support for mainland China’s side of the protests using suggestive, pornographic and troll accounts on Twitter. As one person with first hand knowledge of the struggle iterated on Twitter, the Chinese government has some reach that extends outside of China:

While this influence wanes depending on what non-Chinese country you are in, the locale that is most susceptible to CCP influence is still Hong Kong – especially at this sensitive time. At this point, it’s obvious that the Chinese government is going ahead with their drafted plans to have Hong Kong ISPs block valuable internet services used by protesters. Now that the ISPs in HK have been shown to be completely under the thumb of those who oppose internet freedom, the need for Private Internet Access in Hong Kong grows exponentially. Now that the Great Firewall of China has officially expanded to Hong Kong, the future in Hong Kong looks particularly grim.When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN.Qwer432
http://www.buyvpns.net/
http://www.buyvpnservices.com/


Local man prepares to brew up new business in Plymouth

After brewing beer at home for 13 years, Tim Brice soon will realize his dream of opening his own craft brewery.Brice, 38, of Hunlock Creek, plans to open Bearded Barrel Brewing Company in Plymouth.Water Purification Equipment

He purchased a building at 439 W. Main St. earlier this year that formerly housed the business “Flowers And” owned by Plymouth Alive vice president Susan Gryziec, who died in a crash last year.

He recently received an occupancy permit and after a final inspection by the Pennsylvania Liquor Control Board in two to four weeks, he expects to begin brewing.“It went from hobby to dream to fruition,” Brice said.In the rear of the business, he showed a three barrel brewing system ready to go. Its limitation is 93 gallons and he plans to start off by distributing kegs to local bars and restaurants.

In six to eight months after he begins brewing, he plans to open a taproom in the front of the business with seating for about 25 people. The taproom will have small tables and about 12 people can sit at a bar and watch beer production through a viewing window.

Brice works full-time as a technical sales manager. Before he starts employing people, he said he is trying to get the business’ name out there.

He has equipment to can beer in the future.“We’re planning to do can releases of specific beers that we will sell on site,” Brice said. “On a Saturday morning, we could have people stop by to pick up cans and that will be before the taproom opens.”

Brice has been canning beer at home since 2006 and has 20 different recipes.He plans to distribute three kinds of beer at first and one will called Wadham Creek Wheat, which is named after the creek alongside the business.We wanted to tie in what we’re doing with the downtown and Plymouth Borough,” he said.

He also will sell fruit beer and a session India Pale Ale with lower alcohol content.

In recent years, Brice has seen a number of local craft breweries open in the area including Benny Brewing Co. in Hanover Twp., Breaker Brewing Co. in Wilkes-Barre Twp., Five Mountain Brewing Co. in Shickshinny, Berwick Brewing Co. and Susquehanna Brewing Co. in Jenkins Twp.

“Since 2006, I’ve been saying, ‘I really need to do this’,” he said. “Finally, we have an opportunity so we’re taking it.


Eyelash extension lice: Doctors warn about rise of lash lice in popular cosmetic procedure

Eyelash extensions may add extra volume and length but without proper cleaning, they become a home for microscopic parasitic insects: lice, according to a report.

Some optometrists say they've seen an increase in demodex, more commonly known as lash lice, according to the report.Pre-made Fans Volume Eyelash Extensions

These small organisms live on hair follicles of the eyelashes, causing redness, inflammation and itchiness. Similar to head lice, they can easily jump and transfer to another person, according to the CDC.

Dr. Sariah Malik, a licensed optometrist and Clinical Director for Pro-Optix Vision Center, says a lack of cleaning causes bacteria buildup and infection. Generally, the idea is when you have eyelash extensions is that people are afraid to kind of touch them or wash them because they're afraid the eyelash will fall out," Malik said.

But despite any concerns over falling lashes, Malik emphasized that regular extension cleaning is crucial to eye health. "We recommend tea tree base cleaner [or] any cleanser that has a diluted form of tea tree, and it is a good idea to use on a daily basis," Malik said, also recommending that users give their eyelids a break from extensions every now and then.