Dolapo just got a video recording regarding the case of a young girl deported by the European embassy over fake passports given to her by one of the agents in AGA.
Nasir has been feeling uneasy, ever since he heard of the Yahoo mail hack. He has been transferring sensitive messages, files and documents through his usual email system. What is the best method for him to transfer such files?
VPNs, or virtual private networks, are typically used to obfuscate users’ IP addresses and to add a layer of security to Web browsing. They work by routing traffic through a
Today, Chidinma got an anonymous mail from someone who claims to have recorded video and other documents incriminating a top management level staff of AGA. The problem is, the informant doesn’t know of an anonymous way to transfer the files. What should Chidinma recommend? Chidinma can ask the informant to send it using uploadfiles.io.
Nasir needs to call and chat with a source about the recent kidnapping of some school girls and he is very cautious of someone leaking his conversation or knowing who he is. He knows about Whatsapp end to end encryption but even with that someone would be able to identify him. He thought to himself, “What if there is an anonymous end to end encrypted chat” that won’t keep logs?
Chidinma is an activist and she's working from a restaurant today. She needs to put make a post on their Facebook page but she is not aware that her location settings is enabled for Facebook and someone could be tracking her every move.
Chidinma has a lead for one of the child trafficking sponsors and needs to send the files to Nasir. Nasir uses a PGP but he needs to show chidinma how to set up her email for that just incase she needs to send to others.
Nasir is a journalist for Dundun Media. He has just got a lead on the location of a safe house used by AGA and he needs to call the Police. First thing he does is to ensure his call is encrypted. Here's how he did it.
Nasir has just asked Chidinma to set up ProtonMail because he needs their email and the content to remain confidential. But she doesn’t know what that is or how to set it up.
Chidinma wants to send documents containing sensitive data to Nasir but isn't sure how safe they'll be in transit. She decides to read up to learn how she can prevent malicious users from intercepting the email en route to the intended recipient.