Chidinma works in an NGO and needs to print some confidential data for internal use but their printer doesn't work so she prints it out of the office. She printed the data from a flash drive and when finished, deleted the files from the drive, then also from the recycle bin. She thought by emptying the flash drive she had gotten rid of the data. She was wrong.
Nasir was covering a protest in Ibadan when he lost his iPhone. He has some videos and documents connected to AGA group which he can't let anyone get access to. He wants to know how he can remotely Erase his Data.
Chidinma is travelling for a three day conference in Port-Harcourt and she has to ensure that all her devices are protected while on this trip. These tips would guide her.
There's an ongoing renovation at the office, but Nasir has got to work. He finds himself floating from one Internet cafe to the other everyday to avoid establishing a routine. He also doesn't want anyone to track his activity, either, so he wipes his browsing history from all public computers he uses. Here's how he does it.
Dolapo just got a video recording regarding the case of a young girl deported by the European embassy over fake passports given to her by one of the agents in AGA.
Nasir has been feeling uneasy, ever since he heard of the Yahoo mail hack. He has been transferring sensitive messages, files and documents through his usual email system. What is the best method for him to transfer such files?
VPNs, or virtual private networks, are typically used to obfuscate users’ IP addresses and to add a layer of security to Web browsing. They work by routing traffic through a
Today, Chidinma got an anonymous mail from someone who claims to have recorded video and other documents incriminating a top management level staff of AGA. The problem is, the informant doesn’t know of an anonymous way to transfer the files. What should Chidinma recommend? Chidinma can ask the informant to send it using uploadfiles.io.
Nasir needs to call and chat with a source about the recent kidnapping of some school girls and he is very cautious of someone leaking his conversation or knowing who he is. He knows about Whatsapp end to end encryption but even with that someone would be able to identify him. He thought to himself, “What if there is an anonymous end to end encrypted chat” that won’t keep logs?
Chidinma is an activist and she's working from a restaurant today. She needs to put make a post on their Facebook page but she is not aware that her location settings is enabled for Facebook and someone could be tracking her every move.