Chidinma has a lead for one of the child trafficking sponsors and needs to send the files to Nasir. Nasir uses a PGP but he needs to show chidinma how to set up her email for that just incase she needs to send to others.
Nasir is a journalist for Dundun Media. He has just got a lead on the location of a safe house used by AGA and he needs to call the Police. First thing he does is to ensure his call is encrypted. Here's how he did it.
Nasir has just asked Chidinma to set up ProtonMail because he needs their email and the content to remain confidential. But she doesn’t know what that is or how to set it up.
Nasir is on his way to the office, but he wants to stop by at a friend’s office. He gets a text from Dolapo informing him to check his email immediately and perhaps copy some information from a website. This can be a problem because anyone else who will have access to the computer can check his browsing history and see what he did online. If he goes into incognito mode, then anybody checking what he has been doing online will not find anything. So, what is incognito mode all about?
Chidinma worries that downloading all of the interesting apps she finds on her two phones also brings with it a high risk of them being infected with malware or spyware of some kind. To put her mind at ease, she does a little research about the incidence of such events.
Nasir and Dolapo are working together to track the activities of AGA on social media. They need to build up a case so law enforcement agencies can clamp down on AGA. How do they go about this, without contravening the Nigerian Cybercrime Act 2015
Chidinma wants to send documents containing sensitive data to Nasir but isn't sure how safe they'll be in transit. She decides to read up to learn how she can prevent malicious users from intercepting the email en route to the intended recipient.
Nasir has had to reinstall the operating system on his computer a number of times because of sudden, noticeable drops in performance due to viruses. He's tired of repeating the same process every couple of months, but just hasn't taken the time to learn about antivirus software. Now he's ready to learn.
Nasir's computer was stolen and the results of his investigation on AGA and the story he was writing were unencrypted. He is worried that his sources may become compromised. If the documents had been encrypted then no one would be able to access them.