Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

How to safely open a suspicious link

6 useful steps for installing The Tor browser on your computer

Tor browser is one of the most famous anonymity tools used by at-risk groups of people. Anonymity is…

4 crazy reasons for viewing search history

When it comes to google accounts being safe, we shouldn’t limit the level of precaution we mus…

6 great sure don’ts of password management

Password mismanagement has often led to loss of vital information; at risk populations have faced su…

7 effective steps for creating public and private keys for encrypting and decrypting email messages; end to end encryption

In the previous week, I made a video that takes you through the steps of encrypting and decrypting e…

STEPS FOR SETTING UP MAILVELOPE: AN APP FOR EMAIL ENCRYPTION

It is amazing how far we have come with encryption. I believe if you came across my past posts on en…

Symmetric vs Asymmetric encryption: 2 Definitions

Symmetric vs asymmetric encryption plays a great role in choosing the best type of encryption for da…

1 3 4 5 6 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *