cover image: Guidance Document - Online Protection and Digital Security: - User guide for human

20.500.12592/r4xh3k7

Guidance Document - Online Protection and Digital Security: - User guide for human

17 Jan 2024

Digital security risks for Afghan women In November 2023, UNAMA Human Rights and UN Women conducted consultations with Afghan women in media and civil society to better understand their access to digital spaces, the risks and challenges, and recommendations for how to protect their rights and freedoms. [...] M Maann-i-nin-t-hthee-m-mididddlele a attatacckkss: : Attackers infiltrate the weak Wi-Fi hotspot to be part of the communication between the target victim and the hotspot, to intercept and sometimes modify data in transit. [...] If the connection is not encrypted, governments, groups and individuals with technical backgrounds can listen to or read communications; access, intercept and modify content; plant malware; and open backdoors within the system to transfer data to and from the device. [...] Deleting data and emptying the recycling bin marks emptying the recycle bin mean that files are the space as “available”, but until the “available space” permanently and irreversibly removed from is written over with new information, the underlying the computer or smartphone? data can still be recovered. [...] • End-to-end encryption (E2EE): The application of encryption to communications tools and services, such that only the users of the tool or service have access to plain-text messages.
Pages
29
Published in
Afghanistan