5 July 2025
00:01 - 00:06
Veo 2 from Google AI Studio. Video generation test and comparison with Kling, Minimax and Runway | Greenhouse
Google AI Studio is a free platform for developers to experiment with generative AI, including the Veo 2 model. We test video generation with Veo 2, parse the settings and compare the results with other neural networks: Kling 1.6, Minimax and Runway.
00:06 - 00:13
Eraser. How do I permanently delete files from my computer? | Greenhouse
Normal file deletion does not guarantee data protection, as it can be recovered even after disk formatting. Eraser allows you to safely delete confidential files, set up automatic deletion and clear free space on your hard disk.
00:13 - 00:22
Flora AI - 19 neural networks in one service | Greenhouse
Flora AI is a new platform for creating content with artificial intelligence. It brings together text, image, and video models in one place, including ChatGPT-4o mini, Claude 3, Gemini 2.0 Flash, Flux, Stable Diffusion, and more. How Flora AI works, how user-friendly its interface is, what features are available in the free version, and whether it's worth buying a subscription.
00:24 - 00:39
The Dangers of Social Media How Scammers Hook Us | How Not to Become a Vegetable
Let's continue to look at how scammers operate and how to stay safe from scam schemes that are used to swindle money out of you.
00:39 - 01:43
Pavel Belousov, Nadiyno.org: basic rules of digital hygiene for your safety
Tells you how to practice good internet hygiene and how to choose the right software for your device.
01:45 - 02:34
Robots. What we've been able to teach them over the last 100 years | Launch Tomorrow
How robots have evolved from heavy 18th century automatons to today's intelligent and empathic machines capable of working on assembly lines, in warehouses, and even communicating with humans, approaching human-like qualities.
02:35 - 02:50
Prayer and scammers. How money and data are stolen in prayer groups | How not to become a vegetable
Prayer blogs quote the Bible and publish prayers for all occasions. And they pray on photos or videos created by artificial intelligence. We analyzed several of these prayer groups. And today we'll talk about whether they're really about religion. Or about manipulation and playing on the feelings of gullible believers.
02:54 - 03:08
Durov at a crossroads. What is the future of Telegram in Russia? | Internet Defense Society
In Russia, Telegram remains one of the few uncensored spaces thanks to Pavel Durov's resistance to pressure from the authorities, but he will have to choose between cooperating with law enforcers and preserving the messenger's freedom, which could lead to its blocking in the future.
03:08 - 03:14
Picocrypt: a portable and very simple encryption program | Greenhouse
Picocrypt is a free, open-source program that does not require installation. It is convenient to use it, for example, if you need to quickly encrypt some small files and upload them to the cloud.
03:14 - 03:19
OpenDNS: how to set up blocking of unwanted and malicious sites on your PC or router | Hothouse
OpenDNS is something like Roskomnadzor, but the Roskomnadzor of a healthy person. The service implements the function of parental control, i.e. sorting traffic and blocking unwanted sites on the user's side.
03:20 - 04:15
Pegasus. How spyware works and whether you can protect yourself from it | Launch Tomorrow
Phones store personal data and can be the target of covert hacking with spyware. Samat Galimov, lawyer Natalia Krapiva and researcher Bill Marzak discuss methods of penetration, reasons why surveillance is undetectable and ways to protect users.
04:22 - 04:47
DEGUGLIZATION. Replacing services with more confidential ones | First Department
User data is a precious resource that all big IT companies dream of getting their hands on. Some are interested in your consumer habits in order to offer contextual advertising. Others dream of feeding your texts to neural networks for training. Still others sell information about you to anyone who wants it. The only one who loses rather than earns on this resource is you. But today we will try to improve the situation. In this video we will analyze safer alternatives to popular applications and services that collect the most of your data. Some of them will be suitable only for enthusiasts, while others can be easily used by anyone right now. Watch and share with your friends - data can't protect itself!
04:50 - 05:16
Ukraine: the battle for communications
05:20 - 05:24
Gretel bot in Telegram will remove you from all pre-selected groups in case of danger | Greenhouse
Telegram-bot Gretel_sos_bot is designed to perform just one simple function, but it can cost you and your loved ones their freedom, or even their lives: Gretel removes you from all chat rooms that you have previously marked with the /chekin command.
05:24 - 05:30
X-doc AI. Translator designed for technical texts | Greenhouse
X-doc AI is a service for translation and processing of technical texts using artificial intelligence. It is designed for fast and accurate localization of documents. X-doc AI preserves their structure and design elements. This makes it a useful tool for professionals working with technical and scientific materials and official documents
05:31 - 05:37
Treason. From state secrets to SMS | First Division
Since 2014, FSB investigators have been more and more actively recording citizens as state treasonists, and their criteria are getting lower. For example, in order to "disclose state secrets" it is no longer necessary to have access to them.
05:40 - 05:48
TOR in Russia: how to remain anonymous | Society for the Protection of the Internet
You've probably heard at least once about the TOR browser, which provides complete anonymity on the Internet. Perhaps you even thought that you would never need it - unless you were going to buy weapons or leaked databases - but life in Russia shows that anonymity is never superfluous.Nevertheless, many users wonder. Isn't it dangerous? Is it definitely anonymous? And how does it work? No, it's probably for hackers, will I even be able to figure it out? Come in soon - we'll explain everything
05:51 - 07:24
Yandex has been hacked. Sberbank to be prepared. Who was hacked by Ukrainian hackers? Announcement by Nikita Knysh | TRANSACTION
Oleksandr Glushchenko's guest is a white hacker from Kharkov, Nikita Knysh. Announcement of new hacks, pokheks and plum Russians. Part 1.
07:26 - 09:08
Mom, I became a hacker! Behind the scenes of the world of cyber warfare and information security specialists | TRANSACTION
As a guest of Alexander Glushchenko - white hacker from Kharkov Nikita Knysh. Announcement of new hacks, leaks, pokheks and humiliation of state hackers in the epaulettes. Part 2.
09:12 - 09:17
Mullvad is a commercial open source VPN service. On the market since 2009 | Greenhouse
A review of the Mullvad VPN service from Sweden, which has been on the market since 2009. The VPN is paid, costs 5 Euros per month, but the tariff includes support for five devices. It has a huge number of servers in different countries and open source code. It is quite convenient and easy to use.
09:17 - 09:24
KeePassXC: review of password manager with offline password database hosting | Hothouse
The main advantage of KeepassXC is also its disadvantage - the encrypted password database is stored with you. This is an advantage for those who prefer to control everything themselves and trust only themselves, and a disadvantage for those who are used to out-of-the-box applications with minimal customization.
09:25 - 09:38
No license and no passport. Who are stateless persons? First Squad.
Can your Russian passport be taken away from you for an anti-war post on the Internet? According to the new law, yes, if your citizenship is acquired. But there are already tens (and possibly hundreds) of thousands of stateless people living in Russia. In a country where you need a piece of paper for every sneeze, their fate is unenviable.
09:44 - 09:54
Big Brother. A History of Surveillance | Section One
The history of surveillance dates back to ancient times. How did we go from suspicious people in a dark alley to neural networks and Yandex plums? And what methods of surveillance emerged along the way?
09:55 - 10:00
Mullvad Browser. How to reduce your digital footprint and protect your anonymity? | Hothouse
Mullvad Browser is an optensor browser for those who value privacy and anonymity on the internet. Developed by the Swedish team at Mullvad, it minimizes digital footprint and protects against tracking. The browser blocks tracking, uses random digital fingerprints and disables scripts, providing a high degree of privacy.
10:00 - 10:04
Bot Through. See hidden manipulations | Hothouse
The Naskvizh bot was created by a community of artificial intelligence experts who study propaganda and counter propaganda, with the support of the Social Technologies Greenhouse. Volunteers trained a language model to detect emotional manipulation in texts, and created a bot to communicate with this model
10:04 - 10:17
What's wrong with fifth-generation base stations | Internet Defense Society
Breaking down the conspiracy surrounding 5G networks and telling the story of generations of connectivity
10:20 - 10:59
Blocking Youtube in Russia, banning social networks and messengers. What should rf expect in 2025?
Stream on the channel Technozone. Alexander Glushchenko is a guest of Vladimir Kramarenko. Talks about the blocking of technology companies and their services in Russia and ways to bypass them to access the free Internet.
11:00 - 11:19
Bad Russian Service. What Rossotrudnichestvo does | First Department
While the FSB, the Ministry of Defense and Russian courts are competing for the possession of the most notoriety, there is another government service lurking behind their backs, which itself creates notoriety for Russians abroad - Rossotrudnichestvo. This is one of the divisions of the Foreign Ministry that deals with Russians living abroad. It appeared during the presidency of Dmitry Medvedev and was supposed to popularize Russian culture and deal with Russian-speaking diasporas. But over time, the service developed into an instrument of aggressive propaganda, including military propaganda.
11:24 - 11:48
Artificial Intelligence. How Russia uses AI in information warfare | How not to become a vegetable
Russia is already using artificial intelligence in its war against Ukraine. To promote fakes and disinformation. In this video, we will look at six examples of how AI is already being used by the enemy in the Russian-Ukrainian war.
11:48 - 11:55
Hailuo AI Audio. Free speech generation and voice cloning | Teplica
Hailuo AI Audio was developed by MiniMax, a Chinese company known for its innovations in artificial intelligence and machine learning. The company specializes in creating audio and video processing tools aimed at both professionals and amateurs.
11:55 - 12:00
Censor Tracker: a free browser plug-in from Roskomvoboda to bypass blocking | Hothouse
Censor Tracker is a free browser extension for accessing blocked resources with a number of useful additional functions. Its main advantage is that this plugin is from Roskomvoboda, whose reputation is unquestionable, which means that the plugin itself is highly trustworthy, which is of paramount importance in the case of access via Proxy: unlike VPNs, traffic is not encrypted.
12:01 - 12:07
OPM and you: what's important to know | Unit One
What do police officers do when they put a wiretap on your phone, sit in your car in your driveway, or read the chat rooms where you discuss politics with your friends? The most correct answer is: investigative measures. When are they used? How do they differ from investigative measures?
12:07 - 12:17
What's happening to YouTube in Russia | Internet Defense Society
After the outbreak of war in Ukraine, YouTube became the main source of independent information inside Russia. However, since August 2024, it has been experiencing serious malfunctions, and in December, traffic dropped to 20% of its initial level. Officially, the authorities do not admit to blocking the video hosting service and put the blame on the wear and tear of Google's servers.
12:17 - 12:23
Napkin AI. Quick visual notes | Hothouse
Write text - and get clear charts and diagrams with Napkin AI. This neural network is a great tool for automatic text visualization that will help you create clear charts and diagrams in seconds
12:23 - 12:29
VPN Generator: VPN servers free for everyone! How to access a blocked website in Russia | Greenhouse
The VPN Generator project from the Internet Protection Society (IPS) takes the process of using VPNs to a new level. This is a non-commercial project, the task of which is to make everyone in Russia have a VPN. Therefore, to a large number of non-trivial and amusing moves (what is worth only one captcha on a check from a real store) added the need, if you get a brigadier account, to give out free VPN access to at least five users per month, otherwise your brigade will be deleted.
12:33 - 12:47
Why don't they pay taxes, why don't they pay loans, why don't they recognize the courts? First Division.
Did you know that Russia doesn't really exist? Yes, yes, there is no such country on the map. In fact, we are still living in the Soviet Union, and the Russian Federation LLC is a commercial firm that has bound Soviet citizens with bonded contracts. It is enough to break them, and life will become much easier.....
12:49 - 13:02
How China is spying on users around the world | First Division
"China's Big Brother" is spying on people not only in China, but also outside China. How Chinese apps leak information about their users to the Chinese Communist Party.
13:04 - 13:18
Safe Mode: How to Protect Your Communication | Internet Society
If you live in Russia, you've probably been hacked at least once - or at least tried to be hacked. Many of us think that security is complicated: there is too much information, and the advice of different experts sometimes contradicts each other. But there is a set of basic rules. Everyone needs to know them - it's like the ABCs, only on the Internet.
13:24 - 13:30
Virtual Master. Virtual Machine on an Android device | Greenhouse
Virtual Master is a free Android app developed by Virtual Parallel Space Tech that allows you to run multiple instances of the Android operating system on a single device. It is essentially a virtual machine for your smartphone, providing application isolation and increased privacy.
13:30 - 13:37
Voice translators. 5 smartphone apps | Greenhouse
Voice translators play a big role in today's world, especially when you need to instantly communicate with people in other languages. These apps help break down language barriers, especially when traveling. We will discuss the most popular voice translators: Google Translate, DeepL, Reverso Context, VoiceTra and Papago, their unique features, drawbacks, and offline capabilities.
13:37 - 13:44
Sora AI. A new level of video generation from OpenAI | Hothouse
Sora AI is a long-awaited tool from OpenAI. It was announced that this neural network will present a new level of video generation and content creation. The most important expectations are realism and quality
13:45 - 14:00
How Ekaterina Mizulina became an internet celebrity | First Division
Little is usually known about the lives of officials' children. If something does come out, it is because of another corruption investigation. But Senator Elena Mizulina's daughter, Ekaterina, is a different matter. Not only is she not afraid of publicity, but she actively pursues it.
14:05 - 15:32
Where does news come from? Discussed by Andrei Zakharov and Lev Gershenzon | The Voice
How does news appear in your news feed? From what sources do Russians draw their information and which media outlets are most trusted? How does the state propaganda machine work, and do opposition media outlets have a bias and tendentiousness?
15:35 - 15:51
Claude 4 is better than ChatGPT. Secret capabilities of neural networks, integration with n8n and Zapier | AI Ukraine
New features of Claude 4 from Anthropic: advanced AI agent, integrations with services via Zapier, n8n and MCP servers. Claude allows you to manage applications, Google docs and calendar from a single interface, write and run code, automate tasks.
15:52 - 15:57
Ideogram. Image and logo generation | Greenhouse
Ideogram is a tool for generating images based on artificial intelligence. It is conditionally free, i.e. you have the opportunity to create up to 40 images per den for free.
15:57 - 16:03
Anytype. A data management tool that can replace Notion | Greenhouse
Anytype is a powerful tool for information management. Minimalistic design: Anytype's interface is distraction-free, allowing you to focus on the content. Block structure: Like Notion, Anytype allows you to drag and drop blocks of text, images, videos and other elements, making it flexible and easy to organize information.
16:04 - 16:17
Safe Mode: How to Encrypt Your Data | Internet Society
What happens if your phone falls into the hands of intruders or, even worse, law enforcement? How quickly can they unlock it and access all your apps, including messengers and online banking? This is a likely situation - your phone could be stolen, it could be lost - not to mention the police simply taking it from you by force.
16:17 - 16:19
Cybersecurity: How to monitor your camera, microphone and files | RFE/RL Academy
Digital security course: who can access your camera, how to prevent it?
16:19 - 16:21
How to monitor active sessions in messengers | RFE/RL Academy
Digital security course: what are the dangers and benefits of active sessions on devices?
16:22 - 18:59
The story of the most audacious provider of Kyiv region - the company "BEST" | SPEECH
Aleksey Zinevich, head of the internet provider Best, founder of the news agency Vzglyad Priirpeniya and the TV channel Vzglyad, is a guest of Alexander Glushchenko.
19:05 - 19:25
What are AI agents? AI Ukraine.
AI agents are intelligent systems that do not just respond to requests, but independently break down tasks into subtasks, plan and execute them using external tools and databases. Unlike classic chatbots, agents can work autonomously, make decisions and adapt during execution, and are therefore capable of performing complex tasks.
19:26 - 19:35
3 free neural networks for image creation | Greenhouse
Creating impressive images with neural networks is getting easier and easier. But not everyone has the opportunity to use Midjourney. But there are alternatives - free AI services with daily limits that allow you to generate images without paid subscriptions.
19:35 - 19:40
HeyGen: video translation with voice and facial expressions preserved | Greenhouse
Using artificial intelligence technology, HeyGen not only translates speech, but also mimics lip movements, allowing the final video to look as natural as possible.
19:40 - 19:45
How to protect your Telegram account from hijacking? | Hothouse
Telegram is not just a messenger. Correspondence, documents, channels, even your wallet - all of this is contained in your account. It is important to secure your account in advance.
19:45 - 19:52
Anatomy of trolls. How much do likes cost and how to promote any account | Society for the Protection of the Internet
You've definitely met bots on the internet. They are the ones who disliked videos, voted en masse in polls, and wrote the same kind of meaningless comments. When it comes to bots, many people think of Prirozhin's troll factory, which became well known after accusations of interference in the American elections. But this is only the tip of the iceberg. In Russia, there are no fewer bots, and they are used by representatives of all levels of government, from State Duma deputies to the Instagram of the local administration.
19:53 - 20:07
Safe Mode: How to Protect Your Communication | Internet Society
If you live in Russia, you've probably been hacked at least once - or at least tried to be hacked. Many of us think that security is complicated: there is too much information, and the advice of different experts sometimes contradicts each other. But there is a set of basic rules. Everyone needs to know them - it's like the ABCs, only on the Internet.
20:07 - 20:19
4 alternatives to ChatGPT: HuggingChat, Le Chat (Mistral AI), Claude, Grok | Greenhouse
Looking for powerful alternatives to ChatGPT? A breakdown of the top 4 AI tools of 2025 with unique features.
20:20 - 20:26
Open AI.fm - a ChatGPT-based voice transcription model | Greenhouse
OpenAI.fm is a new voice model from OpenAI based on ChatGPT , offering 11 voices, including mood and emotion by voice. The service offers support for more than 100 languages.
20:27 - 20:43
Veo. Neural network for video generation | AI Ukraine
Google's VEO neural network allows you to create the most realistic videos from text and images. Two versions are being considered: VO2 - available now and already very powerful, and VO3 - a new model that can generate videos with sound and emotions.
20:45 - 20:48
How to protect your phone | RFE/RL Academy
A course on digital security: key tips for protecting your phone.
20:48 - 20:52
Key cybersecurity tips | RFE/RL Academy
A course on digital security: sammari, top security tips.
20:52 - 21:05
What's wrong with fifth-generation base stations | Internet Defense Society
Breaking down the conspiracy surrounding 5G networks and telling the story of generations of connectivity
21:07 - 21:56
Robots. What we've been able to teach them over the last 100 years | Launch Tomorrow
How robots have evolved from heavy 18th century automatons to today's intelligent and empathic machines capable of working on assembly lines, in warehouses, and even communicating with humans, approaching human-like qualities.
22:00 - 22:14
We are being watched: how SORM works | Internet Defense Society
There is a lot of information about SORM, or the system of operational and investigative measures, that can be found on the web with varying degrees of reliability. Many articles and comments contradict each other. Moreover, even specialists do not fully understand how it all works. Therefore, we decided to record this video, where we will try to explain what it is
22:15 - 22:20
How to save access to YouTube. Computer Solutions | Greenhouse
A few tools to help you keep YouTube accessible in slowdown conditions.
Computers provide users with the widest range of options: GoodbyeDPI, Censor Tracker, Unblocker for YouTube, YouTube Unblocker Plus, Piped.video
22:20 - 22:26
Midjourney. Image editor in the web version | Teplitsa
The name Midjourney is known to everyone. Since recently, the platform is available in a web version. This opens up new possibilities for generating images right in your browser. Another news is that there is an editor function that will allow you to easily edit the generation results. This includes removing objects from the image.
22:28 - 22:30
How to communicate in messengers safely | RFE/RL Academy
Digital security course: how to communicate in messengers safely, which ones to choose and how to use?
22:30 - 22:33
Multifactor authentication to protect accounts | RFE/RL Academy
Digital security course: how to use MFA, why do you need it?
22:33 - 22:35
How and why to use a VPN | RFE/RL Academy
Digital security course: all about VPNs
22:40 - 23:35
Pegasus. How spyware works and whether you can protect yourself from it | Launch Tomorrow
Phones store personal data and can be the target of covert hacking with spyware. Samat Galimov, lawyer Natalia Krapiva and researcher Bill Marzak discuss methods of penetration, reasons why surveillance is undetectable and ways to protect users.
23:39 - 23:47
Slides AI and Gamma. Neural networks for creating presentations | Greenhouse
Looking for a way to create professional presentations faster? With two powerful AI-powered tools, Slides AI and Gamma, you can create impressive presentations literally on a single request.
23:47 - 23:54
Manus AI. The first autonomous AI agent that works for you | Greenhouse
Manus AI is a revolutionary AI agent from China coming in March 2025 and is already being called the "killer OpenAI Operator".
23:54 - 00:02
Objective-See. Free macOS security utilities | Hothouse
Objective-See is a set of free and open source utilities created by cybersecurity expert Patrick Wardle. These tools help monitor system activity, block malware, and monitor network connections.