00:23-00:45 |
The Future of VPNs - No VPN | SplinterCon Taipei |
Censorship is evolving, and ways to circumvent it must evolve with it. In this joint report, Mallory Knodel (Social Web Foundation) and Vinicius Fortuna (Outline) argue that the future of censorship circumvention is not in increasing the number of VPNs, but in reducing them. |
00:48-00:52 |
Element course on Matrix #1: What is Element. Startup and registration | Teplitsa |
Element is a messenger. More precisely - a corporate messenger. Even more precisely - a free corporate messenger running on the Matrix protocol. Element is called a reference in the implementation of this protocol |
00:52-00:57 |
Element course on Matrix #2: What is Matrix. How to choose a server | Hothouse |
In the second lesson, we'll talk a bit more about the Matrix protocol that underlies Element. About other Matrix clients and server selection |
01:00-01:45 |
How do you manipulate with the truth? How not to be a vegetable. |
Is it possible to recognize an expert? Or is it a utopia after all? How are we manipulated by the truth? Let's talk to Larisa Voloshina. Journalist, psychologist, researcher of propaganda - Russian and not only. |
01:51-02:05 |
Get off the radar! How not to give away your location to anyone | FIRST DIVISION |
You can be tracked in many different ways. Some you may be aware of, but others you probably haven't even thought about. In this video, you'll learn everything you need to know about them - including how to protect yourself. Hiding from surveillance can be difficult, but it's possible - if you have the knowledge and desire to do so |
02:06-02:21 |
Write "amen" if God is important to you. That's how the feelings of believers are speculated upon |
On Christmas Eve, we will talk about how fraudsters turn faith into a business. And we will analyze how sects and Russian propaganda manipulate our feelings. |
02:24-02:35 |
Controlling a computer using the Claude | AI Ukraine network |
Claude's neural network demonstrates impressive computer control capabilities, automating tasks and improving productivity. These cases show how artificial intelligence can be adapted to interact effectively with technology. |
02:35-02:39 |
Element course on Matrix #3: Element security. Backup encryption keys | Teplica |
Backup encryption keys are something that belongs only to you. Element will not be able to recover them if you lose them and you will lose access to all previous correspondence if you log out of your account. It is imperative that you keep them |
02:39-02:44 |
Element course on Matrix #4: useful chat features | Hothouse |
In most messengers the process of correspondence is organized approximately the same, but still each messenger has its own peculiarities, so it is not superfluous to show how it is organized in Element. |
02:48-04:44 |
Ukrainian hacker Nikita Knysh: the best cyberweapons in the world are being tested on us | Negotiator |
Nikita Knysh is a hacker and cybersecurity expert. He has dozens of solved cybercrimes, worked in the SBU and organized the Ukrainian cybersecurity forum HackIT. Part 1. |
04:49-06:39 |
Hacker and security expert Nikita Knysh: hacks, leaks, your information doesn't belong to you | Negotiations |
The second part of Alexander Glushchenko's interview with ethical hacker and head of HackControl Nikita Knysh. Real methods of hacking users, companies, working with hackers, building information and cyber defense |
06:44-06:48 |
Element course on Matrix #5: Rooms and spaces. How to sort chats properly | Hothouse |
Rooms in Element are chat rooms, including group chats, and spaces are a set of rooms. By creating a space and inviting a person to it, the user gives access to all rooms (except hidden ones) that are available in the space. |
06:48-06:54 |
Element course on Matrix #6: how rights distribution is organized in Element | Teplitsa |
Giving out rights in Element is probably the most fashionable thing that Element has. In addition to the fact that there are about twenty parameters in the configuration of the room, by which you can set the rights, here the rights themselves are tied not only to roles, but also have a numerical expression |
06:54-07:14 |
SECURE MESSENGER. The best programs for secret correspondence | FIRST OFFICE |
It's time to choose a secure messenger! To ensure that your correspondence can't be read either by special services or other malicious users, it is necessary for it to meet many criteria at once. First of all, it should support end-to-end encryption. But it is also important that the messenger does not collect or give out your data, and ideally it does not have them at all. And for independent experts to be convinced of the developer's integrity, it should also have an open source code. A very difficult choice! |
07:16-07:32 |
Complete Internet shutdown. What do I do? First Squad |
You use the internet every day - but what happens when the authorities pull the switch and it's gone? It's called a "shutdown", and today we'll look at where and how often the internet is shut down, why - and what to expect from such a situation. |
07:32-07:37 |
How your data is being collected and sold. Confessions of a Broker | Tactical Tech |
How is the data trading industry organized? How user data is collected, processed, aggregated and sold to companies. |
07:37-07:41 |
How third-party trackers collect information about your online behavior | Tactical Tech |
With Trackography (a Tactical Tech project), you can track third-party trackers that collect data about your online behavior. Who has access to the information collected by trackers? |
07:41-07:55 |
Secrets of the FSB: Why are they hiding the archives? | Division One |
Russia's main secret service inherited the archives of the VChK, NKVD and KGB - a huge mass of documents to which many people have long been trying to gain access. Some are writing historical works, others are trying to rehabilitate relatives, others are interested in the fate of historical figures. And all of them face a reinforced concrete barrier, behind which this information is hidden: many papers of the Soviet special services do not give out even after 100 years, when none of the people mentioned in them are alive. Why do they do this? And what do those who do get something out of the archives other than just an abstract? This is the subject of our new video. |
07:55-08:07 |
New Pegasus attacks. Who got hacked this time? First Squad. |
The world's most famous spy software strikes again!
Since our previous Pegasus video, Pegasus has been implicated in several new scandals, including a surveillance campaign against Russian dissidents. |
08:09-08:24 |
Europe's Third Way to the Digital Future | SplinterCon Taipei |
In its quest for digital sovereignty, the EU faces a choice between the values of an open internet and growing pressure for national control. Alena Epifanova, Research Fellow at the German Council for Foreign Policy (DGAP), discusses how these tensions are shaping Europe's role in the fragmenting internet, from its reliance on supply chains to its choice of global governance mechanisms. |
08:24-08:30 |
Element course on Matrix #7: Calls and videoconferencing in Element | Hothouse |
One-to-one calls and videoconferences in Element are realized using in-house tools and in general do not differ from calls in other messengers. But calls for three or more people are realized through integration with a third-party application Jitsi and are displayed in Element as a widget. Therefore, we will also touch on the topic of widgets and bridges |
08:30-08:39 |
Flora AI - 19 neural networks in one service | Greenhouse |
Flora AI is a new platform for creating content with artificial intelligence. It brings together text, image, and video models in one place, including ChatGPT-4o mini, Claude 3, Gemini 2.0 Flash, Flux, Stable Diffusion, and more. How Flora AI works, how user-friendly its interface is, what features are available in the free version, and whether you should buy a subscription. |
08:44-08:56 |
Hiding data. The secret service method. Steganography | FIRST DIVISION |
What if data was not only encrypted, but also hidden so that no one knew it existed? This is what steganography is all about - a way of transmitting and storing information in such a way that no one would know about its existence. This approach appeared in antiquity, was part of spy craft for many hundreds of years, and nowadays has turned into one of the computer science sections: digital steganography |
08:56-08:59 |
Cybersecurity and Risk Assessment | RFE/RL Academy |
Digital Security Course: How to Assess Risks? |
08:59-09:01 |
How to monitor active sessions in messengers | RFE/RL Academy |
Digital security course: what are the dangers and benefits of active sessions on devices? |
09:02-09:08 |
KeePassXC: review of password manager with offline password database hosting | Hothouse |
The main advantage of KeepassXC is also its disadvantage - the encrypted password database is stored with you. This is an advantage for those who prefer to control everything themselves and trust only themselves, and a disadvantage for those who are used to out-of-the-box applications with minimal customization. |
09:08-09:14 |
Tails: a secure operating system on Debian Linux. Portable version | Hothouse |
Tails is a great solution if you need to work on someone else's computer without leaving a trace on it. Tails is an operating system like Windows, but it weighs 8 GB and takes about a minute to boot from a flash drive |
09:14-09:28 |
We are being watched: how SORM works | Internet Defense Society |
There is a lot of information about SORM, or the system of operational and investigative measures, that can be found on the web with varying degrees of reliability. Many articles and comments contradict each other. Moreover, even specialists do not fully understand how it all works. Therefore, we decided to record this video, where we will try to explain what it is |
09:30-10:44 |
Confrontation of artificial intelligences of the USA and China. Where does Ukraine belong? | Dev.UA |
Confronting Chinese and American major language models. DeepSeek has already made some noise. How are OpenAI, Meta and other Western projects reacting? What you need to know about distilling language models.
Is it really possible to commit a new, more powerful model quickly and on a budget based on models in which hundreds of millions have already been invested? China/USA - good. What about AI in Ukraine? |
10:49-13:21 |
World Cyber War I: Confessions of a Ukrainian Hacker | TRANSACTION |
Alexander Glushchenko's guest is a hacker from Kharkov, cyber dictator, author of the Nackyourmom channel - Nikita Knysh. |
13:25-13:33 |
Speechify and ElevenLabs Reader. Text-to-speech tools | Greenhouse |
Speechify is a service designed to allow you to listen to text documents, articles and books anywhere you want. Great for people with busy schedules who want to use time more efficiently. ElevenLabs Reader is a platform focused on high-quality and natural text dubbing, using artificial intelligence to create the most realistic voices possible. |
13:33-13:38 |
ElevenLabs. How to create a voice by prompt? | Greenhouse |
ElevenLabs has a new feature - generation of voices by text description. It allows you to create unique, personalized voices literally in minutes.
With the help of a text prompt you can set any voice characteristics - from timbre to intonation - and get the result ready for content voicing. |
13:41-13:53 |
TOR BROWSER | The first step to true online anonymity | FIRST STEP |
If you're serious about hiding your online presence, a regular VPN may not be enough - even if it's a reliable, trusted service. You need more serious tools. For example, the TOR network and Tor Browser. This is one of the most affordable ways for the average user to anonymize their online presence and hide their actions from ISPs, websites and law enforcement agencies |
13:53-13:59 |
Midjourney. Image editor in the web version | Teplitsa |
The name Midjourney is known to everyone. Since recently, the platform is available in a web version. This opens up new possibilities for generating images right in your browser. Another news is that there is an editor function that allows you to easily edit the generation results. This includes removing objects from the image. |
13:59-14:04 |
JoggAI. Website-based video generator | Greenhouse |
JoggAI is a tool to automatically create a video from a link to any web page. Now you don't need to write scripts to get professional video content - just insert a link to an article, blog or website and JoggAI will generate a video based on the text and information from that page, even with voiceover. |
14:05-14:14 |
What's happening to YouTube in Russia | Internet Defense Society |
After the outbreak of war in Ukraine, YouTube became the main source of independent information inside Russia. However, since August 2024, it has been experiencing serious malfunctions, and in December, traffic dropped to 20% of its initial level. Officially, the authorities do not admit to blocking the video hosting service and blame it on the wear and tear of Google's servers. |
14:16-14:21 |
Browsers Unbounded. Help for a Free Internet | Hothouse |
Browsers Unbounded is a project developed by Lantern that allows users to provide and access proxy services through regular web browsers |
14:21-14:25 |
Built-in SOS function - panic button - in Android phones (Xiaomi example) | Hothouse |
A feature that automatically texts pre-selected contacts in the event of a life or health hazard - a feature associated with "granny phones," that is, button phones with a big red button half the size of the phone |
14:25-14:40 |
Transparency as a Tool: Toward Internet Sustainability | SplinterCon Taipei |
Using data from the Cloudflare Radar service, Cloudflare's Head of Research Marwan Fayed explores Taiwan's routing ecosystem. The report traces how network conditions, traffic anomalies, and regional failures reveal structural vulnerabilities and shows how it helps us better understand the fragmentation problem. |
14:40-15:07 |
Gemini 2 - full instructions for use | AI Ukraine |
Gemini 2.0 is a powerful tool for working with text, audio and images, integrated into everyday tasks. Its capabilities open up new facets of interaction with artificial intelligence, making processes more efficient and convenient. |
15:07-15:13 |
SimpleX Chat #2: an overview of the main features | Teplitsa |
In SimpleX Chat you can write, call, make video calls: all through an encrypted channel. You can set a timer to auto-delete messages, enable incognito mode and save a database of contacts and correspondence. Learn about these and other features of SimpleX Chat in our today's video |
15:13-15:21 |
Lara. New Translator 2025 | Greenhouse |
Lara Translate is a new translator that promises to preserve the style and context of the text. But is it really better than ChatGPT, Google Translate and DeepL? In this review we test its features: translations with different styles, work with documents, Excel, PDF, and voice translation. |
15:21-15:25 |
Where do I start investigating companies? | Tactical Tech |
Advice to novice investigators on where to start investigating companies. |
15:25-15:28 |
How do you collect and verify evidence? | Tactical Tech. |
What information is evidence and how it should be verified. What questions should be asked when collecting and analyzing evidence. |
15:29-15:45 |
Who ordered total surveillance? Rostec Corporation | FIRST OFFICE |
"Rostec is popularly known for its constant advertising of "state-of-the-art weapons, not inferior to foreign analogs" and investigations into the corruption of its head, Sergei Chemezov. But in reality, this state corporation owns many different kinds of enterprises. Including in the IT sphere. Including those engaged in the development of products for surveillance and control |
15:47-16:08 |
Back to the USSR: FSB against enemies of the people | First Division |
The concept of "Motherland" is nurtured in each of us from early childhood. To be a traitor to the Motherland means to be a bad person, doesn't it? But not in Russia. Here, if the state wants to, any person will be accused of state treason, espionage, disclosure of state secrets..... |
16:08-16:22 |
Safe Mode: How to Protect Your Communication | Internet Society |
If you live in Russia, you've probably been hacked at least once - or at least tried to be hacked. Many of us think that security is complicated: there is too much information, and the advice of different experts sometimes contradicts each other. But there is a set of basic rules. Everyone needs to know them - it's like the ABCs, only on the Internet. |
16:27-16:30 |
Internet shutdown: how to stay connected | Internet Defense Society |
Is it possible to completely disconnect the Internet in Russia? What should you do if you are left without communication? How can you exchange information in conditions of total blockage? Only necessary and useful advice in case of an Internet shutdown - a complete or partial disconnection of communications by the country's authorities. We hope you won't need it - but we strongly advise you to learn and memorize these simple rules. |
16:30-17:19 |
What the KGB archives hide about Soviet propaganda | How not to become a vegetable |
KGB archives shed light on the hidden aspects of Soviet propaganda, repression and the fight against dissent. Oksana Moroz hosts historian Eduard Andryushchenko, author of the book "KGB Archives. Non-Fictitious Stories" |
17:23-17:54 |
ENIGMA. How the "invincible" cipher was cracked | Division One |
Imagine a device that looks like an old-fashioned typewriter, but instead of printing ordinary letters, creates an incredibly complex cipher. The Enigma cipher machine was the key to the success of the Third Reich's army - and especially its navy. |
17:54-18:00 |
Picocrypt: a portable and very simple encryption program | Greenhouse |
Picocrypt is a free, open-source program that does not require installation. It is convenient to use it, for example, if you need to quickly encrypt some small files and upload them to the cloud. |
18:00-18:05 |
Odysee. The decentralized equivalent of YouTube? | Greenhouse |
Odysee is a decentralized video platform based on the LBRY blockchain technology. Here you can share your videos, retain full control over them and earn cryptocurrency for views. |
18:05-18:24 |
ChatGPT o3 mini vs DeepSeek. Comparison of artificial models for writing code and logical tasks | AI Ukraine |
A comparison of ChatGPT o3 mini, DeepSeek, and o1 reveals their capabilities in code generation, logic problem solving, and data processing. These models demonstrate innovations in 3D object generation using powerful neural network technologies. |
18:27-18:28 |
What is digital shadow? Tactical Tech. |
What is a digital shadow, how does it appear, transform and what kind of life does it live? |
18:28-18:31 |
Your selfies can be used against you | Tactical Tech |
Who can use your selfies and how? What are verification and identification? What are the risks associated with posting selfies online? |
18:31-18:44 |
Phishing: How scammers steal money and data | FIRST OFFICE |
One of the most common cyberattacks is phishing. Attackers lure you to a fake website that looks exactly like the real thing to steal your login and password. Or they call "from the bank" and try to get your card details. Or send out "discounts" and "special offers" on fake resources to do the same through them. Anyone can face a phishing attack, but everyone can also protect themselves from it. How to do it? See in our new video! |
18:45-18:49 |
Configuring VPN with WireGuard | Teplice |
WireGuard gives you the opportunity to connect a VPN tunnel quickly and for free. All you need for this is to have a configuration file. Today, many VPN providers, along with their built-in VPN access application, give you the possibility to download a configuration file for access via WireGuard |
18:49-18:55 |
Guerrilla texting: encrypted text messages in case the internet goes down | Teplica |
The probability of an Internet outage in Russia is high, but we can say with a high degree of probability that mobile communication will be preserved in the event of an Internet outage. So SMS may become the main means of communication, at least for the time being |
18:55-19:06 |
Your account has been LOCKED! The Instagram scam swamp | How not to become a vegetable |
Every day we risk losing our money due to increasingly sophisticated schemes of deception in social networks and messengers. We have already talked about some of them in our videos. But scammers are coming up with new ways to scam you. That's why in this video we'll talk about the most popular fraudulent schemes in Instagram. And we'll tell you how to protect yourself and your money. |
19:09-19:22 |
What's wrong with fifth-generation base stations | Internet Defense Society |
Breaking down the conspiracy surrounding 5G networks and telling the story of generations of connectivity |
19:22-19:25 |
Re:Publika 13. How a Wi-Fi network tracked all the people at the conference | Tactical Tech |
The example of the Wi-Fi network at the Berlin conference shows that by tracking connections and collecting device data, it is possible to identify all meeting participants. |
19:25-19:28 |
What are the risks for investigative journalists? How do you protect yourself? | Tactical Tech |
Investigative journalists often take risks and find themselves in danger. To keep yourself safe, you need to remember the basic safety requirements not only for you, but also for those around you. |
19:31-19:38 |
Welcome to SplinterCon Taipei. |
Dmitry Vitaliev, eQualitie's CTO, welcomes participants at the opening of SplinterCon in Taipei - activists, developers, researchers and designers striving to create sustainable digital solutions that can resist censorship and fragmentation. Dmitry talks about the phenomenon of the splinternet, which is replacing the internet. |
19:38-19:44 |
OpenAI o1. A new step in the development of artificial intelligence | Greenhouse |
Today, AI is increasingly being used to solve complex problems in fields ranging from science to entertainment. The new OpenAI o1 model opens up even more possibilities for such applications. However, it is only available in a paid version. |
19:44-19:52 |
Objective-See. Free macOS security utilities | Hothouse |
Objective-See is a set of free and open source utilities created by cybersecurity expert Patrick Wardle. These tools help monitor system activity, block malware, and monitor network connections. |
19:54-20:07 |
How are Telegram users de-anonymized? Laplace's Demon | FIRST DISCUSSION |
It has long been known that Telegram users can be deanonymized using leaked databases of other services. But did you know that a small Russian startup has put this process on a conveyor belt, specifically to help law enforcement agencies? If not, you'll find out today! Let's tell you about the Laplace Demon social network tracking system and what deanonymization can do to you personally |
20:10-20:20 |
How a "smart camera" almost put an innocent man in jail | FIRST EDITION |
To penetrate the secrets of the past and solve old cases, Russian law enforcers decided to resort to modern technology: cameras with facial recognition. One such camera "recognized" a serial killer from the 2000s in the scientist-hydrologist Alexander Tsvetkov, and investigators rushed to pin the case on him. Except that the scientist could not have been at the scene of the crime, and "recognized" his accomplice described a completely different person. Why, then, do law enforcers so easily believe facial recognition data? And can it be trusted at all? |
20:22-22:05 |
Artificial intelligence and the wars of the future. Why is Ukraine's role crucial? Transhumanist Anton Voychenko |
Alexander Glushchenko's guest is Anton Voichenko, an artificial intelligence specialist who has launched a startup to develop solutions for drones and UAVs that destroy the enemy in radio silence mode |
22:10-22:24 |
A strong password. Explained in 13 minutes and 37 seconds | FIRST SECTION |
Passwords. We all use them every day to protect our technology, email, and social media accounts. But have you thought about whether you're doing it right - are you following the most basic cybersecurity? Are you putting your data at even greater risk by relying on bad passwords and bad habits? |
22:27-22:36 |
Facial recognition cameras now in every city | FIRST OFFICE |
Total surveillance in every city! The Ministry of Finance wants to centralize many of Russia's existing video surveillance systems. Modernize, improve and equip with facial recognition - cameras with this function should very soon become literally 10 times more. Now it will be like in the capital: stick your head out of the window and you'll be caught on tape |
22:36-22:42 |
X-doc AI. Translator designed for technical texts | Greenhouse |
X-doc AI is a service for translation and processing of technical texts using artificial intelligence. It is designed for fast and accurate localization of documents. X-doc AI preserves their structure and design elements. This makes it a useful tool for professionals working with technical and scientific materials and official documents |
22:42-22:49 |
Recraft AI. Another tool for creating visual content | Greenhouse |
Recraft AI is an artificial intelligence-based tool for creating unique visual content.
Recraft AI allows you to generate images, layouts, graphics and even logos using just text queries.
This tool is suitable for designers, marketers and content creators who need to create creative content quickly and efficiently. |
22:49-22:55 |
Anytype. A data management tool that can replace Notion | Greenhouse |
Anytype is a powerful tool for information management. Minimalistic design: Anytype's interface is distraction-free, allowing you to focus on the content. Block structure: Like Notion, Anytype allows you to drag and drop blocks of text, images, videos and other elements, making it flexible and easy to organize information. |
22:55-23:01 |
Kling AI. Generate video with neural network | Greenhouse |
Kling AI is an innovative video generator developed by Chinese company Kuaishou. AI uses advanced artificial intelligence technologies to create high-quality promt-based videos. The neural network applies 3D solutions that allow modeling complex movements and physical interactions of objects, which makes videos more realistic and dynamic. |
23:01-23:12 |
OuiSuite: an ecosystem for isolated networks | SplinterCon Taipei |
Dmitry Vitaliev, CTO of eQualitie, presents OuiSuite - a set of tools for peer-to-peer content delivery, i.e. without a central server. OuiSuite is designed for use in isolated networks like the Iranian or Russian Internet. |
23:15-23:27 |
Yandex has been added to the surveillance registry. Again. First Squad. |
This year, 9 Yandex services were included in the register of Organizers of Information Dissemination (OID). This status is given to Internet resources where users can send messages to each other or to administrators, primarily large ones.
And the ODI register is also called the "surveillance register", because the resources included there are obliged to store and decrypt users' messages, and then share them with law enforcement agencies. So Yandex is spying on us? No way! |
23:27-23:35 |
Bypassing blocking - banned content. Can we get out of this? | FIRST DIVISION |
From March 1, 2024, Roskomnadzor started blocking instructions on how to bypass blocking. To read instructions on how to install a VPN, you will now have to install a VPN, and the VPN itself will also be blocked. At least, this is the effect the censors want to achieve. But will they succeed? In the new video we will analyze the criteria of blocking (everything is very bad there) and see if it is possible to fight against them |
23:39-00:37 |
Hothouse Live : The Future of the Internet in the Face of Blocking and Splinterization |
With increasing state control and monopolization of the Internet by large technology companies, the issue of Internet freedom is becoming more and more acute. Blocking and splintering of the Internet leads to loss of users and restricted access to information. |