15 October 2025
00:06
Cloudflare WARP. A simple way to protect your online traffic | Greenhouse
To prevent anyone from seeing what you're doing online, use Cloudflare WARP, a simple anti-surveillance solution without slowing down the internet. Especially useful for those who connect to Wi-Fi in cafes, hotels or airports.
00:14
How hackers set off a global cyberwar | FIRST OFFICE
North Korean hackers steal billions via SWIFT and crypto. Chinese hackers attack big pharma and steal vaccine development. Russian ones break elections and energy systems. The American and Israeli respond with their own digital special operations. From Lazarus to Fancy Bear, from the NSA to Israel's Unit 8200, this video shows you what the reality of cyber warfare looks like, who is waging it, and for what purpose.
00:37
KREA. A step-by-step guide to using neural networks. AI for image generation, video | AI Ukraine
A detailed guide to working with the KREA neural network to create images, videos, 3D, 2D and other creative materials using artificial intelligence. The guide includes instructions on how to train your own neural network and apply LoRA technology for unique results.
01:10
4 alternatives to ChatGPT: HuggingChat, Le Chat (Mistral AI), Claude, Grok | Greenhouse
Looking for powerful alternatives to ChatGPT? A breakdown of the top 4 AI tools of 2025 with unique features.
01:24
The Future of VPNs - No VPN | SplinterCon Taipei
Censorship is evolving, and ways to circumvent it must evolve with it. In this joint report, Mallory Knodel (Social Web Foundation) and Vinicius Fortuna (Outline) argue that the future of censorship circumvention is not in increasing the number of VPNs, but in reducing them.
01:49
Questions and answers from the VPN Generator team. August 2025 | Internet Society
Mikhail Klimarev answers frequently asked questions from users of the free VPN Generator service.
02:36
Tips from Nadiyno.org: how to check if a site is safe for entering sensitive, personal and financial data
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
02:39
Artificial intelligence has learned to think. What's in it for us? | Dev.UA
What on Artificial Intelligence: how to make a Youtube video summary with AI? How to make a presentation based on any text in a minute with AI? How to have a virtual AI assistant with whom you can communicate in real time? How to write your own song in any style with only lyrics and AI?
04:07
How hackers are making millions from subscriptions | FIRST OFFICE
Today, cyberattacks can be bought literally by subscription. Ransomware is distributed through the RaaS model - Ransomware-as-a-Service. Hackers write a service and others pay to use it, as if it were Spotify or Netflix. As a result, the number of attacks is growing, and even those who think no one cares about their data are vulnerable. We tell you how the shadow economy turns someone else's grief into profit and explain how not to become a victim of cyber racketeering.
04:27
Google released a better voice generator? | Hothouse.
Google AI Studio introduces a new voice generator based on Gemini models, allowing you to create both monologues and dialogs with emotional coloring. Overview and details about the functionality, features and current limitations of the free version.
04:35
HTTP or HTTPS - how does it work and what's the difference? | Red Sneakers.
In the video we'll break down the basics of how the internet works and how using the http protocol relates to your online security. We will discuss whether https is really as secure as it is described.
As we break down the specifics, we'll also look at schiffing, a frequent question in digital security interviews.
04:42
Questions and answers from the VPN Generator team. September 2025 | Internet Society
Mikhail Klimarev answers frequently asked questions from users of the free VPN Generator service.
05:31
Key cybersecurity tips | RFE/RL Academy
A course on digital security: sammari, top security tips.
05:35
OuiSuite: an ecosystem for isolated networks | SplinterCon Taipei
Dmitry Vitaliev, CTO of eQualitie, presents OuiSuite - a set of tools for peer-to-peer content delivery, i.e. without a central server. OuiSuite is designed for use in isolated networks like the Iranian or Russian Internet.
05:50
Veo 2 from Google AI Studio. Video generation test and comparison with Kling, Minimax and Runway | Greenhouse
Google AI Studio is a free platform for developers to experiment with generative AI, including the Veo 2 model. We test video generation with Veo 2, parse the settings and compare the results with other neural networks: Kling 1.6, Minimax and Runway.
05:58
"People didn't realize they were communicating with a bot." Experiment | How not to become a vegetable
Why are AI bots in social networks dangerous? And how can they influence public opinion by masquerading as real users? Oksana Moroz refers to an experiment by the University of Zurich, which showed that AI bots are six times more effective than ordinary users in changing opinions on Reddit through manipulation and misinformation. It turns out that modern technology poses a much greater threat due to its ability to tweak and persuade specific users.
06:18
How NordVPN protects user privacy | SplinterCon Taipei
NordVPN CTO on the evolution of the service: from a basic VPN to a comprehensive security platform with antivirus and private mesh networking features. Marius explains in detail how the company ensures user privacy through a no-logs policy, annual independent audits, and strategic registration in Panama. He also talks about the risks of using free VPNs. And about the future of digital privacy in a fragmented global internet.
06:34
Safe Mode: How to keep your data safe | Internet Society
You or someone you know has probably at least once received a call from "bank security officers" asking for card details. You may say, "Well, no, I won't fall for that. But there is a suitable hook for any person. Professional scammers have very clever ways to get you to give your information voluntarily - and most likely, you won't even realize what happened.
06:50
Tips from Nadiyno.org: how regularly you should check your financial accounts
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
06:52
All about passive brain-computer interfaces | Protocol Labs
Thorsten O. Zander, founder and CEO of Zander Labs, takes a deep dive into the pioneering world of passive brain-computer interfaces (BCIs). Zander explores how passive BCIs are revolutionizing human-computer interaction beyond traditional methods. He covers the underlying concepts, direct control through BCIs, and delves into the transformative potential of passive BCIs. Learn how these interfaces can replace manual input, adapt to user states, and improve machine understanding of human intent.
08:35
How do journalists get information and investigate cross-border crimes? | Tactical Tech
Romanian investigative journalist Paul Radu shares his methods for investigating corruption and organized crime, providing examples of cross-border crime investigations from around the world.
08:53
Creating an app without code with Emergent AI | Greenhouse
Emergent AI is an "agent-based web coding" platform that allows you to create a finished web application in 30 minutes by simply describing it in words. It supports GPT-5 and Slude. As well as how much it costs, and what limitations the free version has.
09:00
Why don't Google's first links always work? | Red Sneakers.
What is SEO and how does it affect the positioning of your pages in search engines? Let's uncover the secrets of Search Engine Optimization and why sometimes the first search results may not match your expectations.
What about Google Ads and Google's ads? Let's find out how ad campaigns affect your website positions and why sometimes advertising can be more effective than SEO.
09:10
Welcome to SplinterCon Taipei.
Dmitry Vitaliev, eQualitie's CTO, welcomes participants at the opening of SplinterCon in Taipei - activists, developers, researchers and designers striving to create sustainable digital solutions that can resist censorship and fragmentation. Dmitry talks about the phenomenon of the splinternet, which is replacing the internet.
09:22
How do you find hidden sites on the darknet? Red Sneakers.
Today, let's look at what the Darknet is and how i2p works, how to protect yourself on the Darknet, and whether your data is being sold there. In doing so, we'll discuss hidden sites and a more secure Darknet, revealing and giving you tips on how to stay anonymous and protected while browsing.
09:29
Questions and answers from the VPN Generator team. June 2025 | Internet Society
Mikhail Klimarev and his colleague Oleg answer frequently asked questions from users of the free VPN Generator service.
10:17
LM Studio and Jan AI. How to run a neural network locally and without internet? | Greenhouse
A detailed overview of the free LM Studio and Jan AI programs for running language models on a personal computer with full privacy and without cloud restrictions. The guide covers the installation process, model selection, offline mode setup, and application of local neural networks for various professional tasks.
10:30
Surveillance of dissenters... IN EUROPE? SECTION ONE.
Pegasus spy software is usually talked about in the context of dictatorships: some autocrat is spying on citizens again, and NSO Group is helping him to do it. But Pegasus is also used in a number of European countries, democratic and prosperous. In this video you will learn about one such case, the very first and most high-profile of all known cases - during the referendum in Catalonia in 2017.
10:49
All the secrets that hide your photos: tricks with EXIF and steganography | Red Sneakers
We will reveal and analyze possible problems related to the use of QR codes and give practical advice on how to avoid them. We will discuss an important aspect - cybersecurity when using QR codes and how to protect yourself from potential threats. We will delve into the universe of QR codes, consider the areas of their use, and highlight possible problems. We will learn how to send an email conveniently and quickly using a QR code. We will learn how to easily and securely exchange data for Wi-Fi access using a QR code."
11:02
Internet governance in Taiwan from an infrastructure perspective | SplinterCon Taipei
Wu Kuo-wei, former ICANN board member and co-founder of the Taiwan Internet Governance Forum (TWIGF), talks about the infrastructure challenges facing Taiwan in 2025.
11:25
GPT-5 capabilities. Communication, code writing and logical tasks | AI Ukraine
ChatGPT-5 is a breakthrough! Your very own scientist in your pocket. Use for communication, logic problems and code writing. Case studies of GPT-5 application in business.
11:51
Tips from Nadiyno.org: what personal information should never be shared online
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
11:55
Viktor Zhora: the flywheel of cyberwar against Ukraine is just spinning. Results of 2024 | eQtalk
eQtalk is an original project of eQtv TV channel. Oleksandr Glushchenko's guest is Viktor Zhora, one of Ukraine's leading cyber security specialists. The topic of the conversation is russia's cyber warfare against Ukraine. Who is involved?
13:13
Transparency as a Tool: Toward Internet Sustainability | SplinterCon Taipei
Using data from the Cloudflare Radar service, Cloudflare's Head of Research Marwan Fayed explores Taiwan's routing ecosystem. The report traces how network conditions, traffic anomalies, and regional failures reveal structural vulnerabilities and shows how it helps us better understand the fragmentation problem.
13:28
Scira AI. Free open source AI search engine | Greenhouse
Scira AI is a free open source AI search engine with no registration. It supports GPT-4o, Claude, Grok, Llama, Gemini and other models. 7 search modes are available, including Reddit, YouTube, scientific articles, code, and image analysis, as well as a Buddy feature to save context between sessions.
13:36
Everything you need to know about QR codes | Red Sneakers
QR codes have become an integral part of our digital lives, but do you know all their capabilities and risks?
13:45
Practical cases of using ChatGPT Agent | AI Ukraine
ChatGPT Agent. What it is, how to use it in practice - 7 best ways to use it: work with files, analyze monetary statements, check counterparties, train personnel, create presentations. How to launch ChatGPT Agent on your smartphone.
14:13
Everything you wanted to know about Starlink | FIRST DIVISION
In this video, everything that is important to know about Starlink satellite internet: how Ilon Musk's network works, how it is better than conventional internet, what risks it carries, and why there is so much talk about it. From the first satellites to mass use and future plans, you'll learn what's really new in this technology and what's familiar.
14:38
Eraser. How do I permanently delete files from my computer? | Greenhouse
Normal file deletion does not guarantee data protection, as it can be recovered even after disk formatting. Eraser allows you to safely delete confidential files, set up automatic deletion and clear free space on your hard disk.
14:45
How does Google know what you're looking for? | Red Sneakers.
In this video, we will understand why the first links in a Google search query may not look the same as they used to. We'll reveal the secrets and important changes that have taken place in the SEO world and how they affect search results. We'll break down the components of the SEO process, revealing how optimizing a website helps it rise in the search results.
14:49
China is erasing the memory of itself and us. What happened in Tiananmen Square? | FIRST SECTION
The 1989 shooting of protesters in Tiananmen Square is one of the most famous events in modern Chinese history... in the West. In China itself, the memory of it has been erased by several decades of censors. How did they manage it? And why did Chinese censorship begin to seep into the Western information field?
15:16
Questions and answers from the VPN Generator team. July 2025 | Internet Society
Mikhail Klimarev and his colleague Oleg answer frequently asked questions from users of the free VPN Generator service.
16:12
What are AI agents? AI Ukraine.
AI agents are intelligent systems that do not just respond to requests, but independently break down tasks into subtasks, plan and execute them using external tools and databases. Unlike classic chatbots, agents can work autonomously, make decisions and adapt during execution, and are therefore capable of performing complex tasks.
16:33
Tips from Nadiyno.org: how to recognize dangerous attachments in emails and protect yourself
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
16:36
What is propagandist Olga Skabeyeva doing online? | Navalny LIVE
"What they do on the network" - a show about propagandists, who they are, where they came from, and what they do. The heroine of the show is Olga Skabeeva. The very first episode of the show "What they do online" was about Evgeny Popov. After almost three years, we finally got to his wife Olga Skabeeva. And we found out that it is Skabeeva in this pair of propagandists is the locomotive of cringe and cannibalism. Sasha Makashenets tells us about propaganda, hatred, hypocrisy, "Pynya" and Biden.
19:38
How the keyboard in your smartphone keeps track of you | FIRST EDITION
The virtual, or on-screen keyboard on your phone knows too much about you. And in some cases, that knowledge can be dangerous. Our colleagues at Citizen lab have found vulnerabilities in the keyboards of the most popular manufacturers, and today we'll talk about that research - and whether you should be afraid of your keyboard.
20:00
How do you find almost everything on Darknet? | Red Sneakers
From the video you will learn what the Darknet is and how this part of the Internet differs from the usual one. We will dive into the mysterious world of anonymous forums and trading sites indexed only by special search engines.
We will also open the curtain and tell you how tor works and how this technology helps to ensure your privacy when browsing resources on the Darknet.
20:10
Riffusion. A music generator that's better than Suno? | Hothouse
Riffusion is a neural network that turns text descriptions into music tracks. Simply enter a style, mood or instruments and AI will generate an audio file.
20:16
Meshtastic in Taiwan: between technology and community | SplinterCon Taipei
Sean, a researcher from TWX Mesh, talks about Meshtastic, a civic mesh networking project in Taiwan. From the talk, you will learn how community-driven infrastructure and mesh networks create reliable communication channels.
20:30
Questions and answers from the VPN Generator team. May 2025 | Internet Society
Mikhail Klimarev and his colleague Oleg answer frequently asked questions from users of the free VPN Generator service.
21:22
Use cases of ChatGPT Advanced Voice Mode | AI Ukraine
ChatGPT's advanced voice features allow you to use a wide range of intonations and roles, creating vivid and lively dialogs. The ability to convey emotions opens new horizons for communicating with artificial intelligence.
21:44
Vids that are ruining the country. What are the dangers of Tic Toc? | How not to become a vegetable
About the activities of the fake Chinese church "Church of Almighty God", which operates in Ukraine under the guise of a Christian organization. The sect actively recruits new followers through TikTok, publishing videos on the topics of freedom, human rights and spirituality. The video explains how to distinguish such cults from real religious communities and what is their danger. The role of journalists and fact-checkers in exposing such manipulations is also raised.
22:07
Tips from Nadiyno.org: How antivirus helps protect your devices and data from threats
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
22:10
War and Cyber: Three Years of Struggle and Lessons for Global Security | State Communications Service
Experts of the State Service for Special Communications and Information Protection of Ukraine together with the ICE Task Force analytical center prepared the report "War and Cyber: Three Years of Struggle and Lessons for Global Security"
23:27
How adult websites collect and sell your data - and what to do about it | FIRST OFFICE
A breakdown of Microsoft Research's investigation into how the industry entertains some - and makes money off others. Researchers found that 93% of porn sites leak data to third parties, only 17% of them use encryption, and most of them allow deanonymizing users even in incognito mode.
23:42
Delta Chat. A private messenger that is safe from blocking? | Hothouse
Delta Chat is a decentralized messenger powered by email, making it blockchain-resistant. A detailed account of the messenger's features, including end-to-end encryption, multi-platform support, group chats, and experimental video calls.
23:49
How do you trace any file? Red Sneakers.
In this video, we will show you how to use Canary Tokens to protect your valuable data. Canary Tokens is a powerful tool to protect and control access to your files.
We will detail how to install Canary Tokens to effectively protect your files from unauthorized access. With this method, you will have complete control over the security of your data by providing invisible protection.
23:52
The True Story: News aggregation as a way to overcome information barriers | SplinterCon Taipei
Lev Gershenzon, founder of the news aggregator The True Story, shares the story behind the creation of the platform, which was developed in response to the blocking of independent media in Russia. The project offers a unique algorithmic approach to the news feed, collecting different points of view on events and helping readers form their own picture of what is happening through a transparent system of information sources.
16 October 2025
00:08
How hackers are making millions from subscriptions | FIRST OFFICE
Today, cyberattacks can be bought literally by subscription. Ransomware is distributed through the RaaS model - Ransomware-as-a-Service. Hackers write a service and others pay to use it, as if it were Spotify or Netflix. As a result, the number of attacks is growing, and even those who think no one cares about their data are vulnerable. We tell you how the shadow economy turns someone else's grief into profit and explain how not to become a victim of cyber racketeering.
00:30
What is phishing and how do you protect yourself from it? | Red Sneakers.
Today, let's talk about what phishing is and why this form of cyberattack is so dangerous to your online security. Let's uncover how phishing attacks and social engineering work and how you can protect yourself from them.
Phishing is a clever fraud method where attackers resort to spoofing emails or websites to obtain your personal information.
00:38
How to create your own Outline VPN server in 5 minutes | Greenhouse
How to create a private VPN server in 10 minutes with Google Jigsaw's free and open source Outline project - full control, high speed and state-of-the-art Shadowsocks encryption. How to choose a VPS provider, install Outline Manager and Client, and configure and manage your server.
00:45
The Digital Blockade of Modern Sudan in Military Conflict | SplinterCon Taipei
Hussam Mahjoub, co-founder of Sudan Bukra TV, discusses the use of shutdowns in Sudan as a tool of control and repression. The country's current conflict has led to unprecedented telecommunications blockades, denying millions of Sudanese access to information, medical care and remittances.
01:04
Rules of Russian propaganda from Skabeeva and Rogozin | How not to become a vegetable
In this video we will draw parallels between what Russian propagandists say in their lectures and write in their manuals. We will find out how this is then reflected in the hostile information operations that we are witnessing in the Ukrainian space.
01:29
ChatGPT-5. The most complete instruction on the use of neural network | AI Ukraine
The most complete instruction on using ChatGPT-5 neural network. Rules of writing prompts, comparison with other neural networks Claude, Grok. Use for creating applications.
02:21
Tips from Nadiyno.org: why you should be skeptical of attractive online offers
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
02:26
Mikhail Klimarev, Zatelecom: History of Internet Blocking in Russia | eQtalk
eQtalk is an original project of eQtv TV channel. Alexander Glushchenko's guest is Mikhail Klimarev, one of Russia's leading Internet security experts. The topic of conversation - the history of Internet blocking in Russia. Control, monitoring, blocking, censorship of resources by the FSB and Roskomnadzor. Risks for ordinary Internet users.
04:59
Independent Technology in a Shakedown | SplinterCon Taipei
Lev Gershenzon, founder of the news aggregator The True Story, shares the story behind the creation of the platform, which was developed in response to the blocking of independent media in Russia. The project offers a unique algorithmic approach to the news feed, collecting different points of view on events and helping readers form their own picture of what is happening through a transparent system of information sources.
05:33
Nextcloud. Secure data storage in the cloud | Teplitsa
An overview of Nextcloud - an open platform for creating personal cloud storage. How it differs from commercial services, how to create an account, use built-in features and organize collaboration with full control over your data.
05:40
How to monitor active sessions in messengers | RFE/RL Academy
Digital security course: what are the dangers and benefits of active sessions on devices?
05:43
How the U.S. ambassador was bugged for seven years with an invisible bug. And what does that have to do with electronic music? | FIRST SECTION
In '45, Soviet spies won a great victory over their American colleagues: they managed to install a bug in the office of the American ambassador and secretly listen to all conversations for several years. This innovative device, which at that time had no analogs, was born in the cloisters of the NKVD special prison for scientists and designers, "Tupolev sharashka". The elusive bug was created by the father of electronic music and a real celebrity in the U.S. - and then a prisoner of conscience and unwitting assistant to Soviet intelligence, Lev Termen.
05:56
Camouflage show. How propaganda makes a holiday out of war | Navalny LIVE
Entertainment television no longer entertains - it mobilizes. Today, war is confidently marching through the studios, and patriotism is becoming a universal script: equally suitable for talk shows, music competitions, and reality shows about early pregnancy. In "Field of Miracles" Yakubovich is given drones, in "Let's Get Married" brides compete for a man with a combat record and benefits. In "Male / Female" - a drama: relatives share coffins and find out the relationship. And in "Pregnant at 16" - special issues: dad - in the trench, mom - in maternity leave, the child - a symbol of the new Russia.
06:33
How and why to use a VPN | RFE/RL Academy
Digital security course: all about VPNs
06:36
Manus AI. The first autonomous AI agent that works for you | Greenhouse
Manus AI is a revolutionary AI agent from China coming in March 2025 and is already being called the "killer OpenAI Operator".
06:42
KREA. A step-by-step guide to using neural networks. AI for image generation, video | AI Ukraine
A detailed guide to working with the KREA neural network to create images, videos, 3D, 2D and other creative materials using artificial intelligence. The guide includes instructions on how to train your own neural network and apply LoRA technology for unique results.
07:15
Putin's favorite propagandist. How Dmitry Kiselyov lives | Navalny LIVE
Today Dmitry Kiselyov is the face of Kremlin propaganda, but in the nineties he stood for freedom of speech and independent journalism. He once said that a journalist's task was "to show the whole picture of the world," but today he broadcasts Putin's methodology and threatens that very world with radioactive ash. Alexander Makashenets tells us in detail how Dmitry Kiselyov's career was built.
07:55
Fediverse: The Future of Internet Communications Without Monopolies | SplinterCon Taipei
Mallory Knodel, Executive Director of the Social Web Foundation, reveals how fediverse works and the advantages of these networks over traditional platforms like Facebook and Twitter. She explains why fediverse offers a more sustainable future for digital communications and details the key differences: open protocols, interoperability across platforms, and new approaches to monetization and content moderation.
08:16
Tips from Nadiyno.org: how to recognize scammers on the Internet
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
08:23
Why Russian gamemaking is at the bottom and Ukrainians influenced it | Vitaliy (v1lat) Volochay
What are the peculiarities of the effect of computer games, which ones and how exactly shaped the Ukrainian community? And also how we can use this sphere in the fight against Russia.
Lena Chichenina talks about this with cybersports commentator Vitaliy (v1lat) Volochai. He has been professionally involved in video games for more than 10 years and is one of the most famous experts in Ukraine. In 2018, he became a co-founder of Maincast cybersports broadcasting studio.
09:27
DEGUGLIZATION. Replacing services with more confidential ones | FIRST SECTION
User data is a precious resource that all big IT companies dream of getting their hands on. Some are interested in your consumer habits in order to offer contextual advertising. Others dream of feeding your texts to neural networks for training. Still others sell information about you to anyone who wants it. The only one who loses rather than earns on this resource is you. But today we will try to improve the situation. In this video we will analyze safer alternatives to popular applications and services that collect the most of your data. Some of them will be suitable only for enthusiasts, while others can be easily used by anyone right now. Watch and share with your friends - data can't protect itself!
09:54
Qwen AI, Hailuo AI, Kling AI. Testing Chinese neural networks | Greenhouse
We test three popular Chinese neural networks: Qwen, Hailuo and Kling AI, check their capabilities, learn the pros and cons.
How good is Qwen 2.5 MAX and is it really free? How Hailuo works - generating videos and images based on text and photos. How Kling AI can generate images.
10:03
How to communicate in messengers safely | RFE/RL Academy
Digital security course: how to communicate in messengers safely, which ones to choose and how to use?
10:08
Machine consciousness | Protocol Labs
Joshua Bach, a prominent cognitive scientist and AI researcher, explores the essence of artificial intelligence and consciousness. Bach elaborates on the history and philosophical foundations of AI, tracing its roots from Aristotle to modern deep learning. He discusses current challenges and limitations in machine learning, especially in achieving human understanding and consciousness.
11:14
Back to the USSR: FSB against enemies of the people | FIRST OFFICE
The concept of "Motherland" is nurtured in each of us from early childhood. To be a traitor to the Motherland means to be a bad person, doesn't it? But not in Russia. Here, if the state wants to, any person will be accused of state treason, espionage, disclosure of state secrets.....
11:35
Lara. New Translator 2025 | Greenhouse
Lara Translate is a new translator that promises to preserve the style and context of the text. But is it really better than ChatGPT, Google Translate and DeepL? In this review we test its features: translations with different styles, work with documents, Excel, PDF, and voice translation.
11:44
How to create and store strong passwords | RFE/RL Academy
Digital security course: how to create and store strong passwords?
11:46
How the Internet works | SplinterCon Taipei
Mallory Knodel, author of How the Internet Really Works, explains the basic principles of the global network, including the domain name system, routing, and cybersecurity. Mallory explains the technical side of the Internet through accessible metaphors and analogies, noting the importance of understanding these concepts for everyday users.
12:02
Top 5 alternatives to ChatGPT | AI Ukraine
Top 5 innovative neural network alternatives to ChatGPT for text, video, audio, infographics, mocaps and digital avatars. A detailed breakdown of the capabilities of each AI tool demonstrates their practical application for automating creative processes, significantly saving time on content development and improving the quality of final materials.
12:30
Zero-click attacks: next-generation spyware | SplinterCon Taipei
Natalia Krapiva, Senior Technical Associate at Access Now, talks about the threats of modern spyware and effective methods of countering government surveillance through mobile devices. Natalia tells about recent cases of Graphite and Pegasus programs being used against journalists and activists, explains the principles of zero-click attacks and offers practical advice on protecting digital security for both civil society representatives and ordinary users.
12:54
Tips from Nadiyno.org: if you found a flash drive or memory card on the street
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
12:57
Ilya Golitsyn: How to make money in the meta-universe? | AI Ukraine
How to integrate your business into the meta-universe. Where and on what and how to earn. Business models for the meta-universe. VR or AR?
13:57
Why piracy is bad for you, not just for developers | FIRST OFFICE
Russia is one of the world leaders... in the field of piracy. Only China overtakes us in terms of efficiency and frequency of copyright infringement. But few people know that piracy is dangerous for users of crackers and repacks. Today you have cracked Photoshop, and tomorrow your data will be leaked to the Darknet.
14:11
3 free neural networks for image creation | Greenhouse
Creating impressive images with neural networks is getting easier and easier. But not everyone has the opportunity to use Midjourney. But there are alternatives - free AI services with daily limits that allow you to generate images without paid subscriptions.
14:20
How not to fall victim to phishing | RFE/RL Academy
Digital security course: what is phishing?
14:23
Secrets of the FSB: Why are they hiding the archives? | FIRST DIVISION
Russia's main secret service inherited the archives of the VChK, NKVD and KGB - a huge mass of documents to which many people have long been trying to gain access. Some are writing historical works, others are trying to rehabilitate relatives, others are interested in the fate of historical figures. And all of them face a reinforced concrete barrier, behind which this information is hidden: many papers of the Soviet special services do not give out even after 100 years, when none of the people mentioned in them are alive. Why do they do this? And what do those who do get something out of the archives other than just an abstract? This is the subject of our new video.
14:40
How to Create Apps and Earn on Marketplace from OpenAI | AI Ukraine
Creating chatbots using artificial intelligence is now available thanks to a marketplace from OpenAI where you can create and sell your own GPTs. Step-by-step guide to creating your own Custom ChatGPT and monetizing the application
15:02
Flora AI - 19 neural networks in one service | Greenhouse
Flora AI is a new platform for creating content with artificial intelligence. It brings together text, image, and video models in one place, including ChatGPT-4o mini, Claude 3, Gemini 2.0 Flash, Flux, Stable Diffusion, and more. How Flora AI works, how user-friendly its interface is, what features are available in the free version, and whether you should buy a subscription.
15:12
Is it hard to hack your account? | RFE/RL Academy.
A course on digital security: how can someone's account be hacked, how do you know if it's safe from hacking?
15:16
Creating Prompts and Testing Generative AI (Theory) | Pollicy
Arthur Kakande presents an introduction to Prompt Engineering and Adversarial Testing for Large Language Models (LLMs). Kakande describes various techniques for creating prompts, such as zero-shot, few-shot, and chain-of-thought. Special attention is given to LLM moderation to prevent malicious content and prompt injection. Adversarial testing, a method of identifying vulnerabilities in LLMs by targeting complex data, is demonstrated.
15:45
No license, no passport. Who are the stateless? | FIRST DIVISION
Can your Russian passport be taken away from you for an anti-war post on the Internet? According to the new law, yes, if your citizenship is acquired. But there are already tens (and possibly hundreds) of thousands of stateless people living in Russia. In a country where you need a piece of paper for every sneeze, their fate is unenviable.
16:02
Tips from Nadiyno.org: How users should check suspicious links and addresses
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
16:13
Toward an Afro-feminist artificial intelligence | Pollicy
Discussion of the report "Towards an Afro-Feminist AI" in a webinar format. The report proposes a risk-based approach and Afro-feminist principles for AI regulation aimed at empowering women.
17:48
Durov at a crossroads. What is the future of Telegram in Russia? | Internet Defense Society
In Russia, Telegram remains one of the few uncensored spaces thanks to Pavel Durov's resistance to pressure from the authorities, but he will have to choose between cooperating with law enforcers and preserving the messenger's freedom, which could lead to its blocking in the future.
18:08
Slides AI and Gamma. Neural networks for creating presentations | Greenhouse
Looking for a way to create professional presentations faster? With two powerful AI-powered tools, Slides AI and Gamma, you can create impressive presentations literally on a single request.
18:17
How to protect your phone | RFE/RL Academy
A course on digital security: key tips for protecting your phone.
18:20
Tetris, STALKER, The Witcher: how games affect you even if you don't play | How not to become a vegetable
We tell you about computer games as a tool of "soft power". How Russia is using them against Ukraine. But how can we reduce this influence and take them into our own hands.
18:47
Pika Art - neural network for video generation | AI Ukraine
Pika is a neural network video platform. It "animates" pictures and creates videos based on a text prompt. Objects in the photo can be inflated, broken, exploded and squeezed as an anti-stress toy.
19:07
Objective-See. Free macOS security utilities | Hothouse
Objective-See is a set of free and open source utilities created by cybersecurity expert Patrick Wardle. These tools help monitor system activity, block malware, and monitor network connections.
19:15
Introduction to Digital Security Course | RFE/RL Academy
Meet the mascot Kida.
19:18
The internet is safe for women. Episode 1 | Pollicy
Moderator Cecilia Mondo and her guests discuss whether women can work safely and effectively in the digital space to overcome threats. The panelists share their personal experiences of cyberbullying, suggest different strategies to increase safety in the digital space, and discuss the importance of programs to provide psychological support to victims of cyberbullying.
19:47
Tips from Nadiyno.org: how to check if a site is safe for entering sensitive, personal and financial data
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
19:50
Pavel Belousov, Nadiyno.org : how not to fall for internet scammers?
Pavel Belousov, a technician of the digital help hotline Nadiyno.org, gives recommendations to Internet users on how not to become victims of Internet fraudsters and not to fall for phishing.
20:38
The internet is safe for women. Episode 2 | Pollicy
Participants in the roundtable discuss the status of women on the Internet and ways to combat online violence. The importance of removing barriers to accessing and using digital technologies is emphasized, as well as the need to develop local, inclusive content and educational programs tailored to the needs of different groups of women.
21:05
Kling AI. Generate video with neural network | Greenhouse
Kling AI is an innovative video generator developed by Chinese company Kuaishou. AI uses advanced artificial intelligence technologies to create high-quality promt-based videos. The neural network uses 3D solutions to model complex movements and physical interactions of objects, which makes videos more realistic and dynamic.
21:11
Cybersecurity and Risk Assessment | RFE/RL Academy
Digital Security Course: How to Assess Risks?
21:15
Concentration camp in DNR, Ukrainian "spy", Lamborghini for militants | FIRST DIVISION
Alexander Marchenko is a Ukrainian serving time in Russia on far-fetched espionage charges. In 2018, he was detained in Donetsk and sent to the worst place in Eastern Europe - the infamous Isolation concentration camp. Tortured and starved, then handed over to the FSB.
21:59
"Some are fighting - others are having fun". Russian disinformation for Ukrainians | How not to become a vegetable
While the Ukrainian military are sitting in the trenches, someone is having fun in clubs, going to restaurants and living their best life. It is easy to come across clips of such content on social networks. In particular, they are distributed among the military. Let us analyze how this information operation works.
22:07
Cybersecurity: How to monitor your camera, microphone and files | RFE/RL Academy
Digital security course: who can access your camera, how to prevent it?
22:11
Omni Tools. 50+ free tools | Greenhouse
Omni Tools is a site with free online tools for a variety of tasks. No ads, no subscriptions, everything works instantly. Over 50 tools are available without registration.
22:17
The service of "bad Russians". What does Rossotrudnichestvo do?
While the FSB, the Ministry of Defense and Russian courts are competing for the possession of the most notoriety, there is another government service lurking behind their backs, which itself creates notoriety for Russians abroad - Rossotrudnichestvo. This is one of the divisions of the Foreign Ministry that deals with Russians living abroad. It appeared during the presidency of Dmitry Medvedev and was supposed to popularize Russian culture and deal with Russian-speaking diasporas. But over time, the service developed into an instrument of aggressive propaganda, including military propaganda.
22:41
Tips from Nadiyno.org: How users can protect themselves from phishing attacks
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
22:44
YOU'RE A BETTER PERSON! How TV speculates on emotions | How not to become a vegetable
Shout louder. And louder! We need a real balaganza, then we will definitely be watched. This seems to have been one of the key principles of Ukrainian political shows. It was, because now almost all of them are on pause. How exactly did they attract the attention of the audience? What methods did the editors, hosts and guests use? And, finally, what did they put in the heads of you and me. Don't tell me you don't watch TV - it's been ubiquitous for a long time. We will talk about all this with Dr. Lidia Smola, Doctor of Political Science
23:38
What professions will disappear in the future? | NeVODA
New professions such as astro-miner, robotics trainer and genetic stylist are becoming a reality, opening up unexpected prospects. The development of technology is rapidly changing the labor market, creating opportunities that only recently seemed fantastic.
17 October 2025
00:00
All the secrets that hide your photos: tricks with EXIF and steganography | Red Sneakers
We will reveal and analyze possible problems related to the use of QR codes and give practical advice on how to avoid them. We will discuss an important aspect - cybersecurity when using QR codes and how to protect yourself from potential threats. We will delve into the universe of QR codes, consider the areas of their use, and highlight possible problems. We will learn how to send an email conveniently and quickly using a QR code. We will learn how to easily and securely exchange data for Wi-Fi access using a QR code."
00:11
The Empire of Fakes and Propaganda in Putin's Service | Important Stories
Propaganda in Russia today is almost impossible to hide from. It follows your children to school, seeps into the social media feeds of your cities and districts, and pops up even when you're just scrolling through your social media feed.
There is a whole empire of fake production at work in the country.
00:24
How do you find hidden sites on the darknet? Red Sneakers.
Today, let's look at what the Darknet is and how i2p works, how to protect yourself on the Darknet, and whether your data is being sold there. In doing so, we'll discuss hidden sites and a more secure Darknet, revealing and giving you tips on how to stay anonymous and protected while browsing.
00:33
The Art of World Creation: The Little Martians Project | Protocol Labs
Vanessa Rosa, a pioneer of street art and laser cutting, recounts her journey from grassroots projects to global collaborations that combine traditional patterns with modern technology. Her work explores creative coding, generative art and interactive storytelling, including her innovative children's books and science fiction characters for kids.
01:06
Sobolev, Lebedev, Stas Ay How Simple, Simonyan, Stepanova, Mizulina, Shaman. The main propagandists of 2024 | Navalny LIVE
How Nikolai Sobolev rolled in 2024, how many bottoms Stas Ai Just broke through, why Simonyan was frightened by Assad's overthrow and how Ekaterina Mizulina and Veronika Stepanova opposed Lebedev - summarize the year in the New Year's edition of What They Do Online. A conversation with Apti Alaudinov, the Goida of the Year award, a backstage of Putin's New Year's address and a cameo by Maria Singers - as a gift.
01:58
How to Create Apps and Earn on Marketplace from OpenAI | AI Ukraine
Creating chatbots using artificial intelligence is now available thanks to a marketplace from OpenAI where you can create and sell your own GPTs. Step-by-step guide to creating your own Custom ChatGPT and monetizing the application
02:16
Tips from Nadiyno.org: why you should be skeptical of attractive online offers
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
02:21
Memory decline, 'cognitive debt', disappearance of creative agencies? Exploring the consequences of universal AI | Dev.UA
Presenters discuss whether artificial intelligence impairs memory and what "cognitive debt" is. MIT investigated how ChatGPT affects brain function. So here it is: while this tool makes work easier, it simultaneously reduces depth of thought, memory, and creativity.
03:54
Artificial intelligence and propaganda: how to recognize dipfake. Tips from experts | NeVODA
Artificial intelligence has become a powerful tool to create realistic photos, videos and synthesize voice with minimal effort. However, the lack of control over the technology has led to the problem of dipfakes, requiring urgent solutions and an expert approach.
04:20
Eraser. How do I permanently delete files from my computer? | Greenhouse
Normal file deletion does not guarantee data protection, as it can be recovered even after disk formatting. Eraser allows you to safely delete confidential files, set up automatic deletion and clear free space on your hard disk.
04:28
Technology as a tool to unlock the power of people for future self-organization | Access Now
The 10-year experience of global activism platform Change.org. How technology can be a tool to unlock the power of people for their future self-organization.
04:59
Flora AI - 19 neural networks in one service | Greenhouse
Flora AI is a new platform for creating content with artificial intelligence. It brings together text, image, and video models in one place, including ChatGPT-4o mini, Claude 3, Gemini 2.0 Flash, Flux, Stable Diffusion, and more. How Flora AI works, how user-friendly its interface is, what features are available in the free version, and whether it's worth buying a subscription.
05:11
Your vote is fake! Seven ways AI can trick you | How not to become a vegetable
Active users of voice and video messaging on Telegram are becoming an attractive target for scammers using artificial intelligence technology to create convincing deceptions.
05:33
Perplexity - a new competitor of Internet search engines | AI Ukraine
Perplexity is a powerful neural network that makes it easier to find information on the web thanks to artificial intelligence. A complete guide on how to use Perplexity will help you master all the possibilities for efficient data search on the web.
05:45
Tips from Nadiyno.org: what personal information should never be shared online
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
05:49
AI employees are replacing humans. AI trends from global startup founder Anna Stepura | AI Ukraine
How to create and where to integrate employee AI. Evolution of the development of AI Agents. What are the risks of integrating AI into companies? AI Trends from Anna Stepura - a founder of three startups with successful exits and experience in Silicon Valley. Alumna of the leading gas pedals in the US: Alchemist Accelerator, Antler and Menlo VC Fellowship. Former CMO (Chief Marketing Officer), expert in AI marketing, building startups from scratch and strategy consulting.
06:44
Solovyov's path. The Story of Russia's Chief Liar | Navalny LIVE
Vladimir Solovyov. One of the most important propagandists under the Russian government. Was he always like this? Or is there still something positive in his biography? In this video, Alexander Makashenets will look into the history of Vladimir Solovyov and tell how he stole, pissed off the unwanted, praised dictators, fawned before the authorities and professionally incited hatred.
07:41
HTTP or HTTPS - how does it work and what's the difference? | Red Sneakers.
In the video we'll break down the basics of how the internet works and how using the http protocol relates to your online security. We will discuss whether https is really as secure as it is described.
As we break down the specifics, we'll also look at schiffing, a frequent question in digital security interviews.
07:48
How the U.S. Office of Cyberspace and Digital Policy Works | Access Now
U.S. Office of Cyberspace and Digital Policy: how it works, plans to engage and partner with countries and partner companies.
08:17
How do you trace any file? Red Sneakers.
In this video, we will show you how to use Canary Tokens to protect your valuable data. Canary Tokens is a powerful tool to protect and control access to your files.
We will detail how to install Canary Tokens to effectively protect your files from unauthorized access. With this method, you will have complete control over the security of your data by providing invisible protection.
08:21
US vs China. The war of technology: microchips, AI development, the battle for resources and brains. Episode 2 | NeVoda
Today, we continue to look at how the US and China are competing for leadership in AI; why microchips from Taiwan have become a strategic weapon; and how the struggle for resources is going on from Africa to the Arctic.
08:42
Foreign bloggers praise Russia. Who pays them? | Important Stories
Foreign bloggers criticize the West and entice foreigners to move to Russia to enjoy its "traditional values". They call themselves independent, but as "Important Stories" found out, RT (formerly Russia Today) is responsible for this propaganda for export.
08:54
Tips from Nadiyno.org: how regularly you should check your financial accounts
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
08:56
Viktor Zhora: the flywheel of cyberwar against Ukraine is just spinning. Results of 2024 | eQtalk
eQtalk is an original project of eQtv TV channel. Oleksandr Glushchenko's guest is Viktor Zhora, one of Ukraine's leading cyber security specialists. The topic of the conversation is russia's cyber warfare against Ukraine. Who is involved?
10:13
Sevgil Musaeva on the struggle of Ukrainian journalism against Russian occupiers | Access Now
Work of Ukrainian journalism in the conditions of Russia's war against Ukraine. The case of "Ukrainska Pravda"
10:46
What is phishing and how do you protect yourself from it? | Red Sneakers.
Today, let's talk about what phishing is and why this form of cyberattack is so dangerous to your online security. Let's uncover how phishing attacks and social engineering work and how you can protect yourself from them.
Phishing is a clever fraud method where attackers resort to spoofing emails or websites to obtain your personal information.
10:55
FSB. Durov. Kremlin. How VK was destroyed | Navalny LIVE
In 2006, the Durov brothers created VKontakte, the country's main social network. Rapid growth, the first million users, and the London Stock Exchange. Everything ended as quickly as it began, and in late 2013, the social network was taken away from Durov. Since then, VKontakte has become the favorite social network of law enforcers, was nicknamed "FSB's dump" and caused hundreds of criminal cases. Alexander Makashenets tells how VKontakte was going downhill.
11:37
Everything you need to know about QR codes | Red Sneakers
QR codes have become an integral part of our digital lives, but do you know all their capabilities and risks?
11:44
Beware of scammers: phishing, identity theft, crypto | NeVODA
Internet fraud covers a wide range of threats, from phishing and cryptocurrency schemes to sextortion and AI abuse. Knowing how to protect yourself becomes a key tool for staying safe in the digital world.
12:23
Social media misinformation and its impact on political violence | Access Now
Ilon Musk's influence on Twitter's policies, rejection of moderators and content moderation. And what consequences the policy of curtailing freedom of speech has led to.
12:57
"If we don't give away our users, we will be shut down". A conversation about Telegram, the FSB and the state defense order | Important Stories
The main character in the "Important Stories" investigation into Telegram's connection with the FSB is Vladimir Vedeneev, a man who held the position of CFO in the messenger, had the right to sign documents on behalf of Pavel Durov and yet remained in the shadows the whole time.
13:24
Tips from Nadiyno.org: how to check if a site is safe for entering sensitive, personal and financial data
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
13:27
General Oleksandr Potiy, State Spetsvyaz Ukrainy: Protecting the cyber perimeter of Ukraine and Europe in turbulent conditions | eQtalk
eQtalk is an original project of eQtv TV channel. The guest of Oleksandr Glushchenko is Brigadier General, head of the Service of Special Communication and Information Protection of Ukraine - Potiy Oleksandr. The topic of the conversation is the work of the Service in the conditions of Russia's military aggression against Ukraine and new challenges in cyberspace.
15:17
How is Telegram connected to the FSB? What does this mean for you personally? | Important stories
People in Russia, Ukraine, the United States, India, and many other countries around the world trust it with their secrets. Terrorists use it to plan attacks, and Russian security services recruit agents for sabotage abroad. One of the main reasons why hundreds of millions of people around the world trust Telegram is the image created by Pavel Durov as an unwavering freedom fighter, standing up for users' privacy and being persecuted by the authorities of Russia and other countries because of it.
15:42
How does Google know what you're looking for? | Red Sneakers.
In this video, we will understand why the first links in a Google search query may not look the same as they used to. We'll reveal the secrets and important changes that have taken place in the SEO world and how they affect search results. We'll break down the components of the SEO process, revealing how optimizing a website helps it rise in the search results.
15:48
Alternative Uses of Artificial Intelligence | Access Now
An alternative vision for the development and use of artificial intelligence and the work of the Distributed Artificial Intelligence Research Institute (DAIR) in materializing that vision.
16:23
How do you find almost everything on Darknet? | Red Sneakers
From the video you will learn what the Darknet is and how this part of the Internet differs from the usual one. We will dive into the mysterious world of anonymous forums and trading sites indexed only by special search engines.
We will also open the curtain and tell you how tor works and how this technology helps to ensure your privacy when browsing resources on the Darknet.
16:33
US vs China. The war of technology: microchips, AI development, and the battle for resources. Episode 1 | NeVoda
Today, we'll look at how the US and China are competing for leadership in AI; why microchips from Taiwan have become a strategic weapon; and how the struggle for resources is going on from Africa to the Arctic.
16:50
Qwen AI, Hailuo AI, Kling AI. Testing Chinese neural networks | Greenhouse
We test three popular Chinese neural networks: Qwen, Hailuo and Kling AI, check their capabilities, learn the pros and cons.
How good is Qwen 2.5 MAX and is it really free? How Hailuo works - generating videos and images based on text and photos. How Kling AI can generate images.
20:01
Why don't Google's first links always work? | Red Sneakers.
What is SEO and how does it affect the positioning of your pages in search engines? Let's uncover the secrets of Search Engine Optimization and why sometimes the first search results may not match your expectations.
What about Google Ads and Google's ads? Let's find out how ad campaigns affect your website positions and why sometimes advertising can be more effective than SEO.
20:07
Drones, robots, artificial intelligence: How will the professions of the future change? | NeVODA
Advances in artificial intelligence and automation are jeopardizing traditional professions while creating promising new fields. Future specialties such as astro-miner and genetic stylist open doors to a world of technology that requires adaptation and learning new skills.
20:45
What's new on the Dark Web? Red Sneakers.
The Darknet is constantly changing, and today we take a look at the latest resources, interesting sites, and important changes in the world of the anonymous network. Find out what services and platforms have become popular, what happened to famous onion sites such as Tor66, and what trends are currently happening on the Darknet.
20:53
What is propagandist Diana Panchenko doing online? | Navalny LIVE
"What they do online" - a show about propagandists, who they are, where they came from, and what they do. The heroine of the issue is a Ukrainian journalist who met the beginning of the war in Kiev. What?! The answer is very simple: Diana Panchenko worked as a journalist only until 2015. After that, she chose the path of a propagandist on NewsONE - the unofficial TV channel of Putin's cousin Viktor Medvedchuk. And her rhetoric is correspondingly pro-Putin. Sasha Makashenets understands the vicissitudes of the propaganda that the Russian authorities broadcast to the Ukrainian audience.
21:27
Roskomnadzor's secret documents: who and how Russians are spied on online | Important Stories
Vladimir Putin's illnesses, the Russian army's crimes in Ukraine, criticism of the Kremlin - all these topics are taboo in Russia. Thousands of people follow Russians on the Internet every day, looking for so-called "points of information tension" and compiling reports for law enforcement officials and the authorities. These denunciations become the basis for recognizing people and organizations as "foreign agents," as well as for bringing cases of "fakes" and discrediting the armed forces. The journalists of "Important Stories" found out who works for the government's censorship on the web, how they block the truth about the war and how much they are paid for it.
21:45
Protecting digital democracy and a rights-based future | Access Now
While governments, multilateral institutions, civil society and the private sector continue to work towards more democratic governance of technology, digital authoritarianism is rapidly gaining momentum, offering competing models of governance.
22:18
Tips from Nadiyno.org: How antivirus helps protect your devices and data from threats
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
22:22
How to choose the best AI plan and create your own digital avatar | Dev.UA
Discusses the latest trends in artificial intelligence. Presenters demonstrate the functionality of a digital avatar capable of real-time interactive communication and analyze concepts for creating AI agents.
18 October 2025
00:01
Creating a ChatGPT-based chatbot to communicate with books | AI Ukraine
ChatGPT opens up new possibilities for working with books by allowing you to create a chatbot to interact with the text. This innovative format for interacting with literature allows you to read books in dialog mode, receiving instant answers and explanations
00:14
Open AI.fm - a ChatGPT-based voice transcription model | Greenhouse
OpenAI.fm is a new voice model from OpenAI based on ChatGPT , offering 11 voices, including mood and emotion by voice. The service offers support for more than 100 languages.
00:22
Amateur investigators on their findings in Syria, Lebanon and Israel | Tactical Tech
Amateur investigators describe their methods and experiences in investigating three topics: where weapons are coming from in Syria; how urban land grabs are taking place in Beirut; and how amateur aerial photography can expose and question the balance of power in Jerusalem.
00:54
Qwen AI, Hailuo AI, Kling AI. Testing Chinese neural networks | Greenhouse
We test three popular Chinese neural networks: Qwen, Hailuo and Kling AI, check their capabilities, learn the pros and cons.
How good is Qwen 2.5 MAX and is it really free? How Hailuo works - generating videos and images based on text and photos. How Kling AI can generate images.
01:05
Speculators and esotericists in Ukrainian YouTube | How not to become a vegetable
How Ukrainian esoteric and informational YouTube channels use clickbait and dubious experts to attract an audience, manipulating emotions and spreading misinformation. Special attention is paid to the topic of a possible repeated offensive by Belarus.
01:23
How to prevent internet outages and splintering | Access Now
Presentation of OHCHR report on Internet outages at the UN Human Rights Council: what to do for users at risk and what UN recommendations activists can apply in the event of a shutdown
01:58
Changes in laws related to the brain-computer interface | Protocol Labs
Lawyer Alex Fierst spent two years as General Counsel at Neuralink and currently represents leading BCI companies such as Science.xyz. In this LabWeek Field Building talk, Fierst explores the complex world of brain-computer interfaces (BCIs), offering a unique perspective on the legal landscape of this technology.
02:27
Tips from Nadiyno.org: How users should check suspicious links and addresses
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
02:38
Oksana Moroz, "How Not to Become a Vegetable": The Impact of Russian Propaganda and Information Campaigns on Ukrainian Residents | eQtalk
eQtalk is an original project of eQtv TV channel. The guest of the issue is Oksana Moroz, author and presenter of the YouTube channel "How not to become a vegetable?".
The topic of conversation - IPSO, fakes, disinformation and their impact on Ukrainian society. What tools are used by intelligence services to influence Ukrainians on the Internet? The role of artificial intelligence services in disinformation
04:37
Putin's favorite propagandist. How Dmitry Kiselyov lives | Navalny LIVE
Today Dmitry Kiselyov is the face of Kremlin propaganda, but in the nineties he stood for freedom of speech and independent journalism. He once said that a journalist's task was "to show the whole picture of the world," but today he broadcasts Putin's methodology and threatens that very world with radioactive ash. Alexander Makashenets tells us in detail how Dmitry Kiselyov's career was built.
05:14
How does Google know what you're looking for? | Red Sneakers.
In this video, we will understand why the first links in a Google search query may not look the same as they used to. We'll reveal the secrets and important changes that have taken place in the SEO world and how they affect search results. We'll break down the components of the SEO process, revealing how optimizing a website helps it rise in the search results.
05:21
Real use cases of Perplexity Comet browser | AI Ukraine
Real cases of using AI-browser Perplexity Comet. Instructions on how to get access to the browser in Ukraine.
06:00
Delta Chat. A private messenger that is safe from blocking? | Hothouse
Delta Chat is a decentralized messenger powered by email, making it blockchain-resistant. A detailed account of the messenger's features, including end-to-end encryption, multi-platform support, group chats, and experimental video calls.
06:08
The most honest review of MAX messenger | FIRST REVIEW
In this video "First Department" deals with how safe the messenger MAX. We find out how transparent it is and what the user risks when using it. Whether MAX can be trusted from the point of view of theoretical security, and we compare its approach with other messengers.
06:30
How to recognize fakes. Intro | How to read media
How many times have you heard about the 25th frame effect? Or that you can't get your mantoux wet? Or that water has a memory? They're all fakes. How do they come about? How do you debunk them? What algorithms exist? Ilya Ber, expert trainer of "How to Read the Media?", tells us about it.
06:37
How hackers are making millions from subscriptions | FIRST OFFICE
Today, cyberattacks can be bought literally by subscription. Ransomware is distributed through the RaaS model - Ransomware-as-a-Service. Hackers write a service and others pay to use it, as if it were Spotify or Netflix. As a result, the number of attacks is growing, and even those who think no one cares about their data are vulnerable. We tell you how the shadow economy turns someone else's grief into profit and explain how not to become a victim of cyber racketeering.
06:59
Tips from Nadiyno.org: how to recognize scammers on the Internet
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
07:06
Phil Kulin, Esher II A+ Project Coordinator: blockchain philosophy is a slippery slope between good and censorship | eQtalk
eQtalk is an original project of eQtv TV channel. Phil Kulin, coordinator of the Escher II A+ project, is a guest of Alexander Glushchenko. The topic of the dialog is the philosophy of blocking in the Internet. Finding the edge where the blocking of forbidden, harmful and law-breaking content turns into censorship and dictatorship
08:36
An army of propagandists. How war correspondents are at war with Ukraine and among themselves | Navalny LIVE
The Telegram army of Russian z-channels is hundreds of bloggers with different views and internal conflicts. They cover the war, raise (and steal) money, advertise everything, and periodically quarrel among themselves. Some support the authorities unconditionally, others allow themselves to criticize, but still do not go beyond the limits. Dmitry Nizovtsev explains how this network is organized and where z-channels get their money and influence.
09:10
Everything you need to know about Google Advanced Search | Red Sneakers
In this video, we'll go over everything you need to know about advanced Google search, including powerful Google Dorking and Google Hacking techniques. These techniques help you find information hidden from regular users and can greatly improve your search skills. We'll go into detail about the most popular Google Dorks such as site:, intitle:, inurl:, filetype:, which allow you to narrow your search results and find exactly the information you're looking for.
09:20
Blocking calls in WhatsApp and Telegram: Causes, consequences and solutions | FIRST OFFICE
Calls to WhatsApp and Telegram have stopped working in Russia. The authorities justify this as "security measures", but in reality it is a complete restriction of one of the key functions of messengers. In the video we look at why calls are blocked, how exactly this measure is technically organized, what consequences ordinary users are already feeling, and what are the ways to stay in touch despite the new bans.
09:39
All the secrets that hide your photos: tricks with EXIF and steganography | Red Sneakers
We will reveal and analyze possible problems related to the use of QR codes and give practical advice on how to avoid them. We will discuss an important aspect - cybersecurity when using QR codes and how to protect yourself from potential threats. We will delve into the universe of QR codes, consider the areas of their use, and highlight possible problems. We will learn how to send an email conveniently and quickly using a QR code. We will learn how to easily and securely exchange data for Wi-Fi access using a QR code."
09:50
How do you make AI reliable? Protocol Labs.
Evan Miyazono, founder of the nonprofit organization Atlas Computing, tackles the pressing issue of AI capabilities outpacing human review. In this insightful talk, Miyazono explores the separation of AI capability problems from the fear of super-intelligent AI or unbalanced power dynamics among AI users. He explains the limitations of current AI review mechanisms and proposes a future in which review processes are robust and scalable.
10:16
How hackers set off a global cyberwar | FIRST OFFICE
North Korean hackers steal billions via SWIFT and crypto. Chinese hackers attack big pharma and steal vaccine development. Russian ones break elections and energy systems. The American and Israeli respond with their own digital special operations. From Lazarus to Fancy Bear, from the NSA to Israel's Unit 8200, this video shows you what the reality of cyber warfare looks like, who is waging it, and for what purpose.
10:42
Top 5 neural networks for photos and videos. Higgsfield, Krea, Nano-Banana, Hedra Runway and others | AI Ukraine
Top 5 neural networks for photo and video generation. Higgsfield, Krea, Nano-Banana, Hedra Runway and others. Instructions for creating UGC content and your own avatar.
11:06
Tips from Nadiyno.org: How users should check suspicious links and addresses
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
11:17
Questions and answers from the VPN Generator team. September 2025 | Internet Society
Mikhail Klimarev answers frequently asked questions from users of the free VPN Generator service.
12:06
How to recognize fake quotes. False quotes | How to read the media
How to use quotations in writing and speaking, and why is it important to check their authenticity? Ilya Ber, expert trainer of "How to Read Media?", tells us about it.
12:26
One of these 7 password managers is a trap for your data | Red Sneakers
Password managers are not just a fad, but a real shield for your online accounts. In this video we'll look at why you should stop memorizing passwords and switch to modern password managers. You'll learn how these managers store your passwords in encrypted form, generate super complex combinations, autofill logins and passwords on websites, and even warn you about broken accounts. The video will help you choose the best service, taking into account security, functionality and convenience.
12:37
Venny Ala-Siurua, Women on Web: How nonprofits can protect themselves from cyberattacks and blockades | eQtalk
eQtalk is an original project of eQtv TV channel. Special issue with Leonid Yuldashev, eQualitie project coordinator.
Venny Ala-Siurua, Executive Director of the non-profit organization Women on Web shares her experience in protecting NGOs from cyberattacks and blocking. Digital tools to counter cyber threats, practical methods of protection and strategies to ensure the security of non-profit projects in the digital environment.
13:10
Manus AI. The first autonomous AI agent that works for you | Greenhouse
Manus AI is a revolutionary AI agent from China coming in March 2025 and is already being called the "killer OpenAI Operator".
13:19
The Art of World Creation: The Little Martians Project | Protocol Labs
Vanessa Rosa, a pioneer of street art and laser cutting, talks about her journey from grassroots projects to global collaborations combining traditional patterns with contemporary technology. Her work explores creative coding, generative art and interactive storytelling, including her innovative children's books and science fiction characters for kids.
13:50
Liar-in-Chief. How Alexei Gromov directs propaganda in Russia | Navalny LIVE
Alexei Gromov, deputy head of the presidential administration, has been in power for almost 30 years. His responsibilities include overseeing the Russian media: he is in charge of all federal TV channels, news agencies, radio stations and print media. Who is Alexei Gromov? Why does he shy away from publicity, how does he share power with other Russian censors, and what does the media management system in Russia look like in general?
14:23
Complete internet shutdown. What do I do? | FIRST DIVISION
You use the internet every day - but what happens when the authorities pull the switch and it's gone? It's called a "shutdown", and today we'll look at where and how often the internet is shut down, why - and what to expect from such a situation.
14:40
Tips from Nadiyno.org: what personal information should never be shared online
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
14:44
All about passive brain-computer interfaces | Protocol Labs
Torsten O. Zander, founder and CEO of Zander Labs, takes a deep dive into the pioneering world of passive brain-computer interfaces (BCIs). Zander explores how passive BCIs are revolutionizing human-computer interaction beyond traditional methods. He covers the underlying concepts, direct control through BCIs, and delves into the transformative potential of passive BCIs. Learn how these interfaces can replace manual input, adapt to user states, and improve machine understanding of human intent.
16:24
What is propagandist Vyacheslav Manucharov doing online? | Navalny LIVE
"What they do on the network" - a show about propagandists, who they are, where they came from, and what they do. The hero of the issue is Vyacheslav Manucharov. The host of the channel "Empathy Manuchi" used to dance to Verka Serdyuchka at the parody festival in Odessa, but then plunged headlong into the career of a propagandist. Now he shoots interviews with zetniks, mocks artists who have left the country, rejoices that he happened to live during Putin's "special operation" in Ukraine, and even puts on plays about this war. Sasha Makashenets analyzed all of this krinzhovo-propaganda content.
16:56
Creating an app without code with Emergent AI | Greenhouse
Emergent AI is an "agent-based web coding" platform that allows you to create a finished web application in 30 minutes by simply describing it in words. It supports GPT-5 and Slude. As well as how much it costs, and what limitations the free version has.
17:05
Comparison of neural networks for image generation. Nano banana vs Seedream 4 | AI Ukraine
Nano banana vs Seedream 4. Comparison of neural networks for image generation. Real application cases
17:27
How to get rid of Russian content on the Internet | Red Sneakers
Russian information space is saturated with propaganda, disinformation and harmful narratives. If you don't want to see toxic content, you should think about derusification of the Internet. In this video, we tell you how to configure your devices and services to minimize the influence of Russian propaganda and make your digital world Ukrainian.
17:36
Why do ordinary people need cybersecurity? | FIRST SECTION
Do you want to understand how to protect your data, why, from whom - and whether you should? In this video, we answer six key questions to create a personal security plan based on EFF Surveillance Self-Defense recommendations. And after that, we go over the security tools everyone will need. If you were hesitant before, now you'll know exactly what to do and why.
18:01
Changes in laws related to the brain-computer interface | Protocol Labs
Lawyer Alex Fierst spent two years as General Counsel at Neuralink and currently represents leading BCI companies such as Science.xyz. In this LabWeek Field Building talk, Fierst explores the complex world of brain-computer interfaces (BCIs), offering a unique perspective on the legal landscape of this technology.
18:32
Free Internet in Russia is coming to an end | FIRST DIVISION
The free Internet in Russia is dying right before our eyes. Once one of the freest segments of the global network, Runet has now turned into a closed ecosystem under the full control of the state. The war has only made things worse: mass shutdowns have become part of everyday life. In this video, we explain how and why the authorities use daily internet shutdowns, and why the era of the free network may end sooner than we think.
18:53
Tips from Nadiyno.org: How users can protect themselves from phishing attacks
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
18:55
Phil Kulin, Esher II A+ Project Coordinator: How Russia is Blocking the Free Internet | eQtalk
eQtalk is an original project of eQtv TV channel. Alexander Glushchenko's guest is Phil Kulin, coordinator of the Escher II A+ project. The topic of the dialog is the blocking of free internet in Russia, how does it work from the technical side? How the "sovereign internet" was born and implemented, and the struggle for freedom on the net
21:21
Save as .torrent. How learned to share the most interesting things online, without registration | Launch Tomorrow
BitTorrent allows files to be downloaded directly between users without a single server. This technology changed digital culture, brought success to its creator, and irritated Hollywood.
22:17
4 alternatives to ChatGPT: HuggingChat, Le Chat (Mistral AI), Claude, Grok | Greenhouse
Looking for powerful alternatives to ChatGPT? A breakdown of the top 4 AI tools of 2025 with unique features.
22:31
What is the queen of Putin's propaganda Margarita Simonyan doing online? | Navalny LIVE
"What they do on the network" - a show about propagandists, who they are, where they came from, and what they do. The heroine of the program is Margarita Simonyan. This is the first ever sequel to the program. The choice of the heroine was obvious, because Simonyan is the queen of Putin's propaganda, and generates lies and cringe every time she writes a post or opens her mouth. Sasha Makashenets tells us how Simonyan reacted to the blocking of her media accounts on social networks, what she thinks about working for the Kremlin, and what will happen to people like her when Putin is finished.
22:57
Veo 2 from Google AI Studio. Video generation test and comparison with Kling, Minimax and Runway | Greenhouse
Google AI Studio is a free platform for developers to experiment with generative AI, including the Veo 2 model. We test video generation with Veo 2, parse the settings and compare the results with other neural networks: Kling 1.6, Minimax and Runway.
23:04
How to recognize fakes. hoaxes | How to read the media
What media products are related to hoaxes and what are the goals of fabricating materials? Ilya Ber, expert trainer of "How to Read Media?", tells us about it.
23:20
MONA and the open meta-universe | Protocol Labs
Justin Melillo, founder and CEO of MONA, presents an exciting vision for the future of virtual worlds, describing the ways in which MONA is creating tools and protocols to facilitate the growth of an open, interoperable meta-universe. Melillo emphasizes the need for open systems instead of closed platforms and explains how MONA ensures true asset ownership and protects digital human rights.
23:30
Who is behind propaganda in the occupied territories? The story of propagandist Aleksandr Malkevich | Navalny LIVE
If one were to compile a shit-parade of the most disgusting Russian propagandists, Alexander Malkevich's name is unlikely to appear even in the top twenty. Despite his constant participation in talk shows, active social networking, outright false statements and public threats, as well as attempts to influence the American elections, Malkevich is little known to a wide audience. However, he is the man behind the creation of a network of propaganda channels in the captured territories of Ukraine. He is also a candidate for the St. Petersburg City Council, for whose information the United States has announced a $10 million reward.
23:53
Tips from Nadiyno.org: how to recognize dangerous attachments in emails and protect yourself
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
23:56
Oleksandr Fedienko, Deputy of the Verkhovna Rada of Ukraine: changes in cybersecurity legislation | eQtalk
eQtalk is an original project of eQtv TV channel. The guest is Oleksandr Fedienko, a member of the Verkhovna Rada of Ukraine. We talk about lawmaking in the field of cybersecurity, cyber perimeter protection and the state's view of the industry.
19 October 2025
01:29
How to recognize fakes. False experts and pseudoscience | How to read the media
Fakes and pseudoscientific myths: how do they take root in our consciousness, and who is behind it? Ilya Ber, expert trainer of "How to Read Media?", tells us about it.
01:47
Chrome is no longer in fashion? Here are the top 10 more interesting options! | Red Sneakers
Google Chrome holds 66% of the browser market, but should you trust it? In this video, we reveal the truth about data tracking, new extension restrictions via Manifest V3, and the risks of even going incognito. Chrome is making money off you - it's time to look at alternatives. In this video, we explore which browsers really don't track your activity, how modern ad blocking, trackers and analytics work, and why it's important to protect your personal data.
02:02
Robots. What we've been able to teach them over the last 100 years | Launch Tomorrow
How robots have evolved from heavy 18th century automatons to today's intelligent and empathic machines capable of working on assembly lines, in warehouses, and even communicating with humans, approaching human-like qualities.
02:56
What's new on the Dark Web? Red Sneakers.
The Darknet is constantly changing, and today we take a look at the latest resources, interesting sites, and important changes in the world of the anonymous network. Find out what services and platforms have become popular, what happened to famous onion sites such as Tor66, and what trends are currently happening on the Darknet.
03:05
Camouflage show. How propaganda makes a holiday out of war | Navalny LIVE
Entertainment television no longer entertains - it mobilizes. Today, war is confidently marching through the studios, and patriotism is becoming a universal script: equally suitable for talk shows, music competitions, and reality shows about early pregnancy. In "Field of Miracles" Yakubovich is given drones, in "Let's Get Married" brides compete for a man with a combat record and benefits. In "Male / Female" - a drama: relatives share coffins and find out the relationship. And in "Pregnant at 16" - special issues: dad - in the trench, mom - in maternity leave, the child - a symbol of the new Russia.
03:41
China is erasing the memory of itself and us. What happened in Tiananmen Square? | FIRST SECTION
The 1989 shooting of protesters in Tiananmen Square is one of the most famous events in modern Chinese history... in the West. In China itself, the memory of it has been erased by several decades of censors. How did they manage it? And why did Chinese censorship begin to seep into the Western information field?
04:03
Roskomnadzor's secret documents: who and how Russians are spied on online | Important Stories
Vladimir Putin's illnesses, the Russian army's crimes in Ukraine, criticism of the Kremlin - all these topics are taboo in Russia. Thousands of people follow Russians on the Internet every day, looking for so-called "points of information tension" and compiling reports for law enforcement officials and the authorities. These denunciations become the basis for recognizing people and organizations as "foreign agents," as well as for bringing cases of "fakes" and discrediting the armed forces. The journalists of "Important Stories" found out who works for the government's censorship on the web, how they block the truth about the war and how much they are paid for it.
04:19
Tips from Nadiyno.org: how to check if a site is safe for entering sensitive, personal and financial data
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
04:22
Michael Patsan, Learn to Earn Global: Artificial Intelligence and the Dark Side of Cybersecurity | eQtalk
eQtalk is an original project of eQtv TV channel. Oleksandr Glushchenko's guest is one of the leading Ukrainian specialists in the field of artificial intelligence, Mikhail Patsan. The topic of the dialog is the dark side of neural networks and AI services, how fraudsters and cybercriminals use them against us
06:45
What is propagandist Tigran Keosayan doing online? | Navalny LIVE
"What They Do on the Net" - a show about propagandists, who they are, where they came from, and what they do. The hero of today's episode is Tigran Keosayan. The husband of the main propagandist of Russia, who made the movie "Crimean Bridge" and hundreds of editions of the thrash-show "International Sawmill", is famous for unconcealed xenophobia, and, of course, the boundless love of money and corrupt multi-tracks. Sasha Makashenets talks about films, programs, texts and other propaganda products of Tigran Keosayan.
07:15
How to create your own Outline VPN server in 5 minutes | Greenhouse
How to create a private VPN server in 10 minutes with Google Jigsaw's free and open source Outline project - full control, high speed and state-of-the-art Shadowsocks encryption. How to choose a VPS provider, install Outline Manager and Client, and configure and manage your server.
07:24
How to recognize fakes. Photo and video fakes | How to read media
With the spread of social networks and the emergence of special programs for photo and video processing, a large amount of visual misleading information began to appear. Fake photos can be made fake by the context. Ilya Ber, expert trainer of "How to Read Media?", tells us how to recognize photo and video fakes.
07:46
Top DNS that will make your Internet cleaner and safer | Red Sneakers
Want a faster, safer and cleaner Internet without annoying ads and threats? In this video we show you the top DNS that will make your Internet cleaner and safer. We take a detailed look at the best free filtering DNS services that automatically block malicious sites, trackers and ads at the request stage.
07:55
TO JAIL FOR A GPS TRACKER?! Learning about spy gadgets | FIRST DIVISION
Did you know that the Russian law enforcement agencies can get you in trouble for an ordinary GPS tracker or baby monitor? Today we will tell you which devices are considered "spy" according to the letter and spirit of Russian law.
08:11
What is fraudulent Putinist Anatoly Shariy doing online? | Navalny LIVE
"What they do online" - a show about propagandists, who they are, where they came from, and what they do. The hero of the issue is blogger Anatoly Shariy. In one of the recent episodes of "What They Do Online" we talked about a pro-Russian propagandist of Ukrainian origin, Diana Panchenko. This time we will talk about her male and more scandalous version - blogger Anatoly Shariy. In this issue, Sasha Makashenets will talk about Shariy's repeated re-branding, his ideas about good and evil, unfulfilled forecasts and fakes about dogs.
08:34
Foreign bloggers praise Russia. Who pays them? | Important Stories
Foreign bloggers criticize the West and entice foreigners to move to Russia to enjoy its "traditional values". They call themselves independent, but as "Important Stories" found out, RT (formerly Russia Today) is responsible for this propaganda for export.
08:44
Tips from Nadiyno.org: How antivirus helps protect your devices and data from threats
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
08:48
Chronicle of Kiev's pre-internet era. Reloading memories with Alexander Fedienko | Retro Techno
Retro Techno is the author's project of Alexander Glushchenko. Together with the guests, Alexander reboots memories and nostalgia about the first computers, games, software, shares emotions from the acquaintance with movies, music, games, technology, familiarity with the Internet.
10:21
Introduction to IPFS and Filecoin and how they are shaping the future of Web3 | Protocol Labs
Konstantin Tkachuk presents IPFS and Filecoin and how they are accelerating the transition to Web3, a version of the web where ownership and control are more decentralized and distributed than today. You'll learn about the core concepts of the technologies, their potential in a web3 context, and the usable tools and applications that already exist.
The Interplanetary File System (IPFS) is a peer-to-peer network and protocol designed to make the web faster, more secure, and more open.
11:11
Google released a better voice generator? | Hothouse.
Google AI Studio introduces a new voice generator based on Gemini models, allowing you to create both monologues and dialogs with emotional coloring. Overview and details about the functionality, features and current limitations of the free version.
11:21
Longevity Roadmaps | Protocol Labs
Mark Hamalainen, a seasoned biotech expert and leader of the Longevity Biotech Fellowship, describes a comprehensive technical roadmap to fully address the problem of aging. With experience at the California Institute of Technology, Cambridge, and various biotech startups, Hamalainen is dedicated to developing technologies to achieve unlimited lifespan
12:16
Not ChatGPT alone: Top AI tools you should try | Red Sneakers
AI tools are becoming more powerful, and 2025 brings even more smart services for work, creativity and development. In this video, we take a look at the top AI tools worth trying in 2025 to automate processes, improve productivity, and use artificial intelligence to its fullest potential.
12:29
How China is spying on users around the world | FIRST OFFICE
"China's Big Brother" is spying on people not only in China, but also outside China. How Chinese apps leak information about their users to the Chinese Communist Party.
12:46
How is Telegram connected to the FSB? What does this mean for you personally? | Important stories
People in Russia, Ukraine, the United States, India, and many other countries around the world trust it with their secrets. Terrorists use it to plan attacks, and Russian security services recruit agents for sabotage abroad. One of the main reasons why hundreds of millions of people around the world trust Telegram is the image created by Pavel Durov as an unwavering freedom fighter, standing up for users' privacy and being persecuted by the authorities of Russia and other countries because of it.
13:09
Tips from Nadiyno.org: why you should be skeptical of attractive online offers
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
13:14
Pavel Belousov, Nadiyno.org: How to protect yourself and your loved ones from hacking - practical cases | eQtalk
eQtalk is an original project of eQtv TV channel. The guest of the episode is Pavel Belousov, a leading cybersecurity specialist of the Digital Assistance Hotline Nadiyno.org. The topic of conversation - cyber threats to citizens of Ukraine in conditions of military aggression. What tools do fraudsters use to reach Ukrainians? What role does artificial intelligence play in the processes of cyberattacks and cyber defense?
15:30
Neurotech and WBE: basic principles and next steps | Protocol Labs
Mark Melnikovich, a developer of brain-computer interfaces, presents his approach to building basic brain emulation systems using wearable EEG sensors, large language models, and continuous collection of brain activity data. He demonstrates practical applications ranging from personalized music recommendations based on cognitive load, to focus and stress monitoring, to creating personal AI agents that understand the user through integration of neurodata with the context of daily activities.
16:24
Scira AI. Free open source AI search engine | Greenhouse
Scira AI is a free open source AI search engine with no registration. It supports GPT-4o, Claude, Grok, Llama, Gemini and other models. 7 search modes are available, including Reddit, YouTube, scientific articles, code, and image analysis, as well as a Buddy feature to save context between sessions.
16:32
How to recognize fakes. Conspiracy theories | How to read the media
In a world of free access to information, we continue to encounter conspiracy theories. Ilya Ber, expert trainer of "How to Read Media?", talks about the reasons why conspiracy theories are plausible and how to test them.
16:49
Nextcloud. Secure data storage in the cloud | Teplitsa
An overview of Nextcloud - an open platform for creating personal cloud storage. How it differs from commercial services, how to create an account, use built-in features and organize collaboration with full control over your data.
16:58
FSB. Durov. Kremlin. How VK was destroyed | Navalny LIVE
In 2006, the Durov brothers created VKontakte, the country's main social network. Rapid growth, the first million users, and the London Stock Exchange. Everything ended as quickly as it began, and in late 2013, the social network was taken away from Durov. Since then, VKontakte has become the favorite social network of law enforcers, was nicknamed "FSB's dump" and caused hundreds of criminal cases. Alexander Makashenets tells how VKontakte was going downhill.
17:41
Why AI needs decentralized data | Protocol Labs
Clara Cao, founder and director of the Filecoin Foundation, gives a compelling talk on the huge potential of combining AI with decentralized storage. Addressing the pressing challenges of centralization, Cao describes how Filecoin is fighting the dominance of a few tech giants over global data. Decentralized storage provides data transparency, trust, and accessibility.
17:57
"If we don't give away our users, we will be shut down". A conversation about Telegram, the FSB and the state defense order | Important Stories
The main character in the "Important Stories" investigation into Telegram's connection with the FSB is Vladimir Vedeneev, a man who held the position of CFO in the messenger, had the right to sign documents on behalf of Pavel Durov and yet remained in the shadows the whole time.
18:25
Tips from Nadiyno.org: how regularly you should check your financial accounts
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
18:28
Brain stimulation and simulation technologies | Protocol Labs
Ed Boyden, distinguished professor at MIT and director of the Synthetic Neurobiology Group, explores groundbreaking technologies in brain imaging and control. Boyden discusses the convergence of decades of research, revealing the intricate complexity of brain circuitry and the philosophical quest to understand human existence.
19:26
What is the main talking head of propaganda Ekaterina Andreeva doing online? | Navalny LIVE
"What they do online" - a show about propagandists, who they are, where they came from, and what they do. The heroine of the issue is Ekaterina Andreeva. Even Vladimir Putin appeared on television screens not so long ago, as the heroine of today's episode of "What they do on the network." Ekaterina Andreeva sat in the chair of a TV presenter in the early 90's and sits there until now, broadcasting into the heads of viewers of the "First Channel" endless propaganda. Sasha Makashenets explains how Andreeva differs from many of Putin's other TV anchors and explores what the views of this "talking head" really are.
19:55
You definitely didn't know that about darknet | Red Sneakers.
The darknet is always shrouded in mystery and many people believe in scary stories about it. In this video, we will look at the top 5 myths about the darknet that make people afraid of this hidden internet. Is it really dominated by criminals? Is it possible to accidentally stumble upon a dangerous site? We will reveal the whole truth!
20:03
Machine consciousness | Protocol Labs
Joshua Bach, a prominent cognitive scientist and AI researcher, explores the essence of artificial intelligence and consciousness. Bach elaborates on the history and philosophical foundations of AI, tracing its roots from Aristotle to modern deep learning. He discusses current challenges and limitations in machine learning, especially in achieving human understanding and consciousness.
21:07
Don't update your devices until you watch this video | Red Sneakers
Is it worth updating the system at once or is it better to wait? What bugs and crashes can occur after an update? Why OS and program updates often cause more problems than improvements? In this video we will consider the problems with Windows, Mac, smartphone and program updates, which critical bugs recently bother users and how to avoid crashes after updates. We'll also share useful links to official resources where you can keep an eye on the stability of updates.
21:14
Discussing Microsoft, Google, Mistral, OpenAI and Meta neural networks | Launching Tomorrow
The AI market has long gone beyond ChatGPT alone. Microsoft, Google, Meta, Apple, Mistral, and even Ilon Musk are developing their own models. This episode provides an overview of the key players, approaches to creating neural networks, and possible directions for the next technological breakthrough.
22:36
Propaganda veteran. The Story of Vladimir Pozner | Navalny LIVE
Vladimir Pozner's role in the Russian infospace has been controversial for many years: some call him a propagandist, others actively defend him. Who is Pozner really? What role does he play in Russian propaganda? What is the secret of his vitality on TV?
Dmitry Nizovtsev looked into the personality and career of Vladimir Pozner.
23:12
Tips from Nadiyno.org: if you found a flash drive or memory card on the street
Useful recommendations from the Nadiyno.org digital help hotline. Pavel Belousov, the Line's technical leader, answers topical questions about the dangers of the Internet for ordinary users.
23:15
Where does news come from? Discussed by Andrei Zakharov and Lev Gershenzon | The Voice
How does news appear in your news feed? From what sources do Russians draw their information and which media outlets are most trusted? How does the state propaganda machine work, and do opposition media outlets have a bias and tendentiousness?
20 October 2025
00:45
Not ChatGPT alone: Top AI tools you should try | Red Sneakers
AI tools are becoming more powerful, and 2025 brings even more smart services for work, creativity and development. In this video, we take a look at the top AI tools worth trying in 2025 to automate processes, improve productivity, and use artificial intelligence to its fullest potential.
00:56
Creating Prompts and Testing Generative AI (Practice) | Pollicy
Rashid and Arthur Kakande present a hands-on workshop on Prompt Engineering and Adversarial Testing for Large Language Models (LLMs) using the Groq platform. It demonstrates how to effectively manage LLM behavior using various prompting techniques and how to identify and prevent vulnerabilities, creating more robust and secure LLM-based applications.
01:41
What's new on the Dark Web? Red Sneakers.
The Darknet is constantly changing, and today we take a look at the latest resources, interesting sites, and important changes in the world of the anonymous network. Find out what services and platforms have become popular, what happened to famous onion sites such as Tor66, and what trends are currently happening on the Darknet.
01:47
How hackers are making millions from subscriptions | FIRST OFFICE
Today, cyberattacks can be bought literally by subscription. Ransomware is distributed through the RaaS model - Ransomware-as-a-Service. Hackers write a service and others pay to use it, as if it were Spotify or Netflix. As a result, the number of attacks is growing, and even those who think no one cares about their data are vulnerable. We tell you how the shadow economy turns someone else's grief into profit and explain how not to become a victim of cyber racketeering.
02:08
Pavel Belousov, Nadiyno.org: How to increase the security of your cyber-perimeter? | Nadiyno
Pavel Belousov, a technician of the Nadiyno.org digital help hotline, will tell Internet users how to protect their gadgets from hacking and give recommendations on how to build a safe digital space for your home or office.