20 August 2025

01:08
TinyWow - free online tools for a huge range of tasks | Greenhouse
TinyWow is an online platform that provides free tools for working with different types of files. It requires no installation - all operations are performed directly in the browser. Free access to all tools
01:13
Bot Through. See hidden manipulations | Hothouse
The Naskvizh bot was created by a community of artificial intelligence experts who study propaganda and counter propaganda, with the support of the Social Technologies Greenhouse. Volunteers trained a language model to detect emotional manipulation in texts, and created a bot to communicate with this model
01:17
Secret archives of the intelligence services, Section One.
The Russian state does not like to explain why it persecutes this or that person. What was journalist Ivan Safronov guilty of? Why was scientist Dmitry Kolker sent to die in a pre-trial detention center? No one gives an answer.
01:29
How to protect your privacy? Kirill Parubets, Mikhail Svetov | First Department
Programmer Kirill Parubets was forced to cooperate by the FSB, and the spy program Monocle was installed on his device. We discuss with politician Mikhail Svetov the methods of surveillance by special services and defense against them.
01:37
OPM and you: what's important to know | Unit One
What do police officers do when they put a wiretap on your phone, sit in your car in your driveway, or read the chat rooms where you discuss politics with your friends? The most correct answer is: investigative measures. When are they used? How do they differ from investigative measures?
01:49
Anytype. A data management tool that can replace Notion | Greenhouse
Anytype is a powerful tool for information management. Minimalistic design: Anytype's interface is distraction-free, allowing you to focus on the content. Block structure: Like Notion, Anytype allows you to drag and drop blocks of text, images, videos and other elements, making it flexible and easy to organize information.
01:56
VPN Generator: VPN servers free for everyone! How to access a blocked website in Russia | Greenhouse
The VPN Generator project from the Internet Protection Society (IPS) takes the process of using VPNs to a new level. This is a non-commercial project, the task of which is to make everyone in Russia have a VPN. Therefore, to a large number of non-trivial and amusing moves (what is worth only one captcha on a check from a real store) added the necessity, if you get a brigadier account, to give out free VPN-access to at least five users per month, otherwise your brigade will be deleted.
02:02
Choosing a VPN | Internet Protection Society
In Russia, going online without a VPN has long been unsafe, and now sometimes even impossible. But if you still don't know what to do, where to go and which service to choose, this video is for you. We tell you briefly and clearly why you need a VPN, where to find it and what services we use ourselves. Set up a VPN for yourself and your friends and stay in touch
02:06
How the FSB failed a special operation with an IT specialist from Ukraine | First Division
The role of cyber operations in modern [counter]intelligence. The ethical dilemma of balancing personal privacy and public safety. How an IT guy from Ukraine disrupted a MONOCLE operation for the FSB
04:01
Social network for the major: why Vkontakte will give you away to law enforcement agencies | Internet Defense Society
In Russia, you can get a real sentence for words on the Internet. Law enforcers are constantly looking for (and finding) extremism in users' posts and initiating criminal cases. Some of them end in imprisonment. Most of these cases involve the same social networking site
04:12
How to sign out of your Google account on Android | Greenhouse
Signing out of your Google account on Android isn't easy. In addition to the fact that the option itself is hidden somewhere deep in the Android settings, it is also attributed threateningly: not "log out of account", but "delete account". And when you try to delete it, you'll be told, "Think about it, your phone will be unprotected".
04:16
OpenAI o1. A new step in the development of artificial intelligence | Greenhouse
Today, AI is increasingly being used to solve complex problems in fields ranging from science to entertainment. The new OpenAI o1 model opens up even more possibilities for such applications. However, it is only available in a paid version.
04:23
Cyberattacks and negligence: lessons for millions of dollars | Division One
How to lose data through banal human negligence and inattention? How to protect yourself? Why Google won't protect you
04:51
Taiwanese investigative journalist Jason Liu visiting Vitaly Moroz | eQtalk
eQtalk is an original project of eQtv TV channel. The head of eQualitie Ukraine Vitaliy Moroz is a guest of Taiwanese journalist Jason Liu. Jason's specialization is protection against cyber threats, countering propaganda and disinformation.
05:25
Legendary hacker Kevin Mitnick | Division One.
Kevin Mitnick, one of the most famous hackers in history. He began his interest in hacking as a teenager, then spent 15 years infiltrating the networks of American companies, avoiding capture - until he fell into the clutches of the FBI. After being released from prison, Mitnick became a security consultant and taught how to defend himself against the hacking techniques he himself had used.
05:55
Safe Mode: How to keep your data safe | Internet Society
You or someone you know has probably at least once received a call from "bank security officers" asking for card details. You may say, "Well, no, I won't fall for that. But there is a suitable hook for any person. Professional scammers have very clever ways to get you to voluntarily give up your information - and most likely, you won't even realize what happened.
06:11
Gladia. Another solution for speech recognition | Greenhouse
Gladia is designed to automatically recognize speech, analyze audio, and work with large amounts of data, making it indispensable for companies and developers working with voice interfaces, podcast processing, meeting transcription, and more.
06:17
NotebookLM. Simplify work with large amounts of text | Greenhouse
Notebook Language Model (NotebookLM) is an AI-assistant that helps you simplify and accelerate your work with large amounts of information. It is important to note that NotebookLM is based on powerful language models that can analyze and structure your data.
06:25
Viktor Zhora: How Russian hackers in uniform are fighting against Ukraine | eQtalk
eQtalk is an original project of eQtv TV channel. Oleksandr Glushchenko's guest is Viktor Zhora, one of Ukraine's leading cybersecurity specialists. The topic of conversation - Russian hackers in shoulder straps and their active participation in the war against Ukraine. What do we know about them?
07:24
Why doesn't the Russian National Security Agency (RKN) notice the cocoshops?
Merchants of banned content on the darknet have long ago revealed the secrets of resisting censorship. No matter how much the authorities try to ban or at least prevent them from working, the darknet sites just don't notice it all. Sometimes their advertising even spills out offline, in the form of daring hooligan actions.
07:42
BleachBit. Free alternative to CCleaner | Greenhouse
BleachBit scans your system for unnecessary files and provides a list of items that can be erased. You can choose which files to delete and then start the cleaning process. The program also offers features such as deleting files and directories to prevent their recovery, as well as clearing free disk space.
07:46
Censor Tracker: a free browser plug-in from Roskomvoboda to bypass blocking | Hothouse
Censor Tracker is a free browser extension for accessing blocked resources with a number of useful additional functions. Its main advantage is that this plugin is from Roskomvoboda, whose reputation is unquestionable, which means that the plugin itself is highly trustworthy, which is of paramount importance in the case of access via Proxy: unlike VPNs, traffic is not encrypted.
07:53
Messenger for the paranoid. Configuring SimpleX Chat | First Department
This is a complete guide to using SimpleX Chat - one of the most secure messengers on the market. We break down its unique functionality, show you how to use it, and tell you why SimpleX is more reliable than its competitors. If you've been looking for an ultimatum solution for confidential communication - go no further, you've found it.
08:29
OpenDNS: how to set up blocking of unwanted and malicious sites on your PC or router | Hothouse
OpenDNS is something like Roskomnadzor, but the Roskomnadzor of a healthy person. The service implements the function of parental control, i.e. traffic sorting and blocking of undesirable sites on the user's side.
08:34
P2P messenger Quiet: how it works and why it's so weird | Hothouse
Quiet is a rather interesting messenger that promises full data protection and anonymity, but at the same time raises a lot of questions with its unusual work. According to the idea, it is an ideal secure messenger, without a phone number or even e-mail, which works on the principle of organizing a peer-to-peer p2p network, and all traffic passes through the TOR network.
08:40
Harmful tips: watch this video and do the opposite | Division One
Today, and only today, you have a unique opportunity to give up protecting your data once and for all. In this video, we've compiled all the most damaging, worst cybersecurity tips that are guaranteed to make you a victim of hackers, scammers, or law enforcement. Use at your own risk - or do the opposite to stay safe.
09:05
Durov at a crossroads. What is the future of Telegram in Russia? | Internet Defense Society
In Russia, Telegram remains one of the few uncensored spaces thanks to Pavel Durov's resistance to pressure from the authorities, but he will have to choose between cooperating with law enforcers and preserving the messenger's freedom, which could lead to its blocking in the future.
09:23
Safe Mode: How to Protect Your Communication | Internet Society
If you live in Russia, you've probably been hacked at least once - or at least tried to be hacked. Many of us think that security is complicated: there is too much information, and the advice of different experts sometimes contradicts each other. But there is a set of basic rules. Everyone needs to know them - it's like the ABCs, only on the Internet.
09:41
Pavel Belousov, Nadiyno.org: How to protect yourself and your loved ones from hacking - practical cases | eQtalk
eQtalk is an original project of eQtv TV channel. The guest of the episode is Pavel Belousov, a leading cybersecurity specialist of the Digital Assistance Hotline Nadiyno.org. The topic of conversation - cyber threats to citizens of Ukraine in conditions of military aggression. What tools do fraudsters use to reach Ukrainians? What role does artificial intelligence play in the processes of cyberattacks and cyber defense?
11:59
How a "smart camera" almost put an innocent man in jail | FIRST EDITION
To penetrate the secrets of the past and solve old cases, Russian law enforcers decided to resort to modern technology: cameras with facial recognition. One such camera "recognized" a serial killer from the 2000s in the scientist-hydrologist Alexander Tsvetkov, and investigators rushed to pin the case on him. Except that the scientist could not have been at the scene of the crime, and "recognized" his accomplice described a completely different person. Why, then, do law enforcers so easily believe facial recognition data? And can it be trusted at all?
12:10
Pavel Belousov, Nadiyno.org : how not to fall for internet scammers?
Pavel Belousov, a technician of the digital help hotline Nadiyno.org, gives recommendations to Internet users on how not to become victims of Internet fraudsters and not to fall for phishing.
12:59
Antiviruses. To install or not to install? | FIRST SECTION
"The border is locked, but the enemy is already inside" - that's how one popular antivirus was described in the early noughties. Anti-malware programs have been around for years and users regularly use them. At the same time, there are many stories on the web that antivirus is not really necessary and does not protect against anything, and sometimes behaves no better than malware itself
13:17
Riffusion. A music generator that's better than Suno? | Hothouse
Riffusion is a neural network that turns text descriptions into music tracks. Simply enter a style, mood or instruments and AI will generate an audio file.
13:23
Napkin AI. Quick visual notes | Hothouse
Write text - and get clear charts and diagrams with Napkin AI. This neural network is a great tool for automatic text visualization that will help you create clear charts and diagrams in seconds
13:29
Facial recognition cameras now in every city | FIRST OFFICE
Total surveillance in every city! The Ministry of Finance wants to centralize many of Russia's existing video surveillance systems. Modernize, improve and equip with facial recognition - cameras with this function should very soon become literally 10 times more. Now it will be like in the capital: stick your head out of the window and you'll be caught on tape
13:44
Hiding data. The secret service method. Steganography | FIRST DIVISION
What if data was not only encrypted, but also hidden so that no one knew it existed? This is what steganography is all about - a way of transmitting and storing information in such a way that no one would know about its existence. This approach appeared in antiquity, was part of spy craft for many hundreds of years, and nowadays has turned into one of the computer science sections: digital steganography
13:58
How to protect your phone | RFE/RL Academy
A course on digital security: key tips for protecting your phone.
14:01
Key cybersecurity tips | RFE/RL Academy
A course on digital security: sammari, top security tips.
14:05
Safe Mode: How to Protect Your Communication | Internet Society
If you live in Russia, you've probably been hacked at least once - or at least tried to be hacked. Many of us think that security is complicated: there is too much information, and the advice of different experts sometimes contradicts each other. But there is a set of basic rules. Everyone needs to know them - it's like the ABCs, only on the Internet.
14:22
Mykola Kucheruk: organizing communication and Internet access in frontline Kramatorsk | eQtalk
eQtalk is an original project of eQtv TV channel. Oleksandr Glushchenko is the founder of Elite-Line Internet provider from frontline Kramatorsk, Donetsk region. The topic of the conversation is the organization of communication and the work of the Internet provider 20 km away from the battle line.
16:10
Manus and other autonomous AI Agents | AI Ukraine
Autonomous AI agents such as Manus, Proxy and ChatGPT Tasks are becoming an important tool for automating business processes and improving efficiency. Trends in 2025 demonstrate their huge potential in various areas, from data analytics to project management.
17:00
Chronicle of the pre-internet era. Rebooting memories with Igor Rozkladai | Retro Techno
Retro Techno is the author's project of Alexander Glushchenko. Together with the guests, Alexander reboots memories and nostalgia about the first computers, games, software, shares emotions from the acquaintance with movies, music, games, technology, acquaintance with the Internet.
18:21
Cybersecurity: How to monitor your camera, microphone and files | RFE/RL Academy
Digital security course: who can access your camera, how to prevent it?
18:23
How and why to use a VPN | RFE/RL Academy
Digital security course: all about VPNs
18:26
LocalSend. Transfer files over Wi-Fi - fast, convenient and private | Greenhouse
LocalSend is an open-source application that allows you to transfer files between devices without the Internet, using only the local Wi-Fi network. This solution is especially relevant for those who want to do without cloud services and keep data private.
18:32
Guerrilla texting: encrypted text messages in case the internet goes down | Teplica
The probability of an Internet outage in Russia is high, but we can say with a high degree of probability that mobile communication will be preserved in the event of an Internet outage. So SMS may become the main means of communication, at least for the time being
18:39
How community data helps understand the Internet infrastructure | SplinterCon Taipei
Elizaveta Yachmeneva, OONI Community Manager, presents the latest results of OONI's research in Russia, highlighting how their open methodology detects cases of censorship. The report captures online interference and traces the slow but steady movement towards fragmentation of the Internet.
19:06
NotebookLM. Simplify working with large amounts of text | Greenhouse
Notebook Language Model (NotebookLM) is an AI assistant that helps you simplify and accelerate your work with large amounts of information. It is important to note that NotebookLM is based on powerful language models that can analyze and structure your data.
19:12
How to restore Microsoft Authenticator codes on another device | Greenhouse
What to do if you lost your phone, your phone was stolen or you just bought a new phone and you need to recover codes from Microsoft Two-Factor Authentication application? You need to backup the application (done with a click of a button) and transfer it to a new device.
19:18
A strong password. Explained in 13 minutes and 37 seconds | FIRST SECTION
Passwords. We all use them every day to protect our technology, email, and social media accounts. But have you thought about whether you're doing it right - are you following the most basic cybersecurity? Are you putting your data at even greater risk by relying on bad passwords and bad habits?
19:33
AI Agents for Business | AI Ukraine
Oleg Romanov talks about the implementation of AI agents in the UK and the EU. How to create an AI agent for communication and how much it will cost.
20:35
Dangerous comments! What, where and how can I post on YouTube? | FIRST SECTION
You often ask whether you can write certain things in comments. And in general, to what extent comments are anonymous and whether you can be traced through them. In some cases, like in VK or Odnoklassniki, this question is easy to answer: you can't write anything that's rediculous, because everyone is tracked. But in the case of Western services, like YouTube, the situation is much more complicated. In the new video, let's find out what's what
20:47
How to communicate in messengers safely | RFE/RL Academy
Digital security course: how to communicate in messengers safely, which ones to choose and how to use?
20:50
How to monitor active sessions in messengers | RFE/RL Academy
Digital security course: what are the dangers and benefits of active sessions on devices?
20:55
What's wrong with fifth-generation base stations | Internet Defense Society
Breaking down the conspiracy surrounding 5G networks and telling the story of generations of connectivity
21:09
Veo 2 from Google AI Studio. Video generation test and comparison with Kling, Minimax and Runway | Greenhouse
Google AI Studio is a free platform for developers to experiment with generative AI, including the Veo 2 model. We test video generation with Veo 2, parse the settings and compare the results with other neural networks: Kling 1.6, Minimax and Runway.
21:14
How to protect your Telegram account from hijacking? | Hothouse
Telegram is not just a messenger. Correspondence, documents, channels, even your wallet - all of this is contained in your account. It is important to secure your account in advance.
21:19
Publishing anonymously! How to write about important things without giving yourself away.
There are very many taboo topics in Russia. You can't call war a war, you can't call corruption corruption, and you can't call criminals criminals criminals. But what if your job requires you to talk about taboo topics directly, honestly and frankly? In such a case, it is best to publish anonymously or under a pseudonym - and not to give yourself away in any way
21:38
Multifactor authentication to protect accounts | RFE/RL Academy
Digital security course: how to use MFA, why do you need it?
21:41
How to create and store strong passwords | RFE/RL Academy
Digital security course: how to create and store strong passwords?
21:43
Meshtastic in Taiwan: between technology and community | SplinterCon Taipei
Sean, a researcher from TWX Mesh, talks about Meshtastic, a civic mesh networking project in Taiwan. From the talk, you will learn how community-driven infrastructure and mesh networks create reliable communication channels.
21:57
We are being watched: how SORM works | Internet Defense Society
There is a lot of information about SORM, or the system of operational and investigative measures, that can be found on the web with varying degrees of reliability. Many articles and comments contradict each other. Moreover, even specialists do not fully understand how it all works. Therefore, we decided to record this video, where we will try to explain what it is
22:13
TinyWow - free online tools for a huge range of tasks | Greenhouse
TinyWow is an online platform that provides free tools for working with different types of files. It requires no installation - all operations are performed directly in the browser. Free access to all tools
22:19
Session. Messenger without phone number and email | HEAT
Session is a messenger focused on user security and anonymity. It is built on a decentralized network, which avoids data leaks and protects metadata. Unlike traditional messengers, Session does not require a phone number or email address to register, making it more private
22:25
Splinternet. How is the internet divided and what can we do about it? | FIRST SECTION
The global network has become so firmly embedded in our lives that we cannot imagine a world without it. Disconnection or isolation of the Russian segment of the Internet seems like the worst thing that could happen - but somewhere out there, in the outside world, the global network will continue to exist.... But will it?
22:43
Venny Ala-Siurua, Women on Web: How nonprofits can protect themselves from cyberattacks and blockades | eQtalk
eQtalk is an original project of eQtv TV channel. Special issue with Leonid Yuldashev, eQualitie project coordinator. Venny Ala-Siurua, Executive Director of the non-profit organization Women on Web shares her experience in protecting NGOs from cyberattacks and blocking. Digital tools to counter cyber threats, practical methods of protection and strategies to ensure the security of non-profit projects in the digital environment.
23:17
AI in the service of dictatorships. When do we expect a machine uprising? | FIRST DIVISION
The European Union recently passed a law to regulate artificial intelligence - the first in the world. But should AI be regulated? What danger does it really pose? And should we be afraid of the omnipotent machine intelligence of the future, or should we take a closer look at the inconspicuous household devices that are in our lives right now? About all this - in our new video. Glory to robots!
23:33
Suno. Create music with a neural network | Greenhouse
Suno AI is an advanced platform that uses artificial intelligence to create music and lyrics in literally minutes. This technology is adapted for both beginners and professional users, providing flexible tools for creativity in different genres and in more than 50 languages.
23:40
HeyGen: video translation with voice and facial expressions preserved | Greenhouse
Using artificial intelligence technology, HeyGen not only translates speech, but also mimics lip movements, allowing the final video to look as natural as possible.
23:45
Welcome to SplinterCon Taipei.
Dmitry Vitaliev, eQualitie's CTO, welcomes participants at the opening of SplinterCon in Taipei - activists, developers, researchers and designers striving to create sustainable digital solutions that can resist censorship and fragmentation. Dmitry talks about the phenomenon of the splinternet, which is replacing the internet.
23:54
Is it hard to hack your account? | RFE/RL Academy.
A course on digital security: how can someone's account be hacked, how do you know if it's safe from hacking?
23:56
How not to fall victim to phishing | RFE/RL Academy
Digital security course: what is phishing?
23:59
The secret of advanced anonymity! Install Whonix | FIRST SECTION
If you need anonymity in the network not for fun, but for serious work, just installing a VPN and not leaving your contacts is not enough. For those who have to hide from the all-seeing eye of security services every day, there are serious solutions: operating systems for anonymous work. Today we're going to tell you about just such a system: Whonix. Why you need Whonix, how to install it, how to use it and what it can protect you from.

21 August 2025

00:23
Setting up a VPN with WireGuard | Teplice
WireGuard gives you the opportunity to connect a VPN tunnel quickly and for free. All you need for this is to have a configuration file. Today, many VPN providers, along with their built-in VPN access application, give you the possibility to download a configuration file for access via WireGuard
00:27
Picocrypt: a portable and very simple encryption program | Greenhouse
Picocrypt is a free, open-source program that does not require installation. It is convenient to use it, for example, if you need to quickly encrypt some small files and upload them to the cloud.
00:32
Transparency as a Tool: Toward Internet Sustainability | SplinterCon Taipei
Using data from the Cloudflare Radar service, Cloudflare's Head of Research Marwan Fayed explores Taiwan's routing ecosystem. The report traces how network conditions, traffic anomalies, and regional failures reveal structural vulnerabilities and shows how it helps us better understand the fragmentation problem.
00:50
Social network for the major: why Vkontakte will give you away to law enforcement agencies | Internet Defense Society
In Russia, you can get a real sentence for words on the Internet. The law enforcement agencies are constantly looking for (and finding) extremism in users' posts and initiating criminal cases. Some of them end in imprisonment. Most of these cases involve the same social networking site
01:00
What's happening to YouTube in Russia | Internet Defense Society
After the outbreak of war in Ukraine, YouTube became the main source of independent information inside Russia. However, since August 2024, it has been experiencing serious malfunctions, and in December, traffic dropped to 20% of its initial level. Officially, the authorities do not admit to blocking the video hosting service and blame it on the wear and tear of Google's servers.
01:09
HOW TO PROTECT DATA | Basic Security Guide | SECTION ONE
The world of information is a world of constant struggle for user data. Some use it to sell better, others to steal. And others want to use your data to put you in jail. If you live in Russia, it is vital that you know how to protect this data. Even if you are an "ordinary person" and you have "nothing to hide," the law enforcers may consider any little thing a reason for a criminal case
01:32
The Future of VPNs - No VPN | SplinterCon Taipei
Censorship is evolving, and ways to circumvent it must evolve with it. In this joint report, Mallory Knodel (Social Web Foundation) and Vinicius Fortuna (Outline) argue that the future of censorship circumvention is not in increasing the number of VPNs, but in reducing them.
01:58
Europe's Third Way to the Digital Future | SplinterCon Taipei
In its quest for digital sovereignty, the EU faces a choice between the values of an open internet and growing pressure for national control. Alena Epifanova, Research Fellow at the German Council for Foreign Policy (DGAP), discusses how these tensions are shaping Europe's role in the fragmenting internet, from its reliance on supply chains to its choice of global governance mechanisms.
02:16
Manus AI. The first autonomous AI agent that works for you | Greenhouse
Manus AI is a revolutionary AI agent from China coming in March 2025 and is already being called the "killer OpenAI Operator".
02:22
SimpleX Chat #2: an overview of the main features | Teplitsa
In SimpleX Chat you can write, call, make video calls: all through an encrypted channel. You can set a timer to auto-delete messages, enable incognito mode and save a database of contacts and correspondence. Learn about these and other features of SimpleX Chat in our today's video
02:29
A gadget to hack ANY smartphone. Mobile Forensics and UFED | FIRST DIVISION
Russian security forces are able to hack into mobile devices and extract almost any kind of data from them - including personal correspondence in most messengers. Such an attack requires access to the phone for only a couple of hours, and even relatively new devices released last year are not immune to it
03:27
OuiSuite: an ecosystem for isolated networks | SplinterCon Taipei
Dmitry Vitaliev, CTO of eQualitie, presents OuiSuite - a set of tools for peer-to-peer content delivery, i.e. without a central server. OuiSuite is designed for use in isolated networks like the Iranian or Russian Internet.
03:42
Delta Chat. A private messenger that is safe from blocking? | Hothouse
Delta Chat is a decentralized messenger powered by email, making it blockchain-resistant. A detailed account of the messenger's features, including end-to-end encryption, multi-platform support, group chats, and experimental video calls.
03:48
Open AI.fm - a ChatGPT-based voice transcription model | Greenhouse
OpenAI.fm is a new voice model from OpenAI based on ChatGPT , offering 11 voices, including mood and emotion by voice. The service offers support for more than 100 languages.
03:54
Phishing Attacks: How Scammers Get Your Data | FIRST RESPONSE
Phishing is when attackers impersonate some third party that you may inadvertently believe. For a colleague at work, for a bank employee or simply for a mailing from some service. It turns out that in such a simple way you can get a huge variety of things: from the password to the mail, to huge sums of money from the company account. And, most importantly, no one is safe from phishing - sooner or later everyone will receive a letter from scammers. And then you can lose access to your accounts, your money, and (if a member of the security services is on the other side) even your freedom
04:09
Internet governance in Taiwan from an infrastructure perspective | SplinterCon Taipei
Wu Kuo-wei, former ICANN board member and co-founder of the Taiwan Internet Governance Forum (TWIGF), talks about the infrastructure challenges facing Taiwan in 2025.
04:30
URLCheck. Check links before opening them on Android | Greenhouse
Security experts advise that before opening a link, at least move the cursor to it and look in the browser to see what the actual address is displayed. It may differ from what is written on the page. On a smartphone you can't do this, alas. This is where URLCheck comes in handy.
04:34
LM Studio and Jan AI. How to run a neural network locally and without internet? | Greenhouse
A detailed overview of the free LM Studio and Jan AI programs for running language models on a personal computer with full privacy and without cloud restrictions. The guide covers the installation process, model selection, offline mode setup, and application of local neural networks for various professional tasks.
04:44
Durov at a crossroads. What is the future of Telegram in Russia? | Internet Defense Society
In Russia, Telegram remains one of the few uncensored spaces thanks to Pavel Durov's resistance to pressure from the authorities, but he will have to choose between cooperating with law enforcers and preserving the messenger's freedom, which could lead to its blocking in the future.
05:01
The truth about Roskomnadzor's secret department | FIRST OFFICE
Artificial intelligence is already watching us. Belarusian hackers broke into Roskomnadzor's internal network and found a secret agency inside the agency: the Main Radio Frequency Center. This organization is developing full automation of surveillance and censorship on the Russian Internet
05:24
Tella: how to encrypt and hide files on Android and iPhone | Hothouse
In today's world where digital security is not tolerated, it's invaluable to have a reliable tool to protect your personal data. A great mobile solution is Tella, an app designed to encrypt and hide files. Tella is available for Android and iPhone
05:29
Element messenger on Matrix: free, anonymous, decentralized, end-to-end encryption |
Free, cross-platform, open source, end-to-end encryption by default, ability to create private and public groups, no phone number tie-in: it's all Element. And also fine-tuning the distribution of rights in groups and a nice interface
05:35
How blocking works | Internet Defense Society
In the video we tell you how website blocking works in Russia, why you can't really block anything on the Internet and how the actions of Roskomnadzor and the Russian government harm the quality of the network
05:56
Elena Kushnir, Webpro: no victory without communication | eQtalk
eQtalk is an original project of eQtv TV channel. Oleksandr Glushchenko is a guest of the co-founder of the telecom operator Webpro and co-organizer of the international conference NOGUA. The topic of the dialog is communication during the war, international assistance to Internet providers from the frontline regions of Ukraine
07:11
What are the dangers of dipsticks? | FIRST SECTION
Neural networks can generate photorealistic images, compose music, simulate voice and even create videos. This technological innovation is already being used by fraudsters around the world, including crooks in uniform, to create dipfakes - fake video and audio recordings. But what exactly can you achieve with them? And how can it threaten you? Today we will talk about it!
07:25
CRIPTOVALUTES: How to survive without banks abroad and at home | FirstOfOne
Borrowed money from a foreign friend - became a foreign agent. Borrowed money from a foreign friend - became a foreign agent. Supported Ukrainians with donations - went to jail for treason.
07:37
Bypassing blocking - banned content. Can we get out of this? | FIRST DIVISION
From March 1, 2024, Roskomnadzor started blocking instructions on how to bypass blocking. To read instructions on how to install a VPN, you will now have to install a VPN, and the VPN itself will also be blocked. At least, this is the effect the censors want to achieve. But will they succeed? In the new video we will analyze the criteria of blocking (everything is very bad there) and see if it is possible to fight against them
07:48
Mullvad is a commercial open source VPN service. On the market since 2009 | Greenhouse
A review of the Mullvad VPN service from Sweden, which has been on the market since 2009. The VPN is paid, costs 5 Euros per month, but the tariff includes support for five devices. It has a huge number of servers in different countries and open source code. It is quite convenient and easy to use.
07:53
How to find out if your ISP is throttling the speed of certain applications: WeHe service | Teplica
The WeHe service allows you to find out whether your ISP reduces the speed of certain applications. For example, this may be the case when working with services that generate a large amount of traffic: YouTube, Apple Music, etc.
07:57
What's happening to YouTube in Russia | Internet Defense Society
After the outbreak of war in Ukraine, YouTube became the main source of independent information inside Russia. However, since August 2024, it has been experiencing serious malfunctions, and in December, traffic dropped to 20% of its initial level. Officially, the authorities do not admit to blocking the video hosting service and blame it on the wear and tear of Google's servers.
08:07
Pavel Belousov, Nadiyno.org: basic rules of digital hygiene for your safety
Tells you how to practice good internet hygiene and how to choose the right software for your device.
09:15
Why Discord isn't safe, even if you only need it to play games | FIRST OFFICE
What is Discord dangerous and why is it important? After all, it is mostly used by gamers. Games don't seem to be a serious task, and no one discusses anything important through the game service - what difference does it make then?
09:29
Artificial Intelligence. How Russia uses AI in information warfare | How not to become a vegetable
Russia is already using artificial intelligence in its war against Ukraine. To promote fakes and disinformation. In this video, we will look at six examples of how AI is already being used by the enemy in the Russian-Ukrainian war.
09:54
VPN Generator: update 2024! How to bypass blocks for free with Outline, Wireguard or Amnezia VPN | HEAT
The fight for a free Internet doesn't stop! VPN Generator has been updated, adding Outline and Amnezia VPN clients against the background of Wireguard protocol blocking in Russia. Now you can create configuration files for different clients
09:59
Gretel bot in Telegram will remove you from all pre-selected groups in case of danger | Greenhouse
Telegram-bot Gretel_sos_bot is designed to perform just one simple function, but it can cost you and your loved ones their freedom, or even their lives: Gretel removes you from all chat rooms that you have previously marked with the /chekin command.
10:03
Russia hides where you don't expect it: why you should be careful with TG channels | How not to become a vegetable
Five reasons why we can't give up Telegram. How russia is taking advantage of this, hiding where you don't expect it
10:22
Russians, fraudsters and conspiracy theorists lie in Ukrainian TikTok | How not to become a vegetable
TikTok is long ago not only funny dances and amazing trends. Through the prism of short videos we learn something new, follow the events on the front and civil life. But despite the obvious benefits, the app has its fair share of risks. 10 dangers that TikTok hides
10:46
Questions and answers from the VPN Generator team. July 2025 | Internet Society
Mikhail Klimarev and his colleague Oleg answer frequently asked questions from users of the free VPN Generator service.
11:43
How do you collect and verify evidence? | Tactical Tech.
What information is evidence and how it should be verified. What questions should be asked when collecting and analyzing evidence.
11:47
What are the risks for investigative journalists? How do you protect yourself? | Tactical Tech
Investigative journalists often take risks and find themselves in danger. To keep yourself safe, you need to remember the basic safety requirements not only for you, but also for those around you.
11:52
"Some are fighting - others are having fun". Russian disinformation for Ukrainians | How not to become a vegetable
While the Ukrainian military are sitting in the trenches, someone is having fun in clubs, going to restaurants and living their best life. It is easy to come across clips of such content on social networks. In particular, they are distributed among the military. Let us analyze how this information operation works.
12:04
How do I find and recover deleted web pages? | Tactical Tech
If web pages and content are deleted from the Internet, they can still be recovered using Web Archive. You can also protect a page from disappearing in advance by saving its archive yourself. The archive is indispensable if you need to cite the source when publishing an investigation.
12:07
How do you use maps in investigative journalism? | Tactical Tech
Maps are an important tool in the hands of journalists and researchers. It is important to remember that maps are created by humans, are not an objective reflection of reality and contain a number of distortions. Therefore, a critical approach should be maintained when using maps in investigations.
12:10
Questions and answers from the VPN Generator team. June 2025 | Internet Society
Mikhail Klimarev and his colleague Oleg answer frequently asked questions from users of the free VPN Generator service.
13:01
Air alerts, bullying and infoterror: the other side of telegram channels | How not to become a vegetable
Journalist Serhiy Odarenko talks about how Telegram channels make money from air alerts, why a fake Chinese church was created in Ukraine, and how factchecking works in the media. The impact of disinformation on society and the role of journalists in exposing manipulation are discussed.
13:40
Where do I start investigating companies? | Tactical Tech
Advice to novice investigators on where to start investigating companies.
13:43
Documenting War Crimes | Tactical Tech
Inga Springe, an investigative journalist living in Latvia, talks about her drive and power to change the world through investigative reporting, such as documenting the forced deportation of Ukrainians to Russia.
13:51
Where does news come from? Discussed by Andrei Zakharov and Lev Gershenzon | The Voice
How does news appear in your news feed? From what sources do Russians draw their information and which media outlets are most trusted? How does the state propaganda machine work, and do opposition media outlets have a bias and tendentiousness?
15:23
Hypogeurs and fakemakers. How to trust the media in the age of infobolotics | How not to become a vegetable
Internal mechanisms of journalism and standards, knowledge of which is critical for every consumer of information. The guest is Oksana Romanyuk, media expert, director of the Institute of Mass Information and member of the Supervisory Board of Suspilny, who supervises the creation of the "white media" project in Ukraine.
16:07
Your vote is fake! Seven ways AI can trick you | How not to become a vegetable
Active users of voice and video messaging on Telegram are becoming an attractive target for scammers using artificial intelligence technology to create convincing deceptions.
16:27
What the KGB archives hide about Soviet propaganda | How not to become a vegetable
KGB archives shed light on the hidden aspects of Soviet propaganda, repression and the fight against dissent. Oksana Moroz hosts historian Eduard Andryushchenko, author of the book "KGB Archives. Non-Fictitious Stories"
17:19
Chronicle of the pre-internet era. Rebooting memories with Igor Rozkladai | Retro Techno
Retro Techno is the author's project of Alexander Glushchenko. Together with the guests, Alexander reboots memories and nostalgia about the first computers, games, software, shares emotions from the acquaintance with movies, music, games, technology, familiarity with the Internet.
18:40
How do you manipulate with the truth? How not to be a vegetable.
Is it possible to recognize an expert? Or is it a utopia after all? How are we manipulated by the truth? Let's talk to Larisa Voloshina. Journalist, psychologist, researcher of propaganda - Russian and not only.
19:29
Questions and answers from the VPN Generator team. May 2025 | Internet Society
Mikhail Klimarev and his colleague Oleg answer frequently asked questions from users of the free VPN Generator service.
20:20
Pegasus. How spyware works and whether you can protect yourself from it | Launch Tomorrow
Phones store personal data and can be the target of covert hacking with spyware. Samat Galimov, lawyer Natalia Krapiva and researcher Bill Marzak discuss methods of penetration, reasons why surveillance is undetectable and ways to protect users.
21:21
Kling AI. Generate video with neural network | Greenhouse
Kling AI is an innovative video generator developed by Chinese company Kuaishou. AI uses advanced artificial intelligence technologies to create high-quality promt-based videos. The neural network applies 3D solutions that allow modeling complex movements and physical interactions of objects, which makes videos more realistic and dynamic.
21:27
Lara. New Translator 2025 | Greenhouse
Lara Translate is a new translator that promises to preserve the style and context of the text. But is it really better than ChatGPT, Google Translate and DeepL? In this review we test its features: translations with different styles, work with documents, Excel, PDF, and voice translation.
21:35
Speculators and esotericists in Ukrainian YouTube | How not to become a vegetable
How Ukrainian esoteric and informational YouTube channels use clickbait and dubious experts to attract an audience, manipulating emotions and spreading misinformation. Special attention is paid to the topic of a possible repeated offensive by Belarus.
21:52
VPN Generator: VPN servers free for everyone! How to access a blocked site in Russia | Greenhouse
The VPN Generator project from the Internet Protection Society (IPS) takes the process of using VPNs to a new level. This is a non-commercial project, the task of which is to make everyone in Russia have a VPN. Therefore, to a large number of non-trivial and amusing moves (what is worth only one captcha on a check from a real store) added the need, if you get a brigadier account, to give out free VPN access to at least five users per month, otherwise your brigade will be deleted.
21:58
Riffusion. A music generator that's better than Suno? | Hothouse
Riffusion is a neural network that turns text descriptions into music tracks. Simply enter a style, mood or instruments and AI will generate an audio file.
22:09
Robots. What we've been able to teach them over the last 100 years | Launch Tomorrow
How robots have evolved from heavy 18th-century automatons to today's intelligent and empathic machines capable of working on assembly lines, in warehouses, and even communicating with humans, approaching human-like qualities.
23:06
How TikTok and Telegram affected the Romanian elections | How not to become a vegetable
Dive into the dramatic plot of the Romanian presidential election, where TikTok algorithms, Influencers and even Russian influence unexpectedly interfere in the electoral process.
23:26
Slides AI and Gamma. Neural networks for creating presentations | Greenhouse
Looking for a way to create professional presentations faster? With two powerful AI-powered tools, Slides AI and Gamma, you can create impressive presentations literally on a single request.
23:34
How to restore Microsoft Authenticator codes on another device | Greenhouse
What to do if you lost your phone, your phone was stolen or you just bought a new phone and you need to recover codes from Microsoft Two-Factor Authentication application? You need to backup the application (done with a click of a button) and transfer it to a new device.
23:39
How NordVPN protects user privacy | SplinterCon Taipei
NordVPN CTO on the evolution of the service: from a basic VPN to a comprehensive security platform with antivirus and private mesh networking features. Marius explains in detail how the company ensures user privacy through a no-logs policy, annual independent audits, and strategic registration in Panama. He also talks about the risks of using free VPNs. And about the future of digital privacy in a fragmented global internet.
23:56
Qwen AI, Hailuo AI, Kling AI. Testing Chinese neural networks | Greenhouse
We test three popular Chinese neural networks: Qwen, Hailuo and Kling AI, check their capabilities, learn the pros and cons. How good is Qwen 2.5 MAX and is it really free? How Hailuo works - generating videos and images based on text and photos. How Kling AI can generate images.

22 August 2025

00:05
4 alternatives to ChatGPT: HuggingChat, Le Chat (Mistral AI), Claude, Grok | Greenhouse
Looking for powerful alternatives to ChatGPT? A breakdown of the top 4 AI tools of 2025 with unique features.
00:19
Midjourney. Image editor in the web version | Teplitsa
The name Midjourney is known to everyone. Since recently, the platform is available in a web version. This opens up new possibilities for generating images right in your browser. Another news is that there is an editor function that will allow you to easily edit the generation results. This includes removing objects from the image.
00:25
Ricochet refresh: a p2p messenger that works over Tor | Greenhouse
Ricochet refresh is an extremely anonymous p2p messenger operating through the Tor network, which means it is as secure as the Tor network can be considered. Ricochet refresh is extremely ascetic, you can only write text messages and send files. It exists exclusively in desktop version: for Windows and MacOS.
00:31
Discussing Microsoft, Google, Mistral, OpenAI and Meta neural networks | Launching Tomorrow
The AI market has long gone beyond ChatGPT alone. Microsoft, Google, Meta, Apple, Mistral, and even Ilon Musk are developing their own models. This episode provides an overview of the key players, approaches to creating neural networks, and possible directions for the next technological breakthrough.
01:55
Flora AI - 19 neural networks in one service | Greenhouse
Flora AI is a new platform for creating content with artificial intelligence. It brings together text, image, and video models in one place, including ChatGPT-4o mini, Claude 3, Gemini 2.0 Flash, Flux, Stable Diffusion, and more. How Flora AI works, how user-friendly its interface is, what features are available in the free version, and whether it's worth buying a subscription.
02:04
3 free neural networks for image creation | Greenhouse
Creating impressive images with neural networks is getting easier and easier. But not everyone has the opportunity to use Midjourney. But there are alternatives - free AI services with daily limits that allow you to generate images without paid subscriptions.
02:13
The True Story: News aggregation as a way to overcome information barriers | SplinterCon Taipei
Lev Gershenzon, founder of the news aggregator The True Story, shares the story behind the creation of the platform, which was developed in response to the blocking of independent media in Russia. The project offers a unique algorithmic approach to the news feed, collecting different points of view on events and helping readers form their own picture of what is happening through a transparent system of information sources.
02:27
Open AI.fm - a ChatGPT-based voice transcribing model | Greenhouse
OpenAI.fm is a new voice model from OpenAI based on ChatGPT , offering 11 voices, including mood and emotion by voice. The service offers support for more than 100 languages.
02:34
Soul Machines. Practicing English and creating digital assistants | Hothouse
Soul Machines creates digital assistants using artificial intelligence and animation technology. As a result, the resulting avatars can be conversed with both in writing and verbally using your device's camera and microphone.
02:39
Zero-click attacks: next-generation spyware | SplinterCon Taipei
Natalia Krapiva, Senior Technical Associate at Access Now, talks about the threats of modern spyware and effective methods of countering government surveillance through mobile devices. Natalia tells about recent cases of Graphite and Pegasus programs being used against journalists and activists, explains the principles of zero-click attacks and offers practical advice on protecting digital security for both civil society representatives and ordinary users.
03:05
Gladia. Another solution for speech recognition | Greenhouse
Gladia is designed to automatically recognize speech, analyze audio, and work with large amounts of data, making it indispensable for companies and developers working with voice interfaces, podcast processing, meeting transcription, and more.
03:10
KeePassXC: review of password manager with offline password database hosting | Hothouse
The main advantage of KeepassXC is also its disadvantage - the encrypted password database is stored with you. This is an advantage for those who prefer to control everything themselves and trust only themselves, and a disadvantage for those who are used to out-of-the-box applications with minimal customization.
03:17
Vids that are ruining the country. What are the dangers of Tic Toc? | How not to become a vegetable
About the activities of the fake Chinese church "Church of Almighty God", which operates in Ukraine under the guise of a Christian organization. The sect actively recruits new followers through TikTok, publishing videos on the topics of freedom, human rights and spirituality. The video explains how to distinguish such cults from real religious communities and what is their danger. The role of journalists and fact-checkers in exposing such manipulations is also raised.
03:36
Scira AI. Free open source AI search engine | Greenhouse
Scira AI is a free open source AI search engine with no registration. It supports GPT-4o, Claude, Grok, Llama, Gemini and other models. 7 search modes are available, including Reddit, YouTube, scientific articles, code, and image analysis, as well as a Buddy feature to save context between sessions.
03:42
Objective-See. Free macOS security utilities | Hothouse
Objective-See is a set of free and open source utilities created by cybersecurity expert Patrick Wardle. These tools help monitor system activity, block malware, and monitor network connections.
03:52
HeyGen: video translation with voice and facial expressions preserved | Greenhouse
Using artificial intelligence technology, HeyGen not only translates speech, but also mimics lip movements, allowing the final video to look as natural as possible.
03:57
PIKIMOV - free analog of Adobe After Effects? | Teplitsa
IKIMOV is a free online animation and video design tool that is an alternative to the popular Adobe After Effects.
04:02
Talking about software limitations | Launch Tomorrow
The functionality of the device changes depending on the conditions of use due to software limitations. Technical Director Samat Galimov and podcast editor Masha Aglicheva discuss the reasons for such restrictions, their scope of application and methods of protecting users from manipulation.
04:40
LM Studio and Jan AI. How to run a neural network locally and without internet? | Greenhouse
A detailed overview of the free LM Studio and Jan AI programs for running language models on a personal computer with full privacy and without cloud restrictions. The guide covers the installation process, model selection, offline mode setup, and application of local neural networks for various professional tasks.
04:50
Veo 2 from Google AI Studio. Video generation test and comparison with Kling, Minimax and Runway | Greenhouse
Google AI Studio is a free platform for developers to experiment with generative AI, including the Veo 2 model. We test video generation with Veo 2, parse the settings and compare the results with other neural networks: Kling 1.6, Minimax and Runway.
04:55
How AI bias is hindering journalism | Pollicy
Kingsley Owadara, founder of the Pan Africa Center for AI Ethics, talks about bias and fairness in AI systems for journalism. He not only explains the sources and types of bias, but also offers strategies for identifying and mitigating it.
05:25
AI employees are replacing humans. AI trends from global startup founder Anna Stepura | AI Ukraine
How to create and where to integrate employee AI. Evolution of the development of AI Agents. What are the risks of integrating AI into companies? AI Trends from Anna Stepura - a founder of three startups with successful exits and experience in Silicon Valley. Alumna of the leading gas pedals in the US: Alchemist Accelerator, Antler and Menlo VC Fellowship. Former CMO (Chief Marketing Officer), expert in AI marketing, building startups from scratch and strategy consulting.
06:20
3 free neural networks for image creation | Greenhouse
Creating impressive images with neural networks is getting easier and easier. But not everyone has the opportunity to use Midjourney. But there are alternatives - free AI services with daily limits that allow you to generate images without paid subscriptions.
06:29
Ricochet refresh: a p2p messenger that works over Tor | Greenhouse
Ricochet refresh is an extremely anonymous p2p messenger operating through the Tor network, which means it is as secure as the Tor network can be considered. Ricochet refresh is extremely ascetic, you can only write text messages and send files. It exists exclusively in desktop version: for Windows and MacOS.
06:35
Memory decline, 'cognitive debt', disappearance of creative agencies? Exploring the consequences of universal AI | Dev.UA
Presenters discuss whether artificial intelligence impairs memory and what "cognitive debt" is. MIT investigated how ChatGPT affects brain function. So here it is: while this tool makes work easier, it simultaneously reduces depth of thought, memory, and creativity.
08:13
How to save access to YouTube. Android Solutions | Hothouse
A few tools to help you keep YouTube accessible in slowdown conditions on Android devices: ByeDPIAndroid, PowerTunnel, CENO browser for Android
08:18
How to protect your Telegram account from hijacking? | Hothouse
Telegram is not just a messenger. Correspondence, documents, channels, even your wallet - all of this is contained in your account. It is important to secure your account in advance.
08:22
How Intelligence Agencies Control Mass Consciousness | FIRST OFFICE
Psyops. IPSO. Active measures. Facilitation operations. All these words are used to describe roughly the same thing: an attempt by intelligence agencies to influence the public and political life of a country through disinformation, propaganda, cultural programs and agents of influence. Not a day passes without some event being declared a psyop of the FSB, SBU or the US State Department. And there are many conspiracy theories about the special services themselves.
09:01
Hugging Face. An open platform for building and using AI models | Greenhouse
Hugging Face is a platform for developing and using machine learning models. You can learn, neural networks, use them and implement them in your projects. The platform supports a variety of model architectures, including Transformers, which are the basis of many modern NLP tasks.
09:07
Sonix. Automatic transcription of video and audio to text | Greenhouse
Sonix is a service that uses artificial intelligence to convert audio and video into text. In today's world, where the volume of audio and video content is constantly growing, automatic transcription is becoming more and more in demand. Sonix saves time and resources by providing fast and accurate transcriptions, which is especially important for professionals working with large amounts of data.
09:13
How Social Media Changed Protest | FIRST OFFICE
It is very difficult to imagine life without social networks. Through them we meet, communicate, consume content and get news. Organizing anything, from birthdays to protest marches of thousands, also happens on social networks. But it hasn't always been that way.
09:23
Open AI.fm - a ChatGPT-based voice transcription model | Greenhouse
OpenAI.fm is a new voice model from OpenAI based on ChatGPT , offering 11 voices, including mood and emotion by voice. The service offers support for more than 100 languages.
09:29
OpenDNS: how to set up blocking of unwanted and malicious sites on your PC or router | Hothouse
OpenDNS is something like Roskomnadzor, but the Roskomnadzor of a healthy person. The service implements the function of parental control, i.e. sorting traffic and blocking unwanted sites on the user's side.
09:35
Treason against the Motherland. From state secrets to SMS | FIRST SECTION
Since 2014, FSB investigators have been more and more actively recording citizens as state treasonists, and their criteria are getting lower. For example, in order to "disclose state secrets" it is no longer necessary to have access to them.
09:45
How is artificial intelligence used in information warfare? | How not to become a vegetable
A conversation with Alexander Krakovetsky, one of the recognized international experts in the field of artificial intelligence. Author of a book on how generative artificial intelligence is changing the world. Alexander is co-founder and technical lead of DonorUA, a social platform for blood donors. Candidate of Technical Sciences. Author of the free training course "Getting Started with ChatGPT" on Prometheus platform, founder of PRO AI initiative, which trains businesses to use artificial intelligence.
10:32
TinyWow - free online tools for a huge range of tasks | Greenhouse
TinyWow is an online platform that provides free tools for working with different types of files. It requires no installation - all operations are performed directly in the browser. Free access to all tools
10:37
OpenAI o1. A new step in the development of artificial intelligence | Greenhouse
Today, AI is increasingly being used to solve complex problems in fields ranging from science to entertainment. The new OpenAI o1 model opens up even more possibilities for such applications. However, it is only available in a paid version.
10:44
How does Russia recruit Ukrainian children? | How not to become a vegetable.
In this video we will talk about how Russian special services recruit Ukrainian children. What do they do it for? And how can you protect your child from hostile influences on the Internet?
11:05
Spoiling the FSB professional holiday (3 years in a row) | FIRST OFFICE
On December 20, Russia celebrates "Chekist's Day," the professional holiday of the state security agencies. On this day, FSB officers celebrate their achievements, brag about their awards and drink to the health of their colleague in the president's chair
11:18
GPT-5 capabilities. Communication, code writing and logical tasks | AI Ukraine
ChatGPT-5 is a breakthrough! Your very own scientist in your pocket. Use for communication, logic problems and code writing. Case studies of GPT-5 application in business.
11:45
Eraser. How do I permanently delete files from my computer? | Greenhouse
Normal file deletion does not guarantee data protection, as it can be recovered even after disk formatting. Eraser allows you to safely delete confidential files, set up automatic deletion and clear free space on your hard disk.
11:51
Soul Machines. Practicing English and creating digital assistants | Hothouse
Soul Machines creates digital assistants using artificial intelligence and animation technology. As a result, the resulting avatars can be conversed with both in writing and verbally using your device's camera and microphone.
11:57
Political Investigation in the Russian Empire | FIRST SECTION
In 1649, at the request of the people, the authorities issued the Sobornoye Uozhenie - the first Russian collection of laws. Together with it, the first special service also appeared. From that moment on, the secret police remained on guard of the authorities. Under different names, under different leadership - but with one goal.
12:14
Is Russian disinformation to blame for everything? Analyzing infospace | How not to become a vegetable
This conversation took place at the Festival of Thoughts (21.09.24), which was organized by Vostok SOS. The speakers were: Tatiana Troshchinskaya (journalist, media manager), Yaryna Kliuchkovskaya (strategic communications specialist), Lidia Smola (doctor of political sciences, professor, psychologist) and Oksana Moroz.
13:21
THE HYDROGEN BOMB AND THE MEMORIAL. Academician Sakharov | FIRST SECTION
During his long life, Sakharov designed doomsday weapons, won the Nobel Peace Prize, and wrote a new constitution for a union state. How did the scientist leave the ivory tower of Soviet science and join the dissident movement, and what did he leave us?
13:35
Concentration camp in DNR, Ukrainian "spy", Lamborghini for militants | FIRST DIVISION
Alexander Marchenko is a Ukrainian serving time in Russia on far-fetched espionage charges. In 2018, he was detained in Donetsk and sent to the worst place in Eastern Europe - the infamous Isolation concentration camp. Tortured and starved, then handed over to the FSB.
14:16
GPT-5 capabilities. Communication, code writing and logical tasks | AI Ukraine
ChatGPT-5 is a breakthrough! Your very own scientist in your pocket. Use for communication, logic problems and code writing. Case studies of GPT-5 application in business.
14:46
Made in China: How China is exporting digital dictatorship | FIRST REVIEW
Where did so many Chinese surveillance cameras appear on the streets? It's simple: China actively exports technology for mass surveillance around the world. And the less technologically advanced a dictatorship is, the more technology big brother is willing to provide to fight civil society.
15:03
4 alternatives to ChatGPT: HuggingChat, Le Chat (Mistral AI), Claude, Grok | Greenhouse
Looking for powerful alternatives to ChatGPT? A breakdown of the top 4 AI tools of 2025 with unique features.
15:15
Building an app without code with Emergent AI | Greenhouse
Emergent AI is an "agent-based web coding" platform that allows you to create a finished web application in 30 minutes by simply describing it in words. It supports GPT-5 and Slude. As well as how much it costs, and what limitations the free version has.
15:22
Oleksandr Fedienko, Deputy of the Verkhovna Rada of Ukraine: changes in cybersecurity legislation | eQtalk
eQtalk is an original project of eQtv TV channel. The guest is Oleksandr Fedienko, a member of the Verkhovna Rada of Ukraine. We talk about lawmaking in the field of cybersecurity, cyber perimeter protection and the state's view of the industry.
16:54
Cloudflare WARP. A simple way to protect your online traffic | Greenhouse
To prevent anyone from seeing what you're doing online, use Cloudflare WARP, a simple anti-surveillance solution without slowing down the internet. Especially useful for those who connect to Wi-Fi in cafes, hotels or airports.
17:00
Chronicle of the pre-internet era. Reloading memories with Pavel Belousov | Retro Techno
Retro Techno is the author's project of Alexander Glushchenko. Together with the guests, Alexander reboots memories and nostalgia about the first computers, games, software, shares emotions from the acquaintance with movies, music, games, technology, familiarity with the Internet.
18:00
The Future of VPNs - No VPN | SplinterCon Taipei
Censorship is evolving, and ways to circumvent it must evolve with it. In this joint report, Mallory Knodel (Social Web Foundation) and Vinicius Fortuna (Outline) argue that the future of censorship circumvention is not in increasing the number of VPNs, but in reducing them.
18:28
Robots. What we've been able to teach them over the last 100 years | Launch Tomorrow
How robots have evolved from heavy 18th century automatons to today's intelligent and empathic machines capable of working on assembly lines, in warehouses, and even communicating with humans, approaching human-like qualities.
19:19
What stories do journalists investigate? | Tactical Tech.
Journalist Janine Luludi talks about data-driven investigations in complex areas, such as using artificial intelligence to track refugees and monitor their behavior, and what makes an investigator never stop looking.
19:29
How do journalists get information and investigate cross-border crimes? | Tactical Tech
Romanian investigative journalist Paul Radu shares his methods for investigating corruption and organized crime, providing examples of cross-border crime investigations from around the world.
19:50
OuiSuite: an ecosystem for isolated networks | SplinterCon Taipei
Dmitry Vitaliev, CTO of eQualitie, presents OuiSuite - a set of tools for peer-to-peer content delivery, i.e. without a central server. OuiSuite is designed for use in isolated networks like the Iranian or Russian Internet.
20:04
What are the dangers of the Russian app store RuStore | FIRST DISCUSSION
When you buy a phone, it already has a lot of applications installed. Games, social networks, manufacturer's proprietary programs and so on. But according to the law of 2019 on the phones imported into Russia must necessarily install Russian applications. And, according to the new project of the Ministry of Digitalization, together with them must go and the Russian store, which will replace the factory one
20:20
Meshtastic in Taiwan: between technology and community | SplinterCon Taipei
Sean, a researcher from TWX Mesh, talks about Meshtastic, a civic mesh networking project in Taiwan. From the talk, you will learn how community-driven infrastructure and mesh networks create reliable communication channels.
20:34
Blockchain, AR/VR and Artificial Intelligence - what's changed in five years? | Launch Tomorrow
On the fifth anniversary of the podcast, host Samat Galimov meets with guests from past episodes to discuss the key technological changes of recent years and look to the future. Kirill Pimenov talks about blockchain, Artem Rodichev about AI, and Olga Nova about virtual and augmented reality.
21:20
Do humans influence software algorithms? | Tactical Tech
Writer, artist and technologist James Bridle talks about the possibilities and limitations of human-made algorithms and software.
21:22
Journalism during the war in Ukraine | Tactical Tech
Journalist Lubov Rakovitsa talks about the heavy burden of reporting on the war in Ukraine. Why it is important to continue doing this work despite the increasing psychological pressure, lack of a sense of security and lack of confidence in the future.
21:36
How a breakdown in the DNS protocol led to the collapse of Runet | Launch Tomorrow
On January 30, 2024, a glitch in the DNS protocol caused temporary inaccessibility of .ru websites and some applications, prompting fears of an Internet outage in Russia. What is DNS and why did the failure occur?
22:27
Healthy hackers - why are they banned? | FIRST EDITION
Once again there is a heated debate within the government: should we allow "white hackers" to work in the white, or leave them in a semi-legal gray zone? "White hackers research vulnerabilities in computer systems so they can be fixed - in other words, they help us all improve security. So why aren't they allowed to work? And who even came up with the idea to prosecute for such a thing? Let's find out in the new video!
22:40
The Invisible War in FATA. How US drones were used in Pakistan | Tactical Tech
Life in FATA (Tribal Area) Pakistan, and why US drone strikes in the area have remained invisible. How this and similar issues can be made more visible.
23:19
Where do I start investigating companies? | Tactical Tech
Advice to novice investigators on where to start investigating companies.
23:25
How Satellite Internet works | Launch Tomorrow
Satellite Internet vs. submarine cables: is space really more reliable, is it possible to block it, and how did Starlink seize the lead? Podcast host Samat Galimov, cyber lawyer and founder of Roscomsvoboda Sarkis Darbinian and space popularizer Vitaly Egorov discuss the design, regulation and prospects of global access via orbit.

23 August 2025

00:18
How do you know if your phone's been hacked? | FIRST DIVISION
Most of you store your most valuable data in your phone: correspondence, routes, payment information and so on. That's why phone hacking can spell big trouble, especially if law enforcers are behind it. Today we will tell you what signs of hacking can be detected - and how to protect yourself from it
00:36
Documenting War Crimes | Tactical Tech
Inga Springe, an investigative journalist living in Latvia, talks about her drive and power to change the world through investigative reporting, such as documenting the forced deportation of Ukrainians to Russia.
00:45
Amateur investigators on their findings in Syria, Lebanon and Israel | Tactical Tech
Amateur investigators describe their methods and experiences in investigating three topics: where weapons are coming from in Syria; how urban land grabs are taking place in Beirut; and how amateur aerial photography can expose and question the balance of power in Jerusalem.
01:18
How community data helps understand the Internet infrastructure | SplinterCon Taipei
Elizaveta Yachmeneva, OONI Community Manager, presents the latest results of OONI's research in Russia, highlighting how their open methodology detects cases of censorship. The report captures online interference and traces the slow but steady movement towards fragmentation of the Internet.
01:44
How do apps end up on our devices? | Launch Tomorrow
The choice between convenience and freedom is the result of political and economic decisions, not technical ones. Samat Galimov and podcast editor Masha Aglitcheva discuss how app stores work, how phones differ from computers, who controls access to technology, and whether this can be changed.
02:33
Are neural networks starting to show character? AI preferences | FIRST SECTION
It is time to unlock the secrets of the digital "soul" of artificial intelligence and answer the question: do Russian AI and foreign AIs really "think" differently? And if so, where does this difference come from? Can AI be biased - and is it the developers' fault? Fire up your neurons and download the training dataset in our new video!
02:52
Are passwords obsolete? Talking about authentication | Launch Tomorrow
Passwords are no longer considered a reliable defense. Samat Galimov and information security expert Karim Valiev discuss their vulnerability and alternative authentication methods.
03:33
Durov at a crossroads. What is the future of Telegram in Russia? | Internet Defense Society
In Russia, Telegram remains one of the few uncensored spaces thanks to Pavel Durov's resistance to pressure from the authorities, but he will have to choose between cooperating with law enforcers and preserving the messenger's freedom, which could lead to its blocking in the future.
03:51
Chronicle of the pre-internet era. Reloading memories with Pavel Belousov | Retro Techno
Retro Techno is the author's project of Alexander Glushchenko. Together with the guests, Alexander reboots memories and nostalgia about the first computers, games, software, shares emotions from the acquaintance with movies, music, games, technology, familiarity with the Internet.
04:53
Creating Prompts and Testing Generative AI (Theory) | Pollicy
Arthur Kakande presents an introduction to Prompt Engineering and Adversarial Testing for Large Language Models (LLMs). Kakande describes various techniques for creating prompts, such as zero-shot, few-shot, and chain-of-thought. Special attention is given to LLM moderation to prevent malicious content and prompt injection. Adversarial testing, a method of identifying vulnerabilities in LLMs by targeting complex data, is demonstrated.
05:25
Sevgil Musayeva on the struggle of Ukrainian journalism against Russian occupiers | Access Now
Work of Ukrainian journalism in the conditions of Russia's war against Ukraine. The case of "Ukrainska Pravda"
05:55
How to create your own Outline VPN server in 5 minutes | Greenhouse
How to create a private VPN server in 10 minutes with Google Jigsaw's free and open source Outline project - full control, high speed and state-of-the-art Shadowsocks encryption. How to choose a VPS provider, install Outline Manager and Client, and configure and manage your server.
06:02
Eraser. How do I permanently delete files from my computer? | Greenhouse
Normal file deletion does not guarantee data protection, as it can be recovered even after disk formatting. Eraser allows you to safely delete confidential files, set up automatic deletion and clear free space on your hard disk.
06:09
YOU'RE A BETTER PERSON! How TV speculates on emotions | How not to become a vegetable
Shout louder. And louder! We need a real balaganza, then we will definitely be watched. This seems to have been one of the key principles of Ukrainian political shows. It was, because now almost all of them are on pause. How exactly did they attract the attention of the audience? What methods did the editors, hosts and guests use? And, finally, what did they put in the heads of you and me. Don't tell me you don't watch TV - it's been ubiquitous for a long time. We will talk about all this with Dr. Lidia Smola, Doctor of Political Science
07:06
LM Studio and Jan AI. How to run a neural network locally and without internet? | Greenhouse
A detailed overview of the free LM Studio and Jan AI programs for running language models on a personal computer with full privacy and without cloud restrictions. The guide covers the installation process, model selection, offline mode setup, and application of local neural networks for various professional tasks.
07:16
OpenAI o1. A new step in the development of artificial intelligence | Greenhouse
Today, AI is increasingly being used to solve complex problems in fields ranging from science to entertainment. The new OpenAI o1 model opens up even more possibilities for such applications. However, it is only available in a paid version.
07:23
The internet is safe for women. Episode 2 | Pollicy
Participants in the roundtable discuss the status of women on the Internet and ways to combat online violence. The importance of removing barriers to accessing and using digital technologies is emphasized, as well as the need to develop local, inclusive content and educational programs tailored to the needs of different groups of women.
07:54
Machine consciousness | Protocol Labs
Joshua Bach, a prominent cognitive scientist and AI researcher, explores the essence of artificial intelligence and consciousness. Bach elaborates on the history and philosophical foundations of AI, tracing its roots from Aristotle to modern deep learning. He discusses current challenges and limitations in machine learning, especially in achieving human understanding and consciousness.
09:00
Why are there so few movies in Ukrainian? The biggest interview in the history of MEGOGO | TRANSACTION
Egor Yarotsky, Product Director of the multimedia Internet service MEGOGO, is a guest of Alexander Glushchenko. Part 2
10:05
Introduction to IPFS and Filecoin and how they are shaping the future of Web3 | Protocol Labs
Konstantin Tkachuk presents IPFS and Filecoin and how they are accelerating the transition to Web3, a version of the web where ownership and control are more decentralized and distributed than today. You'll learn about the core concepts of the technologies, their potential in a web3 context, and the usable tools and applications that already exist. The Interplanetary File System (IPFS) is a peer-to-peer network and protocol designed to make the web faster, more secure, and more open.
10:55
How the FSB recruits. The Story of Kirill Parubets | Unit One
Programmer Kirill Parubets was detained by the FSB and received an offer that was hard to refuse: cooperation or a prison sentence, possibly for life. What made the special services interested in him and what does the process of recruitment to the main special service look like?
11:16
Protecting digital democracy and a rights-based future | Access Now
While governments, multilateral institutions, civil society and the private sector continue to work towards more democratic governance of technology, digital authoritarianism is rapidly gaining momentum, offering competing models of governance.
11:47
Nextcloud. Secure data storage in the cloud | Teplitsa
An overview of Nextcloud - an open platform for creating personal cloud storage. How it differs from commercial services, how to create an account, use built-in features and organize collaboration with full control over your data.
11:54
Veo 2 from Google AI Studio. Video generation test and comparison with Kling, Minimax and Runway | Greenhouse
Google AI Studio is a free platform for developers to experiment with generative AI, including the Veo 2 model. We test video generation with Veo 2, parse the settings and compare the results with other neural networks: Kling 1.6, Minimax and Runway.
11:59
Paid 50000 UAH and silence. Top cheating schemes in Instagram | How not to become a vegetable
Every day we risk losing our money because of increasingly sophisticated schemes of deception in social networks and messengers. Some of them have already been described in our videos. But scammers are coming up with new ways to scam you. So in this video we'll talk about the most popular fraudulent schemes in Instagram. And we'll tell you how to protect yourself and your money.
12:17
Why doesn't the Russian National Security Agency (RKN) notice the cocoshops?
Merchants of banned content on the darknet have long ago revealed the secrets of resisting censorship. No matter how much the authorities try to ban or at least prevent them from working, the darknet sites just don't notice it all. Sometimes their advertising even spills out offline, in the form of daring hooligan actions.
12:34
KeePassXC: review of password manager with offline password database hosting | Hothouse
The main advantage of KeepassXC is also its disadvantage - the encrypted password database is stored with you. This is an advantage for those who prefer to control everything themselves and trust only themselves, and a disadvantage for those who are used to out-of-the-box applications with minimal customization.
12:41
VPN Generator: VPN servers free for everyone! How to access a blocked website in Russia | Greenhouse
The VPN Generator project from the Internet Protection Society (IPS) takes the process of using VPNs to a new level. This is a non-commercial project, the task of which is to make everyone in Russia have a VPN. Therefore, to a large number of non-trivial and amusing moves (what is worth only one captcha on a check from a real store) added the need, if you get a brigadier account, to give out free VPN access to at least five users per month, otherwise your brigade will be deleted.
12:47
Secret archives of the intelligence services, Section One.
The Russian state does not like to explain why it persecutes this or that person. What was journalist Ivan Safronov guilty of? Why was scientist Dmitry Kolker sent to die in a pre-trial detention center? No one gives an answer.
13:02
Global surveillance system. Project ECHELON, Section One.
In the 1960s, the intelligence agencies of the five English-speaking NATO countries launched a joint project to intercept satellite communications. Over the next three decades, the network of listening stations, dubbed "ECHELON," entangled the entire planet and was at the center not only of many conspiracy theories, but also of an investigation by the European Parliament, which suspected the allies of industrial espionage.
13:20
Delta Chat. A private messenger that is safe from blocking? | Hothouse
Delta Chat is a decentralized messenger powered by email, making it blockchain-resistant. A detailed account of the messenger's features, including end-to-end encryption, multi-platform support, group chats, and experimental video calls.
13:26
Open AI.fm - a ChatGPT-based voice transcription model | Greenhouse
OpenAI.fm is a new voice model from OpenAI based on ChatGPT , offering 11 voices, including mood and emotion by voice. The service offers support for more than 100 languages.
13:32
What the KGB archives hide about Soviet propaganda | How not to become a vegetable
KGB archives shed light on the hidden aspects of Soviet propaganda, repression and the fight against dissent. Oksana Moroz hosts historian Eduard Andryushchenko, author of the book "KGB Archives. Non-Fictitious Stories"
14:23
Why don't they pay taxes, why don't they pay loans, why don't they recognize the courts? First Division.
Did you know that Russia doesn't really exist? Yes, yes, there is no such country on the map. In fact, we are still living in the Soviet Union, and the Russian Federation LLC is a commercial firm that has bound Soviet citizens with bonded contracts. It is enough to break them, and life will become much easier.....
14:40
Manus AI. The first autonomous AI agent that works for you | Greenhouse
Manus AI is a revolutionary AI agent from China coming in March 2025 and is already being called the "killer OpenAI Operator".
14:46
Flora AI - 19 neural networks in one service | Greenhouse
Flora AI is a new platform for creating content with artificial intelligence. It brings together text, image, and video models in one place, including ChatGPT-4o mini, Claude 3, Gemini 2.0 Flash, Flux, Stable Diffusion, and more. How Flora AI works, how user-friendly its interface is, what features are available in the free version, and whether you should buy a subscription.
14:55
Scams on the Internet: traps you can easily fall into | How not to become a vegetable
Let's understand how scammers operate and how to protect yourself from fraudulent schemes that can be used to scam you out of your money. We are preparing this video based on a series of materials from the publication "Access Point".
15:14
Complete Internet shutdown. What do I do? First Squad
You use the internet every day - but what happens when the authorities pull the switch and it's gone? It's called a "shutdown", and today we'll look at where and how often the internet is shut down, why - and what to expect from such a situation.
15:30
Battle for Soledar in Minecraft. Cybersports and Russian propaganda | How not to become a vegetable
How does Russia use cybersports to spread its propaganda? And why are video games a tool of information policy?
15:53
Phone from diaper. How to protect children from social networks | How not to become a vegetable
Social media is an integral part of teenagers' lives. Bans do not solve the problem; it is important to teach children and adults how to recognize and deal with digital threats. Supported by the Nadiyno.org cybersecurity hotline.
16:10
Google released a better voice generator? | Hothouse.
Google AI Studio introduces a new voice generator based on Gemini models, allowing you to create both monologues and dialogs with emotional coloring. Overview and details about the functionality, features and current limitations of the free version.
16:17
How to restore Microsoft Authenticator codes on another device | Greenhouse
What to do if you lost your phone, your phone was stolen or you just bought a new phone and you need to recover codes from Microsoft Two-Factor Authentication application? You need to backup the application (done with a click of a button) and transfer it to a new device.
16:23
Toward an Afro-feminist Artificial Intelligence | Pollicy
Discussion of the report "Towards an Afro-Feminist AI" in a webinar format. The report proposes a risk-based approach and Afro-feminist principles for AI regulation aimed at empowering women.
17:56
Private Sector and Hradanese Society Partnerships in Crisis Situations | Access Now
How the private sector and civil society can come together in times of political change, war and instability. Why companies should openly show how they respond to requests from authorities when these requests are unreasonable or violate human rights, and how to create channels for activists to communicate with companies in times of crisis.
18:46
Scira AI. Free open source AI search engine | Greenhouse
Scira AI is a free open source AI search engine with no registration. It supports GPT-4o, Claude, Grok, Llama, Gemini and other models. 7 search modes are available, including Reddit, YouTube, scientific articles, code, and image analysis, as well as a Buddy feature to save context between sessions.
18:52
ElevenLabs. How to create a voice by prompt? | Greenhouse
ElevenLabs has a new feature - generation of voices by text description. It allows you to create unique, personalized voices literally in minutes. With the help of a text prompt you can set any voice characteristics - from timbre to intonation - and get the result ready for content voicing.
18:57
The case of #FreeRusesabagina and the fight for the release of the unlawfully convicted | Access Now
The success of the #FreeRusesabagina campaign in Rwanda and what lessons can be learned to fight for the release of activists in illegal detention in different jurisdictions.
19:26
ENIGMA. How the "invincible" cipher was cracked | Division One
Imagine a device that looks like an old-fashioned typewriter, but instead of printing ordinary letters, creates an incredibly complex cipher. The Enigma cipher machine was the key to the success of the Third Reich's army - and especially its navy.
20:02
MyMap AI. Simple and fast data visualization | Greenhouse
MyMap.AI is a service that uses artificial intelligence to help quickly create visual mind-maps, kanban boards, diagrams and other schemes. Using a user-friendly chat interface, users can input ideas, tasks or data, and the system automatically converts them into structured visualizations. This makes the service useful for brainstorming, project planning and collaboration.
20:08
Element messenger on Matrix: free, anonymous, decentralized, end-to-end encryption |
Free, cross-platform, open source, end-to-end encryption by default, ability to create private and public groups, no phone number tie-in: it's all Element. And also fine-tuning the distribution of rights in groups and a nice interface
20:16
Speculators and esotericists in Ukrainian YouTube | How not to become a vegetable
How Ukrainian esoteric and informational YouTube channels use clickbait and dubious experts to attract an audience, manipulating emotions and spreading misinformation. Special attention is paid to the topic of a possible repeated offensive by Belarus.
20:37
Treason. From state secrets to SMS | First Division
Since 2014, FSB investigators have been more and more actively recording citizens as state treasonists, and their criteria are getting lower. For example, in order to "disclose state secrets" it is no longer necessary to have access to them.
20:44
Recraft AI. Another tool for creating visual content | Greenhouse
Recraft AI is an artificial intelligence-based tool for creating unique visual content. Recraft AI allows you to generate images, layouts, graphics and even logos using just text queries. This tool is suitable for designers, marketers and content creators who need to create creative content quickly and efficiently.
20:51
Tella: how to encrypt and hide files on Android and iPhone | Hothouse
In today's world where digital security is not tolerated, it's invaluable to have a reliable tool to protect your personal data. A great mobile solution is Tella, an app designed to encrypt and hide files. Tella is available for Android and iPhone
21:01
Russia hides where you don't expect it: why you should be careful with TG channels | How not to become a vegetable
Five reasons why we can't give up Telegram. How russia is taking advantage of this, hiding where you don't expect it
21:19
The internet is safe for women. Episode 1 | Pollicy
Moderator Cecilia Mondo and her guests discuss whether women can work safely and effectively in the digital space to overcome threats. The panelists share their personal experiences of cyberbullying, suggest different strategies to increase safety in the digital space, and discuss the importance of programs to provide psychological support to victims of cyberbullying.
21:47
4 alternatives to ChatGPT: HuggingChat, Le Chat (Mistral AI), Claude, Grok | Greenhouse
Looking for powerful alternatives to ChatGPT? A breakdown of the top 4 AI tools of 2025 with unique features.
21:59
Metadata. How to remove them from photos, audio and video? | Hothouse
What can metadata be in photos, audio and video? What are some free tools to remove metadata? How do I remove metadata from photos, audio and video?
22:03
Why Russian gamemaking is at the bottom and Ukrainians influenced it | Vitaliy (v1lat) Volochay
What are the peculiarities of the effect of computer games, which ones and how exactly shaped the Ukrainian community? And also how we can use this sphere in the fight against Russia. Lena Chichenina talks about this with cybersports commentator Vitaliy (v1lat) Volochai. He has been professionally involved in video games for more than 10 years and is one of the most famous experts in Ukraine. In 2018, he became a co-founder of Maincast cybersports broadcasting studio.
23:05
Surveillance of dissenters... In Europe? First Division.
Pegasus spy software is usually talked about in the context of dictatorships: some autocrat is spying on citizens again, and NSO Group is helping him to do it. But Pegasus is also used in a number of European countries, democratic and prosperous. In this video you will learn about one such case, the very first and most high-profile of all known cases - during the referendum in Catalonia in 2017.
23:29
Zangi. Private messenger with a focus on video calls | Greenhouse
Initially, the project, which, by the way, originates from Armenia, was conceived as a tool for simple and convenient communication, but with an emphasis on high quality communication, especially in conditions of poor network coverage. The developers set themselves the task of creating an application that would work stably even with minimal internet speed.
23:35
VPN Generator: update 2024! How to bypass blocks for free with Outline, Wireguard or Amnezia VPN | HEAT
The fight for a free Internet doesn't stop! VPN Generator has been updated, adding Outline and Amnezia VPN clients against the background of Wireguard protocol blocking in Russia. Now you can create configuration files for different clients
23:40
What are super apps and how to use them? | NeVODA
Did you know that the average user has more than 60 different apps installed on their smartphones? And even though we only use about 10 of them daily, that's still too many.
23:55
DEGUGLIZATION. Replacing services with more confidential ones | First Department
User data is a precious resource that all big IT companies dream of getting their hands on. Some are interested in your consumer habits in order to offer contextual advertising. Others dream of feeding your texts to neural networks for training. Still others sell information about you to anyone who wants it. The only one who loses rather than earns on this resource is you. But today we will try to improve the situation. In this video we will analyze safer alternatives to popular applications and services that collect the most of your data. Some of them will be suitable only for enthusiasts, while others can be easily used by anyone right now. Watch and share with your friends - data can't protect itself!

24 August 2025

00:25
Creating Prompts and Testing Generative AI (Practice) | Pollicy
Rashid and Arthur Kakande present a hands-on workshop on Prompt Engineering and Adversarial Testing for Large Language Models (LLMs) using the Groq platform. It demonstrates how to effectively manage LLM behavior using various prompting techniques and how to identify and prevent vulnerabilities, creating more robust and secure LLM-based applications.
01:09
War and Cyber: Three Years of Struggle and Lessons for Global Security | State Communications Service
Experts of the State Service for Special Communications and Information Protection of Ukraine together with the ICE Task Force analytical center prepared the report "War and Cyber: Three Years of Struggle and Lessons for Global Security"
02:27
Pegasus. How spyware works and whether you can protect yourself from it | Launch Tomorrow
Phones store personal data and can be the target of covert hacking with spyware. Samat Galimov, lawyer Natalia Krapiva and researcher Bill Marzak discuss methods of penetration, reasons why surveillance is undetectable and ways to protect users.
03:24
Kyivstar mobile operator president Oleksandr Komarov on Ukrainian telecom from first-hand experience | Negotiate
Oleksandr Komarov, Director of Kyivstar, the largest mobile operator in Ukraine, is a guest of Oleksandr Glushchenko. This man stood at the origins of mobile communication in Ukraine, managed to pass all the stages of formation of this technology and is ready to share the history of development. Part 1
05:06
Lara. New Translator 2025 | Greenhouse
Lara Translate is a new translator that promises to preserve the style and context of the text. But is it really better than ChatGPT, Google Translate and DeepL? In this review we test its features: translations with different styles, work with documents, Excel, PDF, and voice translation.
05:15
Objective-See. Free macOS security utilities | Hothouse
Objective-See is a set of free and open source utilities created by cybersecurity expert Patrick Wardle. These tools help monitor system activity, block malware, and monitor network connections.
05:23
Creating a ChatGPT-based chatbot to communicate with books | AI Ukraine
ChatGPT opens up new possibilities for working with books by allowing you to create a chatbot to interact with the text. This innovative format for interacting with literature allows you to read books in dialog mode, receiving instant answers and explanations
05:36
Phishing Attacks: How Scammers Get Your Data | FIRST RESPONSE
Phishing is when attackers impersonate some third party that you may inadvertently believe. For a colleague at work, for a bank employee or simply for a mailing from some service. It turns out that in such a simple way you can get a huge variety of things: from the password to the mail, to huge sums of money from the company account. And, most importantly, no one is safe from phishing - sooner or later everyone will receive a letter from scammers. And then you can lose access to your accounts, your money, and (if a member of the security services is on the other side) even your freedom
05:50
Flora AI - 19 neural networks in one service | Greenhouse
Flora AI is a new platform for creating content with artificial intelligence. It brings together text, image, and video models in one place, including ChatGPT-4o mini, Claude 3, Gemini 2.0 Flash, Flux, Stable Diffusion, and more. How Flora AI works, how user-friendly its interface is, what features are available in the free version, and whether you should buy a subscription.
05:59
Kling AI. Generate video with neural network | Greenhouse
Kling AI is an innovative video generator developed by Chinese company Kuaishou. AI uses advanced artificial intelligence technologies to create high-quality promt-based videos. The neural network uses 3D solutions to model complex movements and physical interactions of objects, which makes videos more realistic and dynamic.
06:05
"If we don't give away our users, we will be shut down". A conversation about Telegram, the FSB and the state defense order | Important Stories
The main character in the "Important Stories" investigation into Telegram's connection with the FSB is Vladimir Vedeneev, a man who held the position of CFO in the messenger, had the right to sign documents on behalf of Pavel Durov and yet remained in the shadows the whole time.
06:35
What is a bot farm and what does it have to do with Elon Musk and neural networks? | FIRST SECTION
Trolls, bots, bot farms... What do all these things mean, and why is Ilon Musk afraid of them? We analyze in detail what it means when a person is called a "bot" in a social network. Will artificial intelligence make bots more dangerous? And won't cunning bot breeders paint us a whole "Matrix", indistinguishable from real life, already today?
06:51
4 alternatives to ChatGPT: HuggingChat, Le Chat (Mistral AI), Claude, Grok | Greenhouse
Looking for powerful alternatives to ChatGPT? A breakdown of the top 4 AI tools of 2025 with unique features.
07:04
Manus AI. The first autonomous AI agent that works for you | Greenhouse
Manus AI is a revolutionary AI agent from China coming in March 2025 and is already being called the "killer OpenAI Operator".
07:10
How to create presentations using artificial intelligence | AI Ukraine
Creating a presentation with artificial intelligence is made possible by Gamma, Tome, Beautiful AI and Flair neural networks. These tools allow you to make your presentation effective and attractive and not waste time on PowerPoint
07:23
If you pirate movies or TV, you are stealing Ukraine's future. The biggest interview in the history of MEGOGO | TRANSACTION
Egor Yarotsky, Product Director of the multimedia Internet service MEGOGO, is a guest of Alexander Glushchenko. Part 1
08:33
Cheburnet by passport? Sovereign Internet Project | FIRST OFFICE
Russia is going to have a real Cheburnet, just like North Korea - at least that's what MP Andrei Svintsov claims. Entrance to the network is by passport, only sites and services from the authorized list are available, no red tape and full transparency for all intelligence services. If the Internet in Russia is really replaced by such a closed network, it could be a real disaster
08:46
PIKIMOV - free analog of Adobe After Effects? | Teplitsa
IKIMOV is a free online animation and video design tool that is an alternative to the popular Adobe After Effects.
08:51
Riffusion. A music generator that's better than Suno? | Hothouse
Riffusion is a neural network that turns text descriptions into music tracks. Simply enter a style, mood or instruments and AI will generate an audio file.
08:57
Gemini Workspace - working in Google Tables, Docs, Slides | AI Ukraine
Gemini for Workspace - AI capabilities in Google Tables, Docs, Slides, and Mail. Ease of automating tasks and content creation with some pros and cons. Comparison with Microsoft Copilot, identifying differences in integration, functionality, and approaches to productivity in the Google and Microsoft ecosystems.
09:15
AI Agents for Business | AI Ukraine
Oleg Romanov talks about the implementation of AI agents in the UK and the EU. How to create an AI agent for communication and how much it will cost.
10:19
Cheburnet is close! We tell you where Roskomnadzor came from | FIRST DIVISION
Some things quickly become a habit. We have long been accustomed to theft, traffic jams, and bad endings to our favorite TV series. And we have also gotten just as used to the fact that somewhere in Moscow, unknown officials from Roskomnadzor are sitting somewhere and deciding which resources can be allowed and which ones should be blocked
10:36
How to create your own Outline VPN server in 5 minutes | Greenhouse
How to create a private VPN server in 10 minutes with Google Jigsaw's free and open source Outline project - full control, high speed and state-of-the-art Shadowsocks encryption. How to choose a VPS provider, install Outline Manager and Client, and configure and manage your server.
10:44
Eraser. How do I permanently delete files from my computer? | Greenhouse
Normal file deletion does not guarantee data protection, as it can be recovered even after disk formatting. Eraser allows you to safely delete confidential files, set up automatic deletion and clear free space on your hard disk.
10:50
Claude 3 - the most powerful neural network for household use | AI Ukraine
Claude 3 offers powerful capabilities for writing code, analyzing images, and working with documents, surpassing ChatGPT and Gemini in these areas. A guide to using neural networks will help you unlock the full potential of Claude 3 to increase your productivity
11:20
How is Telegram connected to the FSB? What does this mean for you personally? | Important stories
People in Russia, Ukraine, the United States, India, and many other countries around the world trust it with their secrets. Terrorists use it to plan attacks, and Russian security services recruit agents for sabotage abroad. One of the main reasons why hundreds of millions of people around the world trust Telegram is the image created by Pavel Durov as an unwavering freedom fighter, standing up for users' privacy and being persecuted by the authorities of Russia and other countries because of it.
11:43
You want anonymity online. And here's why | FIRST DIVISION
Online anonymity is often criticized. Some say that a person without a name is much more likely to become a network bully. Others insist that only criminals need to hide their identity, because a decent person has nothing to fear. But in fact, anonymity is a vital part of civil society, without which many institutions cannot function
12:01
Scira AI. Free open source AI search engine | Greenhouse
Scira AI is a free open source AI search engine with no registration. It supports GPT-4o, Claude, Grok, Llama, Gemini and other models. 7 search modes are available, including Reddit, YouTube, scientific articles, code, and image analysis, as well as a Buddy feature to save context between sessions.
12:07
Slides AI and Gamma. Neural networks for creating presentations | Greenhouse
Looking for a way to create professional presentations faster? With two powerful AI-powered tools, Slides AI and Gamma, you can create impressive presentations literally on a single request.
12:17
Donate safely! How law enforcers track crypto | FIRST DEPARTMENT
In this video we'll talk about how crypto-transfer tracking works in principle - and how you can protect yourself from it. And at the same time, why it's not safe to donate from regular bank cards
12:31
Pavel Belousov, Nadiyno.org: basic rules of digital hygiene for your safety
Tells you how to practice good internet hygiene and how to choose the right software for your device.
13:39
Perplexity - a new competitor of Internet search engines | AI Ukraine
Perplexity is a powerful neural network that makes it easier to find information on the web thanks to artificial intelligence. A complete guide on how to use Perplexity will help you master all the possibilities for efficient data search on the web.
13:49
LM Studio and Jan AI. How to run a neural network locally and without internet? | Greenhouse
A detailed overview of the free LM Studio and Jan AI programs for running language models on a personal computer with full privacy and without cloud restrictions. The guide covers the installation process, model selection, offline mode setup, and application of local neural networks for various professional tasks.
14:00
Qwen AI, Hailuo AI, Kling AI. Testing Chinese neural networks | Greenhouse
We test three popular Chinese neural networks: Qwen, Hailuo and Kling AI, check their capabilities, learn the pros and cons. How good is Qwen 2.5 MAX and is it really free? How Hailuo works - generating videos and images based on text and photos. How Kling AI can generate images.
14:11
Foreign bloggers praise Russia. Who pays them? | Important Stories
Foreign bloggers criticize the West and entice foreigners to move to Russia to enjoy its "traditional values". They call themselves independent, but as "Important Stories" found out, RT (formerly Russia Today) is responsible for this propaganda for export.
14:25
Kyivstar CEO Oleksandr Komarov: subscriber fee increase, 4G development, 5G launch | Negotiate
Alexander Komarov, the director of the largest mobile operator in Ukraine - Kyivstar, is a guest of Alexander Glushchenkl. This man stood at the origins of mobile communication in Ukraine, managed to pass all the stages of formation of this technology and is ready to share the history of development. Part 2
16:19
Cryptography. Debunking the myth of all-powerful intelligence agencies | FIRST DIVISION
"It is useless to defend yourself, the FSB has access to everything anyway" - these are the words you can often hear online. It seems to many people that it is pointless to resist special services, we can only hope for the best. In fact, it is not so. For example, with the help of cryptography you can protect your data in such a way that the security services will not be able to get to it. The weak link here is the user himself. Today you will learn how this happens in practice.
16:34
ChatGPT is not the only one. Top 5 services for writing texts, creating photos, videos and audio | AI Ukraine
ChatGPT is not the only option. Top 5 MI services that will speed you up, automate your routine and increase your efficiency in writing, creating photos, videos and audio.
16:46
3 free neural networks for image creation | Greenhouse
Creating impressive images with neural networks is getting easier and easier. But not everyone has the opportunity to use Midjourney. But there are alternatives - free AI services with daily limits that allow you to generate images without paid subscriptions.
16:56
Delta Chat. A private messenger that is safe from blocking? | Hothouse
Delta Chat is a decentralized messenger powered by email, making it blockchain-resistant. A detailed account of the messenger's features, including end-to-end encryption, multi-platform support, group chats, and experimental video calls.
17:01
Oleksandr Bornyakov, Mincifra: on regulation of virtual assets in Ukraine, crypto tax | AI Ukraine
Oleksandr Bornyakov on regulation of virtual assets and taxes on cryptocurrency in Ukraine at the stage of digital transformation of the country. Business support and tax innovations through the prism of modern challenges.
18:29
What are the dangers of dipsticks? | FIRST SECTION
Neural networks can generate photorealistic images, compose music, simulate voice and even create videos. This technological innovation is already being used by fraudsters around the world, including crooks in uniform, to create dipfakes - fake video and audio recordings. But what exactly can you achieve with them? And how can it threaten you? Today we will talk about it!
18:46
CRIPTOVALUTES: How to survive without banks abroad and at home | FirstOfOne
Borrowed money from a foreign friend - became a foreign agent. Borrowed money from a foreign friend - became a foreign agent. Supported Ukrainians with donations - went to jail for treason.
18:57
Veo 2 from Google AI Studio. Video generation test and comparison with Kling, Minimax and Runway | Greenhouse
Google AI Studio is a free platform for developers to experiment with generative AI, including the Veo 2 model. We test video generation with Veo 2, parse the settings and compare the results with other neural networks: Kling 1.6, Minimax and Runway.
19:02
Google released a better voice generator? | Hothouse.
Google AI Studio introduces a new voice generator based on Gemini models, allowing you to create both monologues and dialogs with emotional coloring. Overview and details about the functionality, features and current limitations of the free version.
19:10
Without a face: why the state needs your biometrics | FIRST SECTION
Soon it will soon be possible to do many things in Russia without documents and cards: for example, to open a bank account, pay for purchases in a store and get a certificate at the MFC. Convenient, wouldn't you agree? Yes, and most convenient of all for law enforcement agencies, which will have the biometric data of millions of Russians at their full disposal. About the new law obliging banks to give the state recordings of your voices and facial images
19:26
Artificial Intelligence in simple words. A complete guide for beginners | AI Ukraine
How do neural networks work and why are they changing our world? This video explains in simple words the complex concepts of artificial intelligence: how the work of neural networks differs from the human brain, what kinds of neural networks exist, where they are used, and how they will probably change in the future.
19:39
As soon as there is a PROBLEM, everyone wants the INTERNET. Oleksandr Petrunya - HataNet | INTERVIEW
Alexander Glushchenko is a guest of Alexander Petrunya, co-founder of the Internet provider "KhataNet", news agency "Informer Pereyaslav", cafe-bakery "Bulka" from the city of Pereyaslav.
21:49
Hiding data. The secret service method. Steganography | FIRST DIVISION
What if data was not only encrypted, but also hidden so that no one knew it existed? This is what steganography is all about - a way of transmitting and storing information in such a way that no one would know about its existence. This approach appeared in antiquity, was part of spy craft for many hundreds of years, and nowadays has turned into one of the computer science sections: digital steganography
22:04
Get off the radar! How not to give away your location to anyone | FIRST DIVISION
You can be tracked in many different ways. Some you may be aware of, but others you probably haven't even thought about. In this video, you'll learn everything you need to know about them - including how to protect yourself. Hiding from surveillance can be difficult, but it's possible - if you have the knowledge and desire to do so
22:18
Nextcloud. Secure data storage in the cloud | Teplitsa
An overview of Nextcloud - an open platform for creating personal cloud storage. How it differs from commercial services, how to create an account, use built-in features and organize collaboration with full control over your data.
22:25
Open AI.fm - a ChatGPT-based voice transcription model | Greenhouse
OpenAI.fm is a new voice model from OpenAI based on ChatGPT , offering 11 voices, including mood and emotion by voice. The service offers support for more than 100 languages.
22:32
Gemini vs ChatGPT. Writing code, generating images | AI Ukraine
Gemini vs ChatGPT. Which service is better? We compare in the disciplines of code writing, image generation, browsing and factchecking. Instructions on how to form the most effective prompts
23:04
Internet without light, money out of thin air, business raiding, telecom dumping, surviving blackouts | TRANSACTION
Oleksandr Poludov, the founder of UTELS", an Internet provider from Kiev, is a guest of Oleksandr Glushchenko

25 August 2025

00:53
AI employees are replacing humans. AI trends from global startup founder Anna Stepura | AI Ukraine
How to create and where to integrate employee AI. Evolution of the development of AI Agents. What are the risks of integrating AI into companies? AI Trends from Anna Stepura - a founder of three startups with successful exits and experience in Silicon Valley. Alumna of the leading gas pedals in the US: Alchemist Accelerator, Antler and Menlo VC Fellowship. Former CMO (Chief Marketing Officer), expert in AI marketing, building startups from scratch and strategy consulting.
01:48
Memory decline, 'cognitive debt', disappearance of creative agencies? Exploring the consequences of universal AI | Dev.UA
Presenters discuss whether artificial intelligence impairs memory and what "cognitive debt" is. MIT investigated how ChatGPT affects brain function. So here it is: while this tool makes work easier, it simultaneously reduces depth of thought, memory, and creativity.
03:22
GPT-5 capabilities. Communication, code writing and logical tasks | AI Ukraine
ChatGPT-5 is a breakthrough! Your very own scientist in your pocket. Use for communication, logic problems and code writing. Case studies of GPT-5 application in business.