Filters
Cloudflare WARP: The Easy Way to Protect Your Internet Traffic
To prevent anyone from seeing what you do online, use Cloudflare WARP - a simple...
3 weeks agoAnonymization and creating a virtual identity
Analysis of methods of ensuring anonymity on the Internet: how to lead an active digital...
3 weeks agoLeonid Yuldashev, eQualitie project coordinator: Ceno Browser as a tool for ensuring access to information during the splinterization of the Internet
eQtalk is an original project by the eQtv channel. Alexander Glushchenko hosts eQualitie project coordinator...
3 weeks agoHow Microsoft Will Force You to Abandon Windows 10
Windows 10 is officially becoming a thing of the past: security updates are ending, and...
3 weeks agoWhether Telegram is safe and how to secure it
‘Is Telegram Safe?’ – a question that is harder to answer than Hamlet’s ‘to be...
4 weeks agoWhat you need to know about smartphone security on the go
Discussion of measures of digital security in the context of mobilization in Russia September 21,...
4 weeks agoGuerrilla texting: encrypted text messages in case of an internet outage.
The probability of Internet shutdown in Russia is high, but we can say with a...
4 weeks agoGuerrilla Telegram will hide dangerous chats, clean the cache and cover all traces in case of danger
During registration, Telegram requires a phone number and links your account to it; chat data...
4 weeks agoWhat is the danger of the Russian app store RuStore?
When you buy a phone, it already has many applications installed. Games, social networks, manufacturer's...
4 weeks agoHiddify: Create Your Own VPN in 10 Minutes | Complete 2025 Guide
A simple guide to deploying your own VPN server using Hiddify Manager—an open-source solution with...
4 weeks agoOleksandr Glushchenko, Pavlo Belousov: MAХ messenger – delete it IMMEDIATELY!
Pavel Belousov, technical lead for the Nadiyno.org digital help hotline, gives recommendations to Internet users:...
4 weeks agoTips from Nadiyno.org: how to recognise fraudsters on the internet
Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...
4 weeks agoCourse on Element on Matrix #2: What is Matrix. How to choose a server
In the second lesson, we will talk in a little more detail about the Matrix...
4 weeks agoHow Adult Sites Collect and Sell Your Data — and What to Do About It
An analysis of the investigation by Microsoft Research about how the industry entertains some —...
4 weeks agoHow do you know if your phone has been hacked?
Most of you store your most valuable data on your phone: correspondence, routes, payment information,...
4 weeks agoElement messenger on Matrix: free, anonymous, decentralized, with end-to-end encryption
Free, cross-platform, open source, end-to-end encryption by default, the ability to create private and public...
4 weeks agoBypassing blocking - banned content. Can we get out of this?
From March 1, 2024, Roskomnadzor will begin to block instructions for bypassing the blocks. In...
4 weeks agoBuilt-in SOS function - panic button - in Android phones (Xiaomi example)
The function of automatically sending SMS to pre-selected contacts in case of danger to life...
1 month agoSimpleX Chat #2: overview of the main features
We talked about what SimpleX Chat is in the first video, today we will look...
1 month agoSimpleX Chat: UserID-free messenger with maximum protection for your messages
The secure messenger market is growing. We have already reviewed at least ten secure messengers,...
1 month ago