15 videos

Filters

0:00 04:17:55
Clear
Tella: How to encrypt and hide files on Android and iPhone 04:53

Tella: How to encrypt and hide files on Android and iPhone

"In today's world, where digital security does not tolerate negligence, it is invaluable to have...

2 weeks ago
What is OONI Probe 06:55

What is OONI Probe

OONI Probe is a free software for measuring Internet censorship and collecting data on website...

2 weeks ago
Jami messenger: messenger with Briar-like security and Telegram functionality 05:59

Jami messenger: messenger with Briar-like security and Telegram functionality

"There are many secure messengers, but they all sacrifice functionality for security. Jami differs from...

3 weeks ago
Gadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED 54:36

Gadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED

Russian security forces can hack any phone and gain access to your correspondence using automated...

2 months ago
Mandatory settings for iPhone owners 00:52

Mandatory settings for iPhone owners

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

3 months ago
Settings that every iPhone owner should know 00:38

Settings that every iPhone owner should know

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

3 months ago
Tips from Nadiyno.org: is Apple technology secure? 03:23

Tips from Nadiyno.org: is Apple technology secure?

Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...

3 months ago
What you need to know about smartphone security on the go 34:28

What you need to know about smartphone security on the go

Discussion of measures of digital security in the context of mobilization in Russia September 21,...

3 months ago
How to Choose a VPN to Bypass Blockages and Encrypt Traffic 10:50

How to Choose a VPN to Bypass Blockages and Encrypt Traffic

Russia has been censoring and blocking websites for a decade, and since the start of...

3 months ago
Cryptocurrencies: How to Survive without Banks Abroad and at Home 10:50

Cryptocurrencies: How to Survive without Banks Abroad and at Home

Cryptocurrencies are decentralized electronic money that, unlike fiat currencies, are not controlled by governments or...

3 months ago
Lock Mode on iPhone. What is it, why and how to enable it? 03:06

Lock Mode on iPhone. What is it, why and how to enable it?

Smartphone software may be vulnerable. Manufacturers release "patches" that fix problems, but this does not...

3 months ago
Pegasus. How Spyware Works and is it Possible to Protect Yourself from It
55:03

Pegasus. How Spyware Works and is it Possible to Protect Yourself from It

"Phones store personal data and can be the target of covert hacking using spyware. Samat...

4 months ago
Are Passwords Out of Date? Let's Talk Authentication 40:33

Are Passwords Out of Date? Let's Talk Authentication

"Passwords are no longer considered reliable protection. Samat Galimov and information security expert Karim Valiev...

6 months ago
Let's Talk about Software Limitations
35:31

Let's Talk about Software Limitations

"The functionality of the device changes depending on the conditions of use due to software...

6 months ago
How Apps Get onto Our Devices

46:04

How Apps Get onto Our Devices

"The choice between convenience and freedom is not a technical decision, but a political and...

7 months ago