Filters
Tella: How to encrypt and hide files on Android and iPhone
"In today's world, where digital security does not tolerate negligence, it is invaluable to have...
2 weeks agoWhat is OONI Probe
OONI Probe is a free software for measuring Internet censorship and collecting data on website...
2 weeks agoJami messenger: messenger with Briar-like security and Telegram functionality
"There are many secure messengers, but they all sacrifice functionality for security. Jami differs from...
3 weeks agoGadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED
Russian security forces can hack any phone and gain access to your correspondence using automated...
2 months agoMandatory settings for iPhone owners
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
3 months agoSettings that every iPhone owner should know
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
3 months agoTips from Nadiyno.org: is Apple technology secure?
Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...
3 months agoWhat you need to know about smartphone security on the go
Discussion of measures of digital security in the context of mobilization in Russia September 21,...
3 months agoHow to Choose a VPN to Bypass Blockages and Encrypt Traffic
Russia has been censoring and blocking websites for a decade, and since the start of...
3 months agoCryptocurrencies: How to Survive without Banks Abroad and at Home
Cryptocurrencies are decentralized electronic money that, unlike fiat currencies, are not controlled by governments or...
3 months agoLock Mode on iPhone. What is it, why and how to enable it?
Smartphone software may be vulnerable. Manufacturers release "patches" that fix problems, but this does not...
3 months agoPegasus. How Spyware Works and is it Possible to Protect Yourself from It
"Phones store personal data and can be the target of covert hacking using spyware. Samat...
4 months agoAre Passwords Out of Date? Let's Talk Authentication
"Passwords are no longer considered reliable protection. Samat Galimov and information security expert Karim Valiev...
6 months agoLet's Talk about Software Limitations
"The functionality of the device changes depending on the conditions of use due to software...
6 months agoHow Apps Get onto Our Devices
"The choice between convenience and freedom is not a technical decision, but a political and...
7 months ago