Filters
Donate Safely! How Security Forces Track Crypto
"Recently, the FSB announced that it had detained a Russian accused of treason for transferring...
1 week agoWhat is the danger of the Russian app store RuStore?
When you buy a phone, it already has many applications installed. Games, social networks, manufacturer's...
2 weeks agoTails: secure OS on Debian Linux. Portable version
"Tails is a great solution if you need to work on someone else's computer and...
2 weeks agoChrome is out of Fashion? Here are the Top 10 More Interesting Options!
"Google Chrome holds 66% of the browser market, but should you trust it? In this...
2 weeks agoElement course on Matrix #1: What is Element. Startup and registration
"Element is a messenger. More precisely, a corporate messenger. Even more precisely, a free corporate...
2 weeks agoWho has Access to your Personal Data?
When you allow health apps to access your personal data, do you think about what...
2 weeks agoJami messenger: messenger with Briar-like security and Telegram functionality
"There are many secure messengers, but they all sacrifice functionality for security. Jami differs from...
3 weeks agoAltSendme: How to Share Files Without the Cloud — Fast and Private
AltSendme is an app for direct P2P file transfer without clouds, registration, or intermediary servers....
3 weeks agoHow your data is being sold. Protecting yourself from breaches
Your data is being traded on the Internet. Moreover, a criminal can buy not only...
3 weeks agoMandatory Telegram settings for everyone
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
3 weeks agoWhat Someone Can Learn About Your Day by Collecting Information from Your Devices?
When you interact with devices and platforms, you give them the opportunity to collect your...
4 weeks agoHow to Hide Apps and Files on Your Smartphone
An overview of reliable ways to hide personal apps, photos, and data on Android and...
4 weeks agoAnonymous Browsing on the Web Part 2
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 weeks agoTor Hidden Services
People need tools to ensure privacy. What are Tor Hidden Services and how can they...
4 weeks agoTips from Nadiyno.org: choosing a reliable VPN
Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...
4 weeks agoHow you can be wiretapped
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 weeks agoTips from Nadiyno.org: how many messengers should you install on your computer
Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...
1 month agoWhat to do if Telegram is hacked
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
1 month agoCloudflare WARP: The Easy Way to Protect Your Internet Traffic
To prevent anyone from seeing what you do online, use Cloudflare WARP - a simple...
2 months agoPrivate Alternatives to Popular Services
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months ago