Filters
Guerrilla texting: encrypted text messages in case of an internet outage.
The probability of Internet shutdown in Russia is high, but we can say with a...
4 weeks agoPuter. Operating system in a browser
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 weeks agoBest Free AI Tools in 2024
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
1 month ago"If we don't give up users, we'll be shut down." A conversation about Telegram, the FSB, and state defense procurement
The main character of the investigation by "Important Stories" about the connection between Telegram and...
1 month agoPrivacy in the age of AI
A recording of a community call dedicated to the future of DAOs (Decentralized Autonomous Organizations—organizations...
1 month agoRobots: What We've Taught Them Over the Last 100 Years
How robots evolved from the heavy automatons of the 18th century to today's smart and...
2 months agoPrayer and scammers. How they steal money and data in prayer groups.
In prayer publics, they quote the Bible, publish prayers for all occasions. And they pray...
2 months agoGetting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 months agoHistorical Cartography
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months agoBattle for Soledar in Minecraft. Cybersports and Russian propaganda
How does Russia use eSports to spread its propaganda? And why are video games a...
2 months agoWhy Telegram has Become the Center of Digital Life
How Telegram works and what makes it stand out among other digital platforms, besides the...
2 months agoResources that will make your life easier
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months agoWhat IPv4 can't do?
IPv4 continues to operate in Ukraine, but its capabilities are already limited due to the...
2 months agoArtificial Intelligence. How Russia uses AI in information warfare
Russia is already using artificial intelligence in the war against Ukraine. To promote fakes and...
2 months agoHow do we manipulate with the truth?
Is it possible to recognize an expert? Or is it still a utopia? How do...
2 months agoWhich Antivirus is the Best?
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months agoHedra AI, LivePortrait, Heygen Expressive Photo Avatar: Best Tools for Facial Animation
A review of three of the newest and best neural networks for face animation. From...
2 months agoArtificial Intelligence: Can Machines Think Like Humans?
AI is already capable of what was long considered uniquely human: creating texts, solving problems,...
2 months agoPika Art - a neural network for video generation
Pika is a neural network video platform. Here pictures are "animated" and videos are created...
2 months agoHow does CERT-UA help energy companies, why is it important to connect to MISP?
Ukraine's energy facilities are hackers' top targets. CERT-UA's Evgeniy Briksin explains how the MISP platform...
2 months ago