30 videos

Filters

0:00 04:17:55
Clear
How can any phone be hacked? The elusive Pegasus. 21:57

How can any phone be hacked? The elusive Pegasus.

"Pegasus is the most famous hacker software in the world, which almost everyone has heard...

6 days ago
Tails: secure OS on Debian Linux. Portable version 05:24

Tails: secure OS on Debian Linux. Portable version

"Tails is a great solution if you need to work on someone else's computer and...

2 weeks ago
Mullvad Browser. How to reduce your digital footprint and protect your anonymity? 05:22

Mullvad Browser. How to reduce your digital footprint and protect your anonymity?

Mullvad Browser is an open source browser for those who value privacy and anonymity on...

4 weeks ago
Anonymous Browsing on the Web Part 2 00:29

Anonymous Browsing on the Web Part 2

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

4 weeks ago
Tor Hidden Services 02:59

Tor Hidden Services

People need tools to ensure privacy. What are Tor Hidden Services and how can they...

4 weeks ago
Dangerous comments! What, where and how to post on YouTube? 10:00

Dangerous comments! What, where and how to post on YouTube?

Is it possible to write these or other things in the comments? And in general,...

4 weeks ago
The secret to advanced anonymity! Install Whonix 18:37

The secret to advanced anonymity! Install Whonix

If you need anonymity on the network not for the sake of interest, but for...

1 month ago
Who Needs the Darknet and How to Use It 17:44

Who Needs the Darknet and How to Use It

Everyone from 8 months to 88 years old “knows” that the dark net is a...

1 month ago
What's New on the Dark Web? 06:33

What's New on the Dark Web?

"The Darknet is constantly changing, and today we'll look at the latest resources, interesting sites,...

1 month ago
Cloudflare WARP: The Easy Way to Protect Your Internet Traffic 05:22

Cloudflare WARP: The Easy Way to Protect Your Internet Traffic

To prevent anyone from seeing what you do online, use Cloudflare WARP - a simple...

2 months ago
Anonymization and creating a virtual identity 01:17:35

Anonymization and creating a virtual identity

Analysis of methods of ensuring anonymity on the Internet: how to lead an active digital...

2 months ago
You need anonymity online. And that's why 17:37

You need anonymity online. And that's why

Anonymity on the Internet is not only a tool of hackers, but also a key...

2 months ago
Anonymous Browsing on the Web Part 1 00:33

Anonymous Browsing on the Web Part 1

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

3 months ago
Introduction to Digital Security Course 02:53

Introduction to Digital Security Course

Course description, introduction to mascot Kida

3 months ago
How to secure your transfers and hide them from the state 07:47

How to secure your transfers and hide them from the state

"Financial transfers in Russia have become completely unsafe: due to the “wrong” recipient, you may...

3 months ago
TOR in Russia: how to stay anonymous 08:51

TOR in Russia: how to stay anonymous

You've probably heard at least once about the TOR browser, which provides complete anonymity on...

3 months ago
How Adult Sites Collect and Sell Your Data — and What to Do About It 13:16

How Adult Sites Collect and Sell Your Data — and What to Do About It

An analysis of the investigation by Microsoft Research about how the industry entertains some —...

3 months ago
Tails is ultimatum security on Snowden's orders 23:19

Tails is ultimatum security on Snowden's orders

How to go online without leaving a trace? Is it possible to publish something while...

3 months ago
How are Telegram users de-anonymized? The Laplace demon. 13:19

How are Telegram users de-anonymized? The Laplace demon.

It has long been known that Telegram users can be de-anonymized using leaked databases of...

3 months ago
How do they calculate anonymous authors? Let's talk about stylometry 13:58

How do they calculate anonymous authors? Let's talk about stylometry

"How to identify an anonymous author if they left no digital trace? You need to...

3 months ago