Filters
Element messenger on Matrix: free, anonymous, decentralized, with end-to-end encryption
"Free, cross-platform, open source, end-to-end encryption by default, the ability to create private and public...
1 week agoQuantum computer will reveal ALL your secrets (one day)
"In the next 10-15 years, we will experience a quantum revolution - no, not like...
1 week agoDonate Safely! How Security Forces Track Crypto
"Recently, the FSB announced that it had detained a Russian accused of treason for transferring...
1 week agoTella: How to encrypt and hide files on Android and iPhone
"In today's world, where digital security does not tolerate negligence, it is invaluable to have...
2 weeks agoGuerrilla texting: encrypted text messages in case of an internet outage.
"The probability of Internet shutdown in Russia is high, but we can say with a...
3 weeks agoCryptography. Debunking the myth of omnipotent intelligence services
"There's no point in defending yourself, the FSB has access to everything anyway" - these...
3 weeks agoHTTP or HTTPS – How Does it Work and What is the Difference?
"In this video, we'll cover the basics of how the internet works and how using...
1 month agoWe Are Looking for Miners on Your Computer
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
3 months agoAlexander Bornyakov, Ministry of Digital Development: on regulation of virtual assets in Ukraine, tax on crypto
Alexander Bornyakov on the regulation of virtual assets and taxes on cryptocurrency in Ukraine at...
3 months agoSignal President on threats to encrypted messaging
Signal President Meredith Whittaker and former Wired Editor-in-Chief Gideon Litchfield discuss the importance of end-to-end...
3 months agoEncryption vs. Government Surveillance
The CEOs of Signal, WhatsApp, Matrix, and Element discuss how to encrypt messaging apps. Governments...
3 months agoHow to communicate safely in messengers
Digital security course: How to communicate in messengers safely, which ones to choose and how...
3 months agoHow to secure your transfers and hide them from the state
"Financial transfers in Russia have become completely unsafe: due to the “wrong” recipient, you may...
3 months agoSafe Mode: How to Encrypt Your Data
What happens if your phone falls into the hands of criminals or, even worse, security...
3 months agoENIGMA. How the “invincible” cipher was cracked
How did Enigma work, why was it needed in the first place — and how...
3 months agoBig Laundry. The Art of Money Laundering
The term “money laundering” has been around for over 80 years, and there are countless...
3 months agoHow to Protect Your Data | A Guide to Security Basics
In today's world, your data is the new oil, and cyberspace has become a battlefield....
3 months agoLearn to encrypt your PC and smartphone in 11 minutes. Instruction for beginners
Is there a password on your device to log in? Don't rush to think that...
3 months agoHiding data. The method of secret services. Steganography
"You probably know that to protect sensitive data, you need to store it on an...
3 months agoCryptocurrencies: How to Survive without Banks Abroad and at Home
Cryptocurrencies are decentralized electronic money that, unlike fiat currencies, are not controlled by governments or...
3 months ago