Filters
Are neural networks starting to show character? AI preferences
It's time to uncover the secrets of the digital "soul" of artificial intelligence and answer...
1 week agoVisualizing our text files
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 weeks agoQuantum computer will reveal ALL your secrets (one day)
"In the next 10-15 years, we will experience a quantum revolution - no, not like...
2 weeks agoBig Brother. History of surveillance
"Holmes versus Moriarty. Bastrykin versus a magnifying glass. Aristotle versus a press with spikes. The...
2 weeks agoWhat is the danger of the Russian app store RuStore?
When you buy a phone, it already has many applications installed. Games, social networks, manufacturer's...
2 weeks agoChrome is out of Fashion? Here are the Top 10 More Interesting Options!
"Google Chrome holds 66% of the browser market, but should you trust it? In this...
2 weeks agoCybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 weeks agoGretel bot in Telegram will remove you from all pre-selected groups in case of danger
Telegram bot Gretel_sos_bot is designed to perform just one simple function, but it can cost...
3 weeks agoCopilot: Complete Guide to Using It in 2026
A detailed guide to Microsoft Copilot 365 and its capabilities in 2026. The video covers...
3 weeks agoWho has Access to your Personal Data?
When you allow health apps to access your personal data, do you think about what...
3 weeks agoHow your data is being sold. Protecting yourself from breaches
Your data is being traded on the Internet. Moreover, a criminal can buy not only...
4 weeks agoFSB-taxi: special services will trace your every trip
"The FSB will be able to monitor your every taxi ride. According to the new...
4 weeks agoWhat Someone Can Learn About Your Day by Collecting Information from Your Devices?
When you interact with devices and platforms, you give them the opportunity to collect your...
4 weeks agoInterpreting OONI data
OONI data are the results of OONI Probe tests that show the accessibility and possible...
4 weeks agoHow to Hide Apps and Files on Your Smartphone
An overview of reliable ways to hide personal apps, photos, and data on Android and...
4 weeks agoWhy AI Needs Decentralized Data
Clara Tsao, founding officer and director of the Filecoin Foundation, delivers a compelling talk on...
1 month agoHow to Track Any File?
"In this video, we will show you how to use Canary Tokens to protect your...
2 months agoPrivacy Settings for Popular Services
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months agoGadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED
Russian security forces can hack any phone and gain access to your correspondence using automated...
2 months agoServices to simplify your life, part 3
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
3 months ago