Filters
Element messenger on Matrix: free, anonymous, decentralized, with end-to-end encryption
"Free, cross-platform, open source, end-to-end encryption by default, the ability to create private and public...
1 week agoQuantum computer will reveal ALL your secrets (one day)
"In the next 10-15 years, we will experience a quantum revolution - no, not like...
1 week agoTella: How to encrypt and hide files on Android and iPhone
"In today's world, where digital security does not tolerate negligence, it is invaluable to have...
2 weeks agoElement course on Matrix #1: What is Element. Startup and registration
"Element is a messenger. More precisely, a corporate messenger. Even more precisely, a free corporate...
2 weeks agoGuerrilla texting: encrypted text messages in case of an internet outage.
"The probability of Internet shutdown in Russia is high, but we can say with a...
3 weeks agoCryptography. Debunking the myth of omnipotent intelligence services
"There's no point in defending yourself, the FSB has access to everything anyway" - these...
3 weeks agoHTTP or HTTPS – How Does it Work and What is the Difference?
"In this video, we'll cover the basics of how the internet works and how using...
1 month agoSignal President on threats to encrypted messaging
Signal President Meredith Whittaker and former Wired Editor-in-Chief Gideon Litchfield discuss the importance of end-to-end...
3 months agoEncryption vs. Government Surveillance
The CEOs of Signal, WhatsApp, Matrix, and Element discuss how to encrypt messaging apps. Governments...
3 months agoHow to communicate safely in messengers
Digital security course: How to communicate in messengers safely, which ones to choose and how...
3 months agoSafe Mode: How to Encrypt Your Data
What happens if your phone falls into the hands of criminals or, even worse, security...
3 months agoENIGMA. How the “invincible” cipher was cracked
How did Enigma work, why was it needed in the first place — and how...
3 months agoHow to Protect Your Data | A Guide to Security Basics
In today's world, your data is the new oil, and cyberspace has become a battlefield....
3 months agoLearn to encrypt your PC and smartphone in 11 minutes. Instruction for beginners
Is there a password on your device to log in? Don't rush to think that...
3 months agoHiding data. The method of secret services. Steganography
"You probably know that to protect sensitive data, you need to store it on an...
3 months agoDelta Chat. A private messenger that is not afraid of blocking?
Delta Chat is a decentralized messenger that runs on email, making it resistant to blocking....
3 months agoPicocrypt: portable and very simple encryption program
Picocrypt is a free, open-source program that does not require installation. It is convenient to...
3 months agoMega.nz cloud storage with end-to-end encryption and free 20 GB of disk space
"Can anyone compete with Google Drive? If you don't take into account the entire Google...
3 months agoCryptographic Privacy and Transparency
"Ahmed Ghappur is an associate professor of law at Boston University and general counsel at...