19 videos

Filters

0:00 04:17:55
Clear
Element messenger on Matrix: free, anonymous, decentralized, with end-to-end encryption 06:08

Element messenger on Matrix: free, anonymous, decentralized, with end-to-end encryption

"Free, cross-platform, open source, end-to-end encryption by default, the ability to create private and public...

1 week ago
Quantum computer will reveal ALL your secrets (one day) 11:50

Quantum computer will reveal ALL your secrets (one day)

"In the next 10-15 years, we will experience a quantum revolution - no, not like...

1 week ago
Tella: How to encrypt and hide files on Android and iPhone 04:53

Tella: How to encrypt and hide files on Android and iPhone

"In today's world, where digital security does not tolerate negligence, it is invaluable to have...

2 weeks ago
Element course on Matrix #1: What is Element. Startup and registration 04:36

Element course on Matrix #1: What is Element. Startup and registration

"Element is a messenger. More precisely, a corporate messenger. Even more precisely, a free corporate...

2 weeks ago
Guerrilla texting: encrypted text messages in case of an internet outage. 06:12

Guerrilla texting: encrypted text messages in case of an internet outage.

"The probability of Internet shutdown in Russia is high, but we can say with a...

3 weeks ago
Cryptography. Debunking the myth of omnipotent intelligence services 12:10

Cryptography. Debunking the myth of omnipotent intelligence services

"There's no point in defending yourself, the FSB has access to everything anyway" - these...

3 weeks ago
HTTP or HTTPS – How Does it Work and What is the Difference? 05:11

HTTP or HTTPS – How Does it Work and What is the Difference?

"In this video, we'll cover the basics of how the internet works and how using...

1 month ago
Signal President on threats to encrypted messaging 30:49

Signal President on threats to encrypted messaging

Signal President Meredith Whittaker and former Wired Editor-in-Chief Gideon Litchfield discuss the importance of end-to-end...

3 months ago
Encryption vs. Government Surveillance 47:01

Encryption vs. Government Surveillance

The CEOs of Signal, WhatsApp, Matrix, and Element discuss how to encrypt messaging apps. Governments...

3 months ago
How to communicate safely in messengers 02:35

How to communicate safely in messengers

Digital security course: How to communicate in messengers safely, which ones to choose and how...

3 months ago
Safe Mode: How to Encrypt Your Data 12:37

Safe Mode: How to Encrypt Your Data

What happens if your phone falls into the hands of criminals or, even worse, security...

3 months ago
ENIGMA. How the “invincible” cipher was cracked 31:10

ENIGMA. How the “invincible” cipher was cracked

How did Enigma work, why was it needed in the first place — and how...

3 months ago
How to Protect Your Data  | A Guide to Security Basics 18:47

How to Protect Your Data | A Guide to Security Basics

In today's world, your data is the new oil, and cyberspace has become a battlefield....

3 months ago
Learn to encrypt your PC and smartphone in 11 minutes. Instruction for beginners 11:00

Learn to encrypt your PC and smartphone in 11 minutes. Instruction for beginners

Is there a password on your device to log in? Don't rush to think that...

3 months ago
Hiding data. The method of secret services. Steganography 12:33

Hiding data. The method of secret services. Steganography

"You probably know that to protect sensitive data, you need to store it on an...

3 months ago
Delta Chat. A private messenger that is not afraid of blocking? 05:31

Delta Chat. A private messenger that is not afraid of blocking?

Delta Chat is a decentralized messenger that runs on email, making it resistant to blocking....

3 months ago
Picocrypt: portable and very simple encryption program 05:15

Picocrypt: portable and very simple encryption program

Picocrypt is a free, open-source program that does not require installation. It is convenient to...

3 months ago
Mega.nz cloud storage with end-to-end encryption and free 20 GB of disk space 06:27

Mega.nz cloud storage with end-to-end encryption and free 20 GB of disk space

"Can anyone compete with Google Drive? If you don't take into account the entire Google...

3 months ago
Cryptographic Privacy and Transparency 44:55

Cryptographic Privacy and Transparency

"Ahmed Ghappur is an associate professor of law at Boston University and general counsel at...