Filters
Guerrilla texting: encrypted text messages in case of an internet outage.
The probability of Internet shutdown in Russia is high, but we can say with a...
4 weeks agoElement messenger on Matrix: free, anonymous, decentralized, with end-to-end encryption
Free, cross-platform, open source, end-to-end encryption by default, the ability to create private and public...
4 weeks agoQuantum computer will reveal ALL your secrets (one day)
In the next 10-15 years, we will experience a quantum revolution - no, not like...
2 months agoTella: How to encrypt and hide files on Android and iPhone
In today's world, where digital security does not tolerate negligence, it is invaluable to have...
2 months agoElement course on Matrix #1: What is Element. Startup and registration
Element is a messenger. More precisely, a corporate messenger. Even more precisely, a free corporate...
2 months agoCryptography. Debunking the myth of omnipotent intelligence services
"There's no point in defending yourself, the FSB has access to everything anyway" - these...
2 months agoHTTP or HTTPS – How Does it Work and What is the Difference?
In this video, we'll cover the basics of how the internet works and how using...
3 months agoSignal President on threats to encrypted messaging
Signal President Meredith Whittaker and former Wired Editor-in-Chief Gideon Litchfield discuss the importance of end-to-end...
5 months agoEncryption vs. Government Surveillance
The CEOs of Signal, WhatsApp, Matrix, and Element discuss how to encrypt messaging apps. Governments...
5 months agoHow to communicate safely in messengers
Digital security course: How to communicate in messengers safely, which ones to choose and how...
5 months agoSafe Mode: How to Encrypt Your Data
What happens if your phone falls into the hands of criminals or, even worse, security...
5 months agoENIGMA. How the “invincible” cipher was cracked
How did Enigma work, why was it needed in the first place — and how...
5 months agoHow to Protect Your Data | A Guide to Security Basics
In today's world, your data is the new oil, and cyberspace has become a battlefield....
5 months agoLearn to encrypt your PC and smartphone in 11 minutes. Instruction for beginners
Is there a password on your device to log in? Don't rush to think that...
5 months agoHiding data. The method of secret services. Steganography
You probably know that to protect sensitive data, you need to store it on an...
5 months agoDelta Chat. A private messenger that is not afraid of blocking?
Delta Chat is a decentralized messenger that runs on email, making it resistant to blocking....
5 months agoPicocrypt: portable and very simple encryption program
Picocrypt is a free, open-source program that does not require installation. It is convenient to...
5 months agoMega.nz cloud storage with end-to-end encryption and free 20 GB of disk space
Can anyone compete with Google Drive? If you don't take into account the entire Google...
5 months agoCryptographic Privacy and Transparency
Ahmed Ghappur is an associate professor of law at Boston University and general counsel at...