Filters
We're being watched: How SORM works
There is a lot of information of varying degrees of reliability available on the Internet...
1 week agoDonate Safely! How Security Forces Track Crypto
"Recently, the FSB announced that it had detained a Russian accused of treason for transferring...
1 week agoBig Brother. History of surveillance
"Holmes versus Moriarty. Bastrykin versus a magnifying glass. Aristotle versus a press with spikes. The...
1 week agoHow Russia’s FSB Is Structured
The FSB is a massive structure made up of dozens of divisions. Thousands of officers...
2 weeks agoFSB-taxi: special services will trace your every trip
"The FSB will be able to monitor your every taxi ride. According to the new...
3 weeks agoHow Digital Racism Works
AI is increasingly being used for racial segregation and political control — from “smart” surveillance...
3 weeks agoDoes Telegram Work with the FSB?
An investigation into Telegram’s possible ties to the FSB sparked strong reactions and widespread suspicion,...
3 weeks agoCryptography. Debunking the myth of omnipotent intelligence services
"There's no point in defending yourself, the FSB has access to everything anyway" - these...
3 weeks agoHow you can be wiretapped
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 weeks agoMikhail Klimarev’s Lecture: “The History of Digital Resistance in Runet”
Mikhail Klimarev speaks at Reforum Space Berlin about how pressure from Russian authorities on the...
1 month agoHow to Track Any File?
"In this video, we will show you how to use Canary Tokens to protect your...
1 month agoRoskomnadzor's Secret Documents: Who and How Spies on Russians Online
Vladimir Putin's illnesses, the crimes of the Russian army in Ukraine, criticism of the Kremlin...
2 months agoA Wi-Fi router can spy on you
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
3 months agoWhat Stories Does Investigative Journalism Tell?
Journalist Janine Louloudi explores data-driven investigations into complex areas such as using artificial intelligence to...
3 months agoEncryption vs. Government Surveillance
The CEOs of Signal, WhatsApp, Matrix, and Element discuss how to encrypt messaging apps. Governments...
3 months agoWorld Uyghur Congress President on China's Digital Surveillance
World Uyghur Congress President Dolkun Isa talks about China’s surveillance of Uyghurs in Xinjiang. Since...
3 months agoHow to Protect Digital Democracy
Digital authoritarianism is rapidly gaining momentum around the world, offering an alternative model for internet...
3 months agoHow to secure your transfers and hide them from the state
"Financial transfers in Russia have become completely unsafe: due to the “wrong” recipient, you may...
3 months agoSocial network for the major: why Vkontakte will expose you to law enforcement agencies
In Russia, you can get a real prison term for words on the Internet. Law...
3 months agoWhy do ordinary people need cybersecurity?
Want to understand how to protect your data, why and from whom — and whether...
3 months ago