Quick Guide to Online Anonymity: Encryption Types, Traffic Protection, and Choosing the Right Security Tools

Date: 21/08/2025

It doesn’t matter why you want to encrypt what you send over the Internet. Maybe you care about the privacy of your personal data, maybe you’re trying to bypass government restrictions, or you have other reasons. Today, everyday users have access to a solid range of cryptographically strong protocols and the software that implements them. In this article, we’ll walk through the major categories of these solutions (many of them well known), discuss their security, and review the available implementations.
Read full article →


Intercepting and Decoding RF Remote Control Signals with SDR

Date: 20/08/2025

If the word “radio” only brings to mind your grandpa’s old Grundig or Okean, that’s a pretty narrow view. We live in the age of wireless devices, the Internet of Things, 5G, and all sorts of other innovations. More and more data travels over the air, so a good specialist needs to understand radio protocols. I’ll show you how to capture signals, where to find them, and how to analyze them.
Read full article →