Information safety
– Vulnerability analysis of IT devices and network and possibility of information leakage
– Vulnerability analysis of surveillance cameras and recorders
– Vulnerability analysis of computers and smart phone
Activities on the flow of information leakage
- search of bug detectors
- creation of “blind radio-frequency spot”
- GPS signal suppression
- fight against drones surveillance
-The establishment of protected communications channels
-Crypto phones, VPN, special software
– Activities on providing your privacy and anonymity in network