Information safety

– Vulnerability analysis of IT devices and network and possibility of information leakage

– Vulnerability analysis of surveillance cameras and recorders

– Vulnerability analysis of computers and smart phone

Activities on the flow of information leakage

  • search of bug detectors
  • creation of “blind radio-frequency spot”
  • GPS signal suppression
  • fight against drones surveillance

-The establishment of protected communications channels

-Crypto phones, VPN, special software

– Activities on providing your privacy and anonymity in network