VPN through I2P: wireguard & i2pd
Guide on how to run VPN through I2P. Complete description of server and client configuration. Sleight of hand and flexibility of mind — please see under the cut!
Guide on how to run VPN through I2P. Complete description of server and client configuration. Sleight of hand and flexibility of mind — please see under the cut!
In the article "Reign of king: tactics and tools of the Obstinate Mogwai group" from the Solar 4Rays Cyber Threat Research Center, there is an interesting case of an…
My name is Kuzma Khrabrov, I am a research engineer at AIRI and I work on tasks at the intersection of machine learning, quantum chemistry, and computational biology.…
United Kingdom, 1907. Returning from the front of the Anglo-Boer War, Sir Robert Stephenson Smyth Baden-Powell founded the Scout movement. The goal was simple and ambitious:…
Hello tekkix members! On the eve of the New Year, I want to share with you my experience of making a craft based on a free devboard from a conditionally disposable product.…
Among the bright symbols of the Middle Ages are sorcerers, witches, and alchemists who "enchant and turn mercury into gold." Cryptography at this time also went hand…
Throughout 2024, we have witnessed a lot of high-profile hacks, leaks, failures, and just funny news from the world of information security. For the New Year, we traditionally…
Hello, tekkix! My name is Andrey Chernov, I am a Java architect at SberTech, where I develop the architecture of microservices. Now I will talk about the nuances of working…
New Year's holidays are a great time to rewatch movies or reread books about Harry Potter. Under the light of the Christmas tree garland, you can once again immerse yourself…
We are currently experiencing a revolutionary period when neural networks and AI are no longer something distant and alien, and are becoming more and more firmly established…
Hello, tekkix! My name is Natali Dubotolkova, I am a senior secure software development engineer at Basis. I want to talk about how we thought about integrating the work…
Hello, this is Elena Kuznetsova, an automation specialist at Sherpa Robotics. Today I have translated an article for you dedicated to security in the field of artificial…
Faces and names mentioned in this blog are real and used with their permission. Some details have been edited or hidden to protect the privacy of others.
Hello, my name is Egor and I am a Tech Lead at IdaProject :) I am engaged in strategy, processes, and teams in the direction of backend development.
For most developers, tests are the least favorite part of the job. Recently, we confirmed this by surveying more than 400 developers at the Joker and Heisenbug conferences…
Creating innovations quickly and flexibly can be done in a startup or a small company, but what if you are an industrial giant with more than 25 factories across the…
Hello everyone! The classic approach to authorization is when its control is placed inside a specific service in the form of static rules. That is, the role and rights…