6 Articles

Cryptography and Encryption

6Articles
IntermediateEN

A comprehensive guide to protecting digital data stored on devices against physical seizure and forensic analysis, tailored for the Iranian threat landscape.

Read Article
IntermediateEN

A comprehensive guide on transferring files securely and anonymously within the Iranian internet landscape, bypassing censorship and surveillance mechanisms.

Read Article
IntermediateEN

A comprehensive guide to how data is secured in transit, covering TLS/SSL, standard VPN protocols, and advanced obfuscation methods (V2Ray, Reality, Shadowsocks) necessary to bypass Iranian censorship.

Read Article