Pull to refresh

Development

Show first
Rating limit
Level of difficulty

MAX permissions for Android. Comparing with Telegram and WhatsApp*

Level of difficultyEasy
Reading time10 min
Reach and readers363

Hello everyone!

I, at my own risk, decided to install MAX and see what happens after installation. My research will result in at least 2 articles.

This is the first article. In it, I will compare the permissions requested by the MAX app for Android with the permissions requested by Telegram and WhatsApp.

Read more

Installing and Configuring Hysteria

Level of difficultyEasy
Reading time10 min
Reach and readers897

This year, like many Habr visitors, I read with great interest the articles by the respected MiraclePtr, learned to apply his ideas and recommendations, and got practical experience with protocols, clients, and graphical panels. For many protocols, there are detailed installation and configuration instructions available to even the most inexperienced users who are just starting to explore the world of Linux.

I finally got around to the protocol briefly described in the article "Modern Anti-Censorship Technologies: V2Ray, XRay, XTLS, Hysteria, Cloak, and Everything Else" — the Hysteria protocol, which has already reached its second version. And I couldn't find a comprehensive Russian-language guide for it, which prompted me to gather all the information in one place once I figured out the main issues of installing and configuring the server and clients for using this protocol to bypass blocking.

Read more

OSINT: A Toolkit for Analyzing VK Profiles

Reading time2 min
Reach and readers305

The vast majority of the OSINT community is interested in analyzing individuals. Well, so be it. I've prepared a selection of various bots and services for you (GB and others are not included in the list, as even the lazy know about them, and it's not really OSINT anyway).

In the RU segment, VK is the pioneer of social media analysis. Although Telegram has started to move away from being just a messenger, transforming into a social network and gaining more and more popularity, it still doesn't come close to the volume of potentially important information about a target.

It's worth noting that VKontakte is already starting to die out, and in my opinion, in two or three years, analysis of it will no longer be as relevant as it once was. People are using it noticeably less often. Still, VK remains a key tool for analyzing a person's biography, interests, social circle, origin, etc.

1. 220vk An old, good, and rather worn-out service that allows you to identify hidden friends, find out who the target has followed/unfollowed, and their interests based on subscriptions to communities and people (with a timeline), as well as what changes have been made to their profile, etc.

2. VKHistoryRobot A Telegram bot that gives you an idea of what a profile looked like in the past(very useful if the profile is private). It provides information in the form of a brief dump: Full Name; URL; photo.

3. FindClone, search4faces reverse image search services for VK that allow you to search for a profile using an uploaded photo. Of these two, search4faces is free.

4. Social Graph Bot a Telegram bot that allows you to build relationship graphs among a list of friends. With this tool, you will understand how diverse the social circle is, who among the friends is a relative, etc.; whether the account is legitimate and if it has connections to any group of people. (There are many applications, here is a guide from habr for you)

You can find even more interesting and educational content on my Telegram channel @secur_researcher

Read more

How I Regained Access to My Telegram Account

Level of difficultyEasy
Reading time3 min
Reach and readers325

There are several similar articles on this topic, but while I was trying to recover my account, I never saw this solution, so I decided to post it. I hope it will help someone.

I'll say right away that this situation happened before the 'boom' in the news about Telegram hacks, so it wasn't as well-known.

The whole story began when an acquaintance of mine wrote to me and asked for help in restoring access to her Telegram account. I was immediately surprised because I didn't think Telegram accounts were hacked at all, as login is usually by phone number, and without having the phone, you can only log in with a QR code or a code from the messenger itself.

Well, what could I do? I started trying to log into the account. Naturally, the app made it clear that I wouldn't be able to do so anytime soon.

Read more

How to get YouTube and Discord working: the most effective methods, from Zapret to setting up your own VPN server

Reading time4 min
Reach and readers504

Well, there have been quite a few articles on these topics, but I want to share the tools and experience that, in my practice, have proven to be very convenient and of high quality. There will be both individual methods for specific applications and universal ones that will help solve problems all at once.

VPN server

Well, let's probably start with the simplest and most universal method that will help you with everything: setting up your own VPN server on protocols like shadowsocks, openvpn, vless, vmess, trojan. The main advantage is that with a good client, the ping will be minimal. Many use Outline, which is very laggy, or v2rayN, which works much better. Speaking of other cool and high-quality clients, you can try Hiddify. If you know of any better ones, you can write about them in the comments. The essence is simple: you can buy a server and install everything yourself; there are plenty of guides,here'sone I personally used, everything is intuitive and without any problems. It solves absolutely all blocks for YouTube, Telegram, Discord, X (Twitter), and ChatGPT.

2. Next, let's move on to a method that helps with Discord and YouTube.

Read more

Why RAM prices skyrocketed in late 2025 and whether you should upgrade now

Level of difficultyMedium
Reading time7 min
Reach and readers377

In the fall of 2025, many people, myself included, opened their favorite hardware store to 'quickly grab another 32–64 GB of DDR5 for games, an IDE, and a couple of Docker containers'—only to close the tab in mild culture shock. The memory that cost a 'reasonable' amount in the summer suddenly cost almost as much as a mid-range graphics card.

In short, this isn't 'greedy stores' but the consequence of a rather complex restructuring of the entire DRAM market for AI servers and HBM memory. In this article, we'll explore what's happening at memory factories, why PC modules are suffering the most, what to expect in 2026, and how to make upgrade decisions if you're a gamer, developer, or just a hardware enthusiast.

Read more

The VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

Level of difficultyMedium
Reading time8 min
Reach and readers1.4K

In 2025, internet censorship in Russia, China, and Iran has reached an unprecedented level. Traditional VPN protocols like OpenVPN and even WireGuard are detected and blocked by Deep Packet Inspection (DPI) systems in seconds. Enter VLESS — a lightweight protocol that is becoming the last working solution for bypassing modern censorship.

This article explains how VLESS works on a technical level, why it is so effective at evading detection, and shares real-world experience of building a VPN service in Russia's hostile environment.

Read more

How to create and configure your own VPN

Level of difficultyEasy
Reading time6 min
Reach and readers510

A VPN is a technology for a secure connection to a remote computer or network, and for most users, it's simply a safe way to use the internet in public Wi-Fi zones.

In this article, we will look at four ways to create your own VPN. Let's start with the simplest option, which is manageable even for novice PC users.

Read more

AI porn generators: ethics, trends, and legislation

Level of difficultyEasy
Reading time6 min
Reach and readers466
image

Recently, AI porn photo generators have become part of a larger discussion in the field of artificial intelligence, and the porn industry is no exception. Interest in this topic is growing, as is the number of controversies surrounding it.

AI porn photo generators are programs that use machine learning algorithms to create realistic images. They can generate photos that look real but are actually the product of an algorithm.

AI uses extensive image databases for training and then, based on this training, creates new images. This can include porn photos, which raises ethical discussions.
Read more →

Reconnaissance using Telegram bots — OSINT in Telegram

Reading time4 min
Reach and readers377

Greetings, dear readers! Continuing the SHX article series, in this article, we decided to focus in more detail on OSINT bots in Telegram, as in many cases they are no less effective than common OSINT tools. The OSINT bots discussed in this article will mainly concern reconnaissance on Telegram users. This material has been edited and republished due to being blocked by Roskomnadzor in the Russian Federation.

Disclaimer: All data provided in this article is taken from open sources. It does not call for action and is provided for informational purposes only, and for studying the mechanisms of the technologies used.

Read more

Installing and Configuring a VPN with VLESS and Reality

Level of difficultyEasy
Reading time4 min
Reach and readers2.1K

In this article, we will look at 3 ways to set up a VPN connection with VLESS and Reality.

VLESS is a modern, privacy-oriented data transfer protocol, often called VLESS VPN, although strictly speaking, we will be discussing the installation of a proxy with the VLESS protocol based on an XRay server with Reality.

Let's start with the simplest and most universal option, which requires no technical knowledge.

Read more

Finding a person by photo: how to find information about a person from a single photograph

Reading time4 min
Reach and readers317

Greetings, dear readers! In this article, we will take a detailed look at all aspects of searching for information about a person by photo, paying special attention to three main areas. We will discuss the capabilities of search engines, which many underestimate, although they can provide surprisingly accurate data when used correctly. We will analyze specialized online services based on neural networks and complex facial recognition algorithms. Special attention will be paid to Telegram bots, which combine the convenience of mobile use with powerful search technologies. These tools will help you obtain data about a person, including their name, phone number, and other useful information.

You will learn not only about the technical capabilities of each method but also about the practical nuances of their application. We will explain how to achieve maximum accuracy in data search and what photo parameters affect the result.

Read more

Sora 2 — Free. How to get access to the neural network

Level of difficultyEasy
Reading time3 min
Reach and readers329

When OpenAI first showed Sora, the reaction was instantaneous: "that's it, the era of video production is over." But that was just a demonstration. The technology itself remained inaccessible to a wide audience — until the appearance of Sora 2, an updated version where any user can create up to 100 videos a day for free.

In short, Sora 2 is not just a "text-to-video generator." It's a full-fledged multi-agent system where several OpenAI models work under the hood: from text analysis and scene staging to motion and light synthesis. Unlike early versions of Runway or Pika, the quality here is almost cinematic: Sora understands context, follows the frame's composition, and maintains visual integrity between scenes.

Read more

Suno (kie) на службе у сервиса дистрибуции музыки Sferoom

Level of difficultyEasy
Reading time13 min
Reach and readers445

Сервис по генерации музыки Sferoom AI - эдакий прототип и двойник Suno. Испытав его, я остаюсь при своём - выбираю Suno.

Тут не выведение на чистую воду и не обличение, а исследование того, насколько удобно Suno вмонтирован в Sferoom

Почему я сравниваю именно эти две подписки? Потому что под капотом у Sferoom всё тот же знакомый нелицензионный движок Suno v4.5+, предоставляемый через посредство kie.ai - нелицензионного поставщика API Suno.

В феврале 2026 выбранный мной дистрибьютор песен и музыки Sferoom добавил на свой сайт возможность генерировать свои треки с помощью встроенного ИИ. То есть сейчас на одном русскоязычном Интернет-сайте можно и сделать песню, и подготовить публикацию на стриминги, и собрать статистику прослушиваний.

Мог ли я проигнорировать этот факт? Конечно, нет.

Должен ли я докопаться до самой сути? Конечно, да!

В статье разбираем функции ИИ-генератора песен и музыки Sferoom AI и считаем плюсы и минусы.

Читать далее

OVERLOAD Bot and Searching for a User's Groups on Telegram

Reading time4 min
Reach and readers330

Greetings, dear readers! We continue to test Telegram bots that can effectively help us with the task of finding target data in open sources, or simply put, in OSINT. In this article, we will look at more worthy candidates to become permanent search tools without leaving the well-known messenger.

Disclaimer: All data provided in this article is taken from open sources. It does not call for action and is provided for informational purposes only, and for studying the mechanisms of the technologies used.

Read more

A 64-Neuron Semantic Computer and Learning on Noise

Level of difficultyEasy
Reading time19 min
Reach and readers329

In my previous Russian-language article on Machine Learning as Alchemy, I discussed the possibility of discovering novel solutions without relying on GPUs or expensive computing clusters. In this article, I will share my experiments with continual learning and the compositionality of thought using micro-neural networks, and explain what the philosopher Lev Vygotsky has to do with it all.

Read more

How to organize a knowledge base in Obsidian using the Luhmann method

Level of difficultyEasy
Reading time3 min
Reach and readers500

I've been practicing Zettelkasten for the past five years and still haven't found anything better than Niklas Luhmann's method. The problem is that Obsidian doesn't support it out of the box, so I had to write a plugin for organizing notes as close to Luhmann's original method as possible.

I spent a couple of weeks digging through Luhmann's original archive before I understood how it actually works. Structurally, the archive resembles a table of contents, but with the difference that a note can be inserted at any point, adding nested chapters.

Read more

A year-long hunt for a Linux kernel bug, or the unexpected zeros from XFS

Level of difficultyHard
Reading time10 min
Reach and readers1.4K

You’ve probably had this happen too: a service runs smoothly, keeps users happy with its stability and performance, and your monitoring stays reassuringly green. Then, the next moment — boom, it’s gone. You panic, dive into the error logs, and find either a vague segfault or nothing at all. What to do is unclear, and production needs saving, so you bring it back up — and everything works just like before. You try to investigate what happened, but over time you switch to other tasks, and the incident fades into the background or gets forgotten entirely.

That’s all fine when you’re on your own. But once you have many customers, sooner or later you start feeling that something isn’t right, and that you need to dig into these spikes of entropy to find the root cause of such incidents.

This article describes our year-long investigation. You’ll learn why PostgreSQL (and any other application) can crash because of a bug in the Linux kernel, what XFS has to do with it, and why memory reclamation might not be as helpful as you thought.

Read more