Journal

In the blog we write news about the life of our project, development of new devices, useful articles and tips about privacy and safe use of gadgets.

How Smartphones Continue Transmitting Data Even When Turned Off

How Smartphones Continue Transmitting Data Even...

In the age of omnipresent connectivity, the notion of truly powering down seems like a relic of the past. Despite our best efforts to switch off our smartphones, modern devices...

How Smartphones Continue Transmitting Data Even When Turned Off

15.05.2024

In the age of omnipresent connectivity, the notion of truly powering down seems like a relic of the past. Despite our best efforts to switch off our smartphones, modern devices...

iPhone Privacy Features: Falling Short of True Security

iPhone Privacy Features: Falling Short of True ...

Explore the limitations of iPhone privacy features and uncover why they may not offer the security users expect in today's digital landscape.

iPhone Privacy Features: Falling Short of True Security

03.05.2024

Explore the limitations of iPhone privacy features and uncover why they may not offer the security users expect in today's digital landscape.

5 Strategies to Safeguard Against Cyber Threats - velter

5 Strategies to Safeguard Against Cyber Threats

In today's digital age, cyber threats and online scams are rampant. The less attention you pay to your digital security, the more vulnerable you become to sophisticated attackers. To help...

5 Strategies to Safeguard Against Cyber Threats

13.03.2024

In today's digital age, cyber threats and online scams are rampant. The less attention you pay to your digital security, the more vulnerable you become to sophisticated attackers. To help...

NUIT Attacks: The Ultrasonic Trojan Redefining Digital Threats - velter

NUIT Attacks: The Ultrasonic Trojan Redefining ...

NUIT Attacks: The Ultrasonic Trojan Redefining Digital Threats In a digital age where every electronic gadget is touted as 'smart,' a new threat stealthily emerges, threatening the perceived invulnerability of...

NUIT Attacks: The Ultrasonic Trojan Redefining Digital Threats

17.01.2024

NUIT Attacks: The Ultrasonic Trojan Redefining Digital Threats In a digital age where every electronic gadget is touted as 'smart,' a new threat stealthily emerges, threatening the perceived invulnerability of...

Is It Safe to Sleep Beside a Mobile Phone? Exploring the Risks and Solutions - velter

Is It Safe to Sleep Beside a Mobile Phone? Expl...

Is It Safe to Sleep Beside a Mobile Phone? Exploring the Risks and Solutions The use of smartphones before bedtime has become a common practice. From setting alarms to scrolling...

Is It Safe to Sleep Beside a Mobile Phone? Exploring the Risks and Solutions

17.01.2024

Is It Safe to Sleep Beside a Mobile Phone? Exploring the Risks and Solutions The use of smartphones before bedtime has become a common practice. From setting alarms to scrolling...

The Faraday Capsule: Safeguarding Corporate Secrets in the Digital Age - velter

The Faraday Capsule: Safeguarding Corporate Sec...

7The Faraday Capsule: Safeguarding Corporate Secrets in the Digital Age In the glass-paneled offices of top executives, the chambers of high-ranking bureaucrats, and the meeting rooms of vast corporations, there...

The Faraday Capsule: Safeguarding Corporate Secrets in the Digital Age

17.10.2023

7The Faraday Capsule: Safeguarding Corporate Secrets in the Digital Age In the glass-paneled offices of top executives, the chambers of high-ranking bureaucrats, and the meeting rooms of vast corporations, there...

Shielding Tester: A Pocket-Sized Faraday Cage Tester for Android and iOS - velter

Shielding Tester: A Pocket-Sized Faraday Cage T...

Shielding Tester: A Pocket-Sized Faraday Cage Tester for Android and iOS The Shielding Tester app is an essential utility for any shielding device user. With this app, you can independently...

Shielding Tester: A Pocket-Sized Faraday Cage Tester for Android and iOS

31.07.2023

Shielding Tester: A Pocket-Sized Faraday Cage Tester for Android and iOS The Shielding Tester app is an essential utility for any shielding device user. With this app, you can independently...

Here's Why Your Gadgets Need a Faraday Cage - velter

Here's Why Your Gadgets Need a Faraday Cage

Here's Why Your Gadgets Need a Faraday Cage In our digital age, safe use of mobile devices is a significant challenge. This piece explores why control measures like a Faraday...

Here's Why Your Gadgets Need a Faraday Cage

28.07.2023

Here's Why Your Gadgets Need a Faraday Cage In our digital age, safe use of mobile devices is a significant challenge. This piece explores why control measures like a Faraday...

Invasion of Digital Privacy: The Unseen Threat and How to Shield Yourself - velter

Invasion of Digital Privacy: The Unseen Threat ...

Invasion of Digital Privacy: The Unseen Threat and How to Shield Yourself The Hidden Giant In the unexplored realms of the digital world lies a behemoth called WiGLE. Started in...

Invasion of Digital Privacy: The Unseen Threat and How to Shield Yourself

21.07.2023

Invasion of Digital Privacy: The Unseen Threat and How to Shield Yourself The Hidden Giant In the unexplored realms of the digital world lies a behemoth called WiGLE. Started in...

French Senate Approves Law to Remotely Activate Smartphone Cameras and Microphones - velter

French Senate Approves Law to Remotely Activate...

French Senate Approves Law to Remotely Activate Smartphone Cameras and Microphones The French Senate has given the green light to a law permitting security forces to remotely activate the camera...

French Senate Approves Law to Remotely Activate Smartphone Cameras and Microphones

07.07.2023

French Senate Approves Law to Remotely Activate Smartphone Cameras and Microphones The French Senate has given the green light to a law permitting security forces to remotely activate the camera...

Understanding the Impact of Mobile Phone Radiation: A Comprehensive Guide - velter

Understanding the Impact of Mobile Phone Radiat...

Understanding the Impact of Mobile Phone Radiation: A Comprehensive Guide What is Mobile Phone Radiation? Mobile phones, like many other electronic devices, emit non-ionizing radiation. This form of radiation, while...

Understanding the Impact of Mobile Phone Radiation: A Comprehensive Guide

19.06.2023

Understanding the Impact of Mobile Phone Radiation: A Comprehensive Guide What is Mobile Phone Radiation? Mobile phones, like many other electronic devices, emit non-ionizing radiation. This form of radiation, while...

Velter’s Jammer Efficacy: Independent Laboratory Test Results - velter

Velter’s Jammer Efficacy: Independent Laborator...

Velter’s Jammer Efficacy: Independent Laboratory Test Results As our digital era advances, conversations' privacy continues to dwindle. One of the threats we are facing is the non-consensual recording of private...

Velter’s Jammer Efficacy: Independent Laboratory Test Results

14.06.2023

Velter’s Jammer Efficacy: Independent Laboratory Test Results As our digital era advances, conversations' privacy continues to dwindle. One of the threats we are facing is the non-consensual recording of private...

How to Block Your Phone and Go Off the Grid - velter

How to Block Your Phone and Go Off the Grid

How to Block Your Phone and Go Off the Grid In the current high-tech era, smartphones have emerged as essential tools for communication, navigation, and entertainment. We typically believe that,...

How to Block Your Phone and Go Off the Grid

08.06.2023

How to Block Your Phone and Go Off the Grid In the current high-tech era, smartphones have emerged as essential tools for communication, navigation, and entertainment. We typically believe that,...

Protecting Yourself from Cyber Fraudsters: Essential Tips for Digital Safety - velter

Protecting Yourself from Cyber Fraudsters: Esse...

Protecting Yourself from Cyber Fraudsters: Essential Tips for Digital Safety The modern digital world has witnessed a surge in technological advancements, but it has also given rise to cyber fraud...

Protecting Yourself from Cyber Fraudsters: Essential Tips for Digital Safety

26.05.2023

Protecting Yourself from Cyber Fraudsters: Essential Tips for Digital Safety The modern digital world has witnessed a surge in technological advancements, but it has also given rise to cyber fraud...

The Trust Gap: Tech Titans Question WhatsApp's Privacy - velter

The Trust Gap: Tech Titans Question WhatsApp's ...

The Trust Gap: Tech Titans Question WhatsApp's Privacy Elon Musk, CEO of Tesla and SpaceX, and Pavel Durov, founder of Telegram, have recently expressed their concerns over the privacy standards...

The Trust Gap: Tech Titans Question WhatsApp's Privacy

19.05.2023

The Trust Gap: Tech Titans Question WhatsApp's Privacy Elon Musk, CEO of Tesla and SpaceX, and Pavel Durov, founder of Telegram, have recently expressed their concerns over the privacy standards...

Faraday Cases: The New Age Solution for Privacy and EMF Protection - velter

Faraday Cases: The New Age Solution for Privacy...

Faraday Cases: The New Age Solution for Privacy and EMF Protection In today's digital age, where smartphones have become an indispensable part of our lives, there is growing concern about...

Faraday Cases: The New Age Solution for Privacy and EMF Protection

12.05.2023

Faraday Cases: The New Age Solution for Privacy and EMF Protection In today's digital age, where smartphones have become an indispensable part of our lives, there is growing concern about...

What is SAR and How to Protect Yourself from Phone Radiation - velter

What is SAR and How to Protect Yourself from Ph...

What is SAR and How to Protect Yourself from Phone Radiation The widespread use of smartphones has raised concerns about the potential health risks associated with electromagnetic radiation emitted by...

What is SAR and How to Protect Yourself from Phone Radiation

05.05.2023

What is SAR and How to Protect Yourself from Phone Radiation The widespread use of smartphones has raised concerns about the potential health risks associated with electromagnetic radiation emitted by...

Keyless Car Theft: 7 Smart Ways to Protect Your Vehicle - velter

Keyless Car Theft: 7 Smart Ways to Protect Your...

Keyless Car Theft: 7 Smart Ways to Protect Your Vehicle Keyless car theft is on the rise, with criminals exploiting technology to gain access to vehicles without the need for...

Keyless Car Theft: 7 Smart Ways to Protect Your Vehicle

03.05.2023

Keyless Car Theft: 7 Smart Ways to Protect Your Vehicle Keyless car theft is on the rise, with criminals exploiting technology to gain access to vehicles without the need for...

Is Your Phone Eavesdropping and Offering Ads? - velter

Is Your Phone Eavesdropping and Offering Ads?

Is Your Phone Eavesdropping and Offering Ads? Once is a coincidence, twice is a chance, and three times is a pattern. This formula accurately describes the situation with "eavesdropping" smartphones....

Is Your Phone Eavesdropping and Offering Ads?

27.04.2023

Is Your Phone Eavesdropping and Offering Ads? Once is a coincidence, twice is a chance, and three times is a pattern. This formula accurately describes the situation with "eavesdropping" smartphones....

Your Phone is Tracking and Eavesdropping on You: An Expert Opinion - velter

Your Phone is Tracking and Eavesdropping on You...

Your Phone is Tracking and Eavesdropping on You: An Expert Opinion In today's modern world, smartphones have become an essential part of our daily lives. They are not only a...

Your Phone is Tracking and Eavesdropping on You: An Expert Opinion

25.04.2023

Your Phone is Tracking and Eavesdropping on You: An Expert Opinion In today's modern world, smartphones have become an essential part of our daily lives. They are not only a...