0 0
Read Time:57 Second

We remind you that if the Internet is disconnected, you can use Guerrilla-SMS (or P-SMS) v2.0.1 for communication.

This application is now useful in Kazakhstan, where the Internet has been almost absent for several days.

What is it and how does it work?

With the help of P-SMS you will be able to communicate in encrypted text messages, the contents of which can only be seen if you have an encryption key. The application must be installed for you and your interlocutor. Punishers without an encryption key will only see an incomprehensible set of characters. More details.

Features of the new version of P-SMS

1️⃣ For encryption, keys are used instead of passwords.
2️⃣ Added new coding schemes.
3️⃣ Hide content in the application list.
* Full list

For bugs, write to the technical support bot @partisan_telegram_bot.

You can also download it from the link. (via VPN) for download

P. S. We also remind you that a new version of P-Telegram is available with all the latest features of the original Telegam.

SHA256 – 8feea11930e810151b0b1a5aa5386931586b354ea645a8a7b7ea41661d72a7f5

https://github.com/wrwrabbit/p-sms-lib

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence