Важно‼️ Новинки от противника ((( FPV на сим-карте. В 3 мсб N-ского полка на Южно-Донецком участке фронта вчера сбили вот такой дрон камикадзе. Информации по нему очень мало. Управление через сим карту. Вероятнее всего частоты 1800-1900, 2100 МГц. Видеоканал 1200.
Важно‼️ Новинки от противника ((( FPV на сим-карте. В 3 мсб N-ского полка на Южно-Донецком участке фронта вчера сбили вот такой дрон камикадзе. Информации по нему очень мало. Управление через сим карту. Вероятнее всего частоты 1800-1900, 2100 МГц. Видеоканал 1200.
Given the pro-privacy stance of the platform, it’s taken as a given that it’ll be used for a number of reasons, not all of them good. And Telegram has been attached to a fair few scandals related to terrorism, sexual exploitation and crime. Back in 2015, Vox described Telegram as “ISIS’ app of choice,” saying that the platform’s real use is the ability to use channels to distribute material to large groups at once. Telegram has acted to remove public channels affiliated with terrorism, but Pavel Durov reiterated that he had no business snooping on private conversations. Perpetrators of these scams will create a public group on Telegram to promote these investment packages that are usually accompanied by fake testimonies and sometimes advertised as being Shariah-compliant. Interested investors will be asked to directly message the representatives to begin investing in the various investment packages offered. Official government accounts have also spread fake fact checks. An official Twitter account for the Russia diplomatic mission in Geneva shared a fake debunking video claiming without evidence that "Western and Ukrainian media are creating thousands of fake news on Russia every day." The video, which has amassed almost 30,000 views, offered a "how-to" spot misinformation. The message was not authentic, with the real Zelenskiy soon denying the claim on his official Telegram channel, but the incident highlighted a major problem: disinformation quickly spreads unchecked on the encrypted app. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes.
from ca