Некоторые СМИ начали писать, что скоро "суд признает" SOTA нежелательной и "можно начинать" чистить в соцсетях ссылки на неё.
Нет! Для статуса нежелательной любой организации хватает решения (а по факту релиза) генпрокуратуры. И распространять материалы SOTA media опасно уже сейчас.
Некоторые СМИ начали писать, что скоро "суд признает" SOTA нежелательной и "можно начинать" чистить в соцсетях ссылки на неё.
Нет! Для статуса нежелательной любой организации хватает решения (а по факту релиза) генпрокуратуры. И распространять материалы SOTA media опасно уже сейчас.
Упоминать можно.
Сдаваться не стоит.
BY Objection, your honor!
Warning: Undefined variable $i in /var/www/group-telegram/post.php on line 260
Following this, Sebi, in an order passed in January 2022, established that the administrators of a Telegram channel having a large subscriber base enticed the subscribers to act upon recommendations that were circulated by those administrators on the channel, leading to significant price and volume impact in various scrips. Elsewhere, version 8.6 of Telegram integrates the in-app camera option into the gallery, while a new navigation bar gives quick access to photos, files, location sharing, and more. Right now the digital security needs of Russians and Ukrainians are very different, and they lead to very different caveats about how to mitigate the risks associated with using Telegram. For Ukrainians in Ukraine, whose physical safety is at risk because they are in a war zone, digital security is probably not their highest priority. They may value access to news and communication with their loved ones over making sure that all of their communications are encrypted in such a manner that they are indecipherable to Telegram, its employees, or governments with court orders. The gold standard of encryption, known as end-to-end encryption, where only the sender and person who receives the message are able to see it, is available on Telegram only when the Secret Chat function is enabled. Voice and video calls are also completely encrypted. Perpetrators of such fraud use various marketing techniques to attract subscribers on their social media channels.
from cn