The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes. READ MORE Sebi said data, emails and other documents are being retrieved from the seized devices and detailed investigation is in progress. For example, WhatsApp restricted the number of times a user could forward something, and developed automated systems that detect and flag objectionable content. But because group chats and the channel features are not end-to-end encrypted, Galperin said user privacy is potentially under threat.
from cn