๐ฅ "482, I'M HIT, GOING DOWN!" โ intercepted Russian radio chatter during the downing of a Mi-8 helicopter by Ukraine's Magura V5 naval drone.
The intercepted communication reveals the pilot describing the damage to the helicopter and the events leading up to it:
"There was an explosion โ I got hit. The launch came from the water. Then there was another flash. I didn't see where it went, but the first one hit me directly and exploded nearby โ I felt it on the helicopter. Some systems have failed."
๐ฅ "482, I'M HIT, GOING DOWN!" โ intercepted Russian radio chatter during the downing of a Mi-8 helicopter by Ukraine's Magura V5 naval drone.
The intercepted communication reveals the pilot describing the damage to the helicopter and the events leading up to it:
"There was an explosion โ I got hit. The launch came from the water. Then there was another flash. I didn't see where it went, but the first one hit me directly and exploded nearby โ I felt it on the helicopter. Some systems have failed."
Two days after Russia invaded Ukraine, an account on the Telegram messaging platform posing as President Volodymyr Zelenskiy urged his armed forces to surrender. Also in the latest update is the ability for users to create a unique @username from the Settings page, providing others with an easy way to contact them via Search or their t.me/username link without sharing their phone number. If you initiate a Secret Chat, however, then these communications are end-to-end encrypted and are tied to the device you are using. That means itโs less convenient to access them across multiple platforms, but you are at far less risk of snooping. Back in the day, Secret Chats received some praise from the EFF, but the fact that its standard system isnโt as secure earned it some criticism. If youโre looking for something that is considered more reliable by privacy advocates, then Signal is the EFFโs preferred platform, although that too is not without some caveats. For example, WhatsApp restricted the number of times a user could forward something, and developed automated systems that detect and flag objectionable content. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes.
from in