В клубе работают три человека и когда они, идут, например, на обед, про них говорят: "Клуб пошел обедать".
По соседству с клубом есть библиотека и в ней работает только одна девушка.
И про неё, по этой же аналогии говорят: "Библиотека пьет чай", "Библиотека помогает клубу", "Библиотека пошла купаться", "Библиотека гуляла с собакой, но та увидела кошку и теперь они все трое на дереве"
В клубе работают три человека и когда они, идут, например, на обед, про них говорят: "Клуб пошел обедать".
По соседству с клубом есть библиотека и в ней работает только одна девушка.
И про неё, по этой же аналогии говорят: "Библиотека пьет чай", "Библиотека помогает клубу", "Библиотека пошла купаться", "Библиотека гуляла с собакой, но та увидела кошку и теперь они все трое на дереве"
BY Тележка с текстами
Warning: Undefined variable $i in /var/www/group-telegram/post.php on line 260
Oh no. There’s a certain degree of myth-making around what exactly went on, so take everything that follows lightly. Telegram was originally launched as a side project by the Durov brothers, with Nikolai handling the coding and Pavel as CEO, while both were at VK. The gold standard of encryption, known as end-to-end encryption, where only the sender and person who receives the message are able to see it, is available on Telegram only when the Secret Chat function is enabled. Voice and video calls are also completely encrypted. Since its launch in 2013, Telegram has grown from a simple messaging app to a broadcast network. Its user base isn’t as vast as WhatsApp’s, and its broadcast platform is a fraction the size of Twitter, but it’s nonetheless showing its use. While Telegram has been embroiled in controversy for much of its life, it has become a vital source of communication during the invasion of Ukraine. But, if all of this is new to you, let us explain, dear friends, what on Earth a Telegram is meant to be, and why you should, or should not, need to care. For Oleksandra Tsekhanovska, head of the Hybrid Warfare Analytical Group at the Kyiv-based Ukraine Crisis Media Center, the effects are both near- and far-reaching. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes.
from it