If the open doesn't start, click here
Telegram | DID YOU KNOW?
The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes. "Like the bombing of the maternity ward in Mariupol," he said, "Even before it hits the news, you see the videos on the Telegram channels." Some privacy experts say Telegram is not secure enough "He has kind of an old-school cyber-libertarian world view where technology is there to set you free," Maréchal said. During the operations, Sebi officials seized various records and documents, including 34 mobile phones, six laptops, four desktops, four tablets, two hard drive disks and one pen drive from the custody of these persons.
from IT