Ukraine is pursuing unconventional methods to prevent an energy crisis this winter. According to The New York Times, the country has brought in an outdated power plant from Lithuania to help restore the grid, is renting floating power plants from Turkey, and has called for a permanent UN presence at substations to protect them from Russian attacks. However, Ukrainian officials admit that these efforts might not be sufficient.
Ukraine is pursuing unconventional methods to prevent an energy crisis this winter. According to The New York Times, the country has brought in an outdated power plant from Lithuania to help restore the grid, is renting floating power plants from Turkey, and has called for a permanent UN presence at substations to protect them from Russian attacks. However, Ukrainian officials admit that these efforts might not be sufficient.
Despite Telegram's origins, its approach to users' security has privacy advocates worried. Apparently upbeat developments in Russia's discussions with Ukraine helped at least temporarily send investors back into risk assets. Russian President Vladimir Putin said during a meeting with his Belarusian counterpart Alexander Lukashenko that there were "certain positive developments" occurring in the talks with Ukraine, according to a transcript of their meeting. Putin added that discussions were happening "almost on a daily basis." On Feb. 27, however, he admitted from his Russian-language account that "Telegram channels are increasingly becoming a source of unverified information related to Ukrainian events." Channels are not fully encrypted, end-to-end. All communications on a Telegram channel can be seen by anyone on the channel and are also visible to Telegram. Telegram may be asked by a government to hand over the communications from a channel. Telegram has a history of standing up to Russian government requests for data, but how comfortable you are relying on that history to predict future behavior is up to you. Because Telegram has this data, it may also be stolen by hackers or leaked by an internal employee. During the operations, Sebi officials seized various records and documents, including 34 mobile phones, six laptops, four desktops, four tablets, two hard drive disks and one pen drive from the custody of these persons.
from jp