Гнев, похоть, жадность и другие грехи в современной литературе
#чтопочитать
Все мы не без греха — и вымышленные персонажи в том числе. Но не преступаем ли мы иные, куда более глубинные заповеди, читая о чужих пороках и наслаждаясь этим?
Несколько книжных блогеров собрались вместе, чтобы рассказать свои истории:
Гнев, похоть, жадность и другие грехи в современной литературе
#чтопочитать
Все мы не без греха — и вымышленные персонажи в том числе. Но не преступаем ли мы иные, куда более глубинные заповеди, читая о чужих пороках и наслаждаясь этим?
Несколько книжных блогеров собрались вместе, чтобы рассказать свои истории:
Telegram does offer end-to-end encrypted communications through Secret Chats, but this is not the default setting. Standard conversations use the MTProto method, enabling server-client encryption but with them stored on the server for ease-of-access. This makes using Telegram across multiple devices simple, but also means that the regular Telegram chats you’re having with folks are not as secure as you may believe. Given the pro-privacy stance of the platform, it’s taken as a given that it’ll be used for a number of reasons, not all of them good. And Telegram has been attached to a fair few scandals related to terrorism, sexual exploitation and crime. Back in 2015, Vox described Telegram as “ISIS’ app of choice,” saying that the platform’s real use is the ability to use channels to distribute material to large groups at once. Telegram has acted to remove public channels affiliated with terrorism, but Pavel Durov reiterated that he had no business snooping on private conversations. Channels are not fully encrypted, end-to-end. All communications on a Telegram channel can be seen by anyone on the channel and are also visible to Telegram. Telegram may be asked by a government to hand over the communications from a channel. Telegram has a history of standing up to Russian government requests for data, but how comfortable you are relying on that history to predict future behavior is up to you. Because Telegram has this data, it may also be stolen by hackers or leaked by an internal employee. Also in the latest update is the ability for users to create a unique @username from the Settings page, providing others with an easy way to contact them via Search or their t.me/username link without sharing their phone number. "This time we received the coordinates of enemy vehicles marked 'V' in Kyiv region," it added.
from jp