▪️1941 год — Начало Керченской десантной операции. ▪️1991 год — Совет Республики Верховного совета СССР принял декларацию о прекращении существования СССР. ▪️2002 год — Открытие футбольного манежа в Минске.
Чем ещё этот день запомнился в истории — в рубрике "МЕТАДАТА".
▪️1941 год — Начало Керченской десантной операции. ▪️1991 год — Совет Республики Верховного совета СССР принял декларацию о прекращении существования СССР. ▪️2002 год — Открытие футбольного манежа в Минске.
Чем ещё этот день запомнился в истории — в рубрике "МЕТАДАТА".
Groups are also not fully encrypted, end-to-end. This includes private groups. Private groups cannot be seen by other Telegram users, but Telegram itself can see the groups and all of the communications that you have in them. All of the same risks and warnings about channels can be applied to groups. Right now the digital security needs of Russians and Ukrainians are very different, and they lead to very different caveats about how to mitigate the risks associated with using Telegram. For Ukrainians in Ukraine, whose physical safety is at risk because they are in a war zone, digital security is probably not their highest priority. They may value access to news and communication with their loved ones over making sure that all of their communications are encrypted in such a manner that they are indecipherable to Telegram, its employees, or governments with court orders. Official government accounts have also spread fake fact checks. An official Twitter account for the Russia diplomatic mission in Geneva shared a fake debunking video claiming without evidence that "Western and Ukrainian media are creating thousands of fake news on Russia every day." The video, which has amassed almost 30,000 views, offered a "how-to" spot misinformation. In addition, Telegram's architecture limits the ability to slow the spread of false information: the lack of a central public feed, and the fact that comments are easily disabled in channels, reduce the space for public pushback. Additionally, investors are often instructed to deposit monies into personal bank accounts of individuals who claim to represent a legitimate entity, and/or into an unrelated corporate account. To lend credence and to lure unsuspecting victims, perpetrators usually claim that their entity and/or the investment schemes are approved by financial authorities.
from us