Sebi said data, emails and other documents are being retrieved from the seized devices and detailed investigation is in progress. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes. 'Wild West' Founder Pavel Durov says tech is meant to set you free Some privacy experts say Telegram is not secure enough
from nl