Указом Главы ДНР №75 от 30 января 2025 года создан совет по защите традиционных российских духовно-нравственных ценностей, культуры и исторической памяти при Главе Донецкой Народной Республики.
Документом утверждены Положение о совете и его состав.
Указ вступает в силу со дня его официального опубликования.
Указом Главы ДНР №75 от 30 января 2025 года создан совет по защите традиционных российских духовно-нравственных ценностей, культуры и исторической памяти при Главе Донецкой Народной Республики.
Документом утверждены Положение о совете и его состав.
Указ вступает в силу со дня его официального опубликования.
"Someone posing as a Ukrainian citizen just joins the chat and starts spreading misinformation, or gathers data, like the location of shelters," Tsekhanovska said, noting how false messages have urged Ukrainians to turn off their phones at a specific time of night, citing cybersafety. "For Telegram, accountability has always been a problem, which is why it was so popular even before the full-scale war with far-right extremists and terrorists from all over the world," she told AFP from her safe house outside the Ukrainian capital. "Markets were cheering this economic recovery and return to strong economic growth, but the cheers will turn to tears if the inflation outbreak pushes businesses and consumers to the brink of recession," he added. Also in the latest update is the ability for users to create a unique @username from the Settings page, providing others with an easy way to contact them via Search or their t.me/username link without sharing their phone number. Channels are not fully encrypted, end-to-end. All communications on a Telegram channel can be seen by anyone on the channel and are also visible to Telegram. Telegram may be asked by a government to hand over the communications from a channel. Telegram has a history of standing up to Russian government requests for data, but how comfortable you are relying on that history to predict future behavior is up to you. Because Telegram has this data, it may also be stolen by hackers or leaked by an internal employee.
from ru