👮♂ Верховный Суд Республики Крым приговорил 45-летнего керчанина, обвиняемого в государственной измене, к 15 годам тюрьмы. До своего задержания он работал монтером-обходчиком пути.
Суд квалифицировал действия обвиняемого как шпионаж — передачу противнику информации, способной навредить Вооруженным силам Российской Федерации.
👮♂ Верховный Суд Республики Крым приговорил 45-летнего керчанина, обвиняемого в государственной измене, к 15 годам тюрьмы. До своего задержания он работал монтером-обходчиком пути.
Суд квалифицировал действия обвиняемого как шпионаж — передачу противнику информации, способной навредить Вооруженным силам Российской Федерации.
Channels are not fully encrypted, end-to-end. All communications on a Telegram channel can be seen by anyone on the channel and are also visible to Telegram. Telegram may be asked by a government to hand over the communications from a channel. Telegram has a history of standing up to Russian government requests for data, but how comfortable you are relying on that history to predict future behavior is up to you. Because Telegram has this data, it may also be stolen by hackers or leaked by an internal employee. What distinguishes the app from competitors is its use of what's known as channels: Public or private feeds of photos and videos that can be set up by one person or an organization. The channels have become popular with on-the-ground journalists, aid workers and Ukrainian President Volodymyr Zelenskyy, who broadcasts on a Telegram channel. The channels can be followed by an unlimited number of people. Unlike Facebook, Twitter and other popular social networks, there is no advertising on Telegram and the flow of information is not driven by an algorithm. He adds: "Telegram has become my primary news source." He said that since his platform does not have the capacity to check all channels, it may restrict some in Russia and Ukraine "for the duration of the conflict," but then reversed course hours later after many users complained that Telegram was an important source of information. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes.
from sg