❗️Россия имеет серьезные и обоснованные сомнения в транспарентности расследований Швеции, ФРГ и Нидерландов по «Северным потокам» — постпред РФ при ООН Василий Небензя
❗️Россия имеет серьезные и обоснованные сомнения в транспарентности расследований Швеции, ФРГ и Нидерландов по «Северным потокам» — постпред РФ при ООН Василий Небензя
BY Readovka
Warning: Undefined variable $i in /var/www/group-telegram/post.php on line 260
Telegram was founded in 2013 by two Russian brothers, Nikolai and Pavel Durov. Given the pro-privacy stance of the platform, it’s taken as a given that it’ll be used for a number of reasons, not all of them good. And Telegram has been attached to a fair few scandals related to terrorism, sexual exploitation and crime. Back in 2015, Vox described Telegram as “ISIS’ app of choice,” saying that the platform’s real use is the ability to use channels to distribute material to large groups at once. Telegram has acted to remove public channels affiliated with terrorism, but Pavel Durov reiterated that he had no business snooping on private conversations. Either way, Durov says that he withdrew his resignation but that he was ousted from his company anyway. Subsequently, control of the company was reportedly handed to oligarchs Alisher Usmanov and Igor Sechin, both allegedly close associates of Russian leader Vladimir Putin. Right now the digital security needs of Russians and Ukrainians are very different, and they lead to very different caveats about how to mitigate the risks associated with using Telegram. For Ukrainians in Ukraine, whose physical safety is at risk because they are in a war zone, digital security is probably not their highest priority. They may value access to news and communication with their loved ones over making sure that all of their communications are encrypted in such a manner that they are indecipherable to Telegram, its employees, or governments with court orders. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes.
from tw