Осмотр брошенных РФ танков Т-72Б3. Осматриваемый танк имеет следы срабатывания #ВДЗ контакт-5 на ВЛД – сработало 2 секции, сварные швы между соседними секциями как обычно разрушены. В остальном на вид полностью работоспособный кроме мелких повреждений. Остаточного проникновения в ВЛД не обнаружено . II пол. 2023 г. Источник.
Осмотр брошенных РФ танков Т-72Б3. Осматриваемый танк имеет следы срабатывания #ВДЗ контакт-5 на ВЛД – сработало 2 секции, сварные швы между соседними секциями как обычно разрушены. В остальном на вид полностью работоспособный кроме мелких повреждений. Остаточного проникновения в ВЛД не обнаружено . II пол. 2023 г. Источник.
Soloviev also promoted the channel in a post he shared on his own Telegram, which has 580,000 followers. The post recommended his viewers subscribe to "War on Fakes" in a time of fake news. Groups are also not fully encrypted, end-to-end. This includes private groups. Private groups cannot be seen by other Telegram users, but Telegram itself can see the groups and all of the communications that you have in them. All of the same risks and warnings about channels can be applied to groups. Meanwhile, a completely redesigned attachment menu appears when sending multiple photos or vides. Users can tap "X selected" (X being the number of items) at the top of the panel to preview how the album will look in the chat when it's sent, as well as rearrange or remove selected media. For example, WhatsApp restricted the number of times a user could forward something, and developed automated systems that detect and flag objectionable content. Channels are not fully encrypted, end-to-end. All communications on a Telegram channel can be seen by anyone on the channel and are also visible to Telegram. Telegram may be asked by a government to hand over the communications from a channel. Telegram has a history of standing up to Russian government requests for data, but how comfortable you are relying on that history to predict future behavior is up to you. Because Telegram has this data, it may also be stolen by hackers or leaked by an internal employee.
from vn