Notice: file_put_contents(): Write of 9052 bytes failed with errno=28 No space left on device in /var/www/tg-me/post.php on line 50 Telegram Tips | Telegram Webview: TelegramTips/326 -
Phone Number Links. Post or share a t.me link anywhere to let others quickly contact you, based on your phone number.
These links follow your Phone Number Privacy settings – if a user isn’t allowed to find you by your number, the link will not work for them.
Your phone number link can also be converted into a shareable QR Code. To create a more anonymous t.me link for yourself, add a custom username in Settings.
Phone Number Links. Post or share a t.me link anywhere to let others quickly contact you, based on your phone number.
These links follow your Phone Number Privacy settings – if a user isn’t allowed to find you by your number, the link will not work for them.
Your phone number link can also be converted into a shareable QR Code. To create a more anonymous t.me link for yourself, add a custom username in Settings.
Some messages aren’t supposed to last forever. There are some Telegram groups and conversations where it’s best if messages are automatically deleted in a day or a week. Here’s how to auto-delete messages in any Telegram chat. You can enable the auto-delete feature on a per-chat basis. It works for both one-on-one conversations and group chats. Previously, you needed to use the Secret Chat feature to automatically delete messages after a set time. At the time of writing, you can choose to automatically delete messages after a day or a week. Telegram starts the timer once they are sent, not after they are read. This won’t affect the messages that were sent before enabling the feature.
Why Telegram?
Telegram has no known backdoors and, even though it is come in for criticism for using proprietary encryption methods instead of open-source ones, those have yet to be compromised. While no messaging app can guarantee a 100% impermeable defense against determined attackers, Telegram is vulnerabilities are few and either theoretical or based on spoof files fooling users into actively enabling an attack.