Notice: file_put_contents(): Write of 8994 bytes failed with errno=28 No space left on device in /var/www/tg-me/post.php on line 50 Telegram Tips | Telegram Webview: TelegramTips/277 -
Blogs and Instant View. telegra.ph is a streamlined tool for creating blogs and articles in your browser. You can add images or videos and format text on both mobile and desktop. Sign in with the @telegraph bot to view stats and edit all your articles from any device.
Instant View is available for all telegra.ph links and many news sites – automatically opening the page in your app with zero load times. Each user can customize their settings with different font styles and themes.
On Android, your Instant View theme matches your app theme.
Blogs and Instant View. telegra.ph is a streamlined tool for creating blogs and articles in your browser. You can add images or videos and format text on both mobile and desktop. Sign in with the @telegraph bot to view stats and edit all your articles from any device.
Instant View is available for all telegra.ph links and many news sites – automatically opening the page in your app with zero load times. Each user can customize their settings with different font styles and themes.
On Android, your Instant View theme matches your app theme.
The cloud-based messaging platform is also adding Anonymous Group Admins feature. As per Telegram, this feature is being introduced for safer protests. As per the Telegram blog post, users can “Toggle Remain Anonymous in Admin rights to enable Batman mode. The anonymized admin will be hidden in the list of group members, and their messages in the chat will be signed with the group name, similar to channel posts.”
Why Telegram?
Telegram has no known backdoors and, even though it is come in for criticism for using proprietary encryption methods instead of open-source ones, those have yet to be compromised. While no messaging app can guarantee a 100% impermeable defense against determined attackers, Telegram is vulnerabilities are few and either theoretical or based on spoof files fooling users into actively enabling an attack.