❔What happened to old builds? (those with bxx version notation) Cherry completely reborn in V1, so we think those builds aren't needed anymore.
❔Can I please have 70Hz on Redmi 8/8A/8A Dual? No, sorry, 70Hz is only compatible with Ilitek's ILI9881C display panel, which is included only in Redmi 7A.
❔70Hz on a cheap Chinese display panel is dangerous! You're gonna burn my screen! No. Ilitek's ILI9881C display panel supports 70Hz natively, so it's safe to use. Check this screenshot from display's datasheet.
❔What happened to old builds? (those with bxx version notation) Cherry completely reborn in V1, so we think those builds aren't needed anymore.
❔Can I please have 70Hz on Redmi 8/8A/8A Dual? No, sorry, 70Hz is only compatible with Ilitek's ILI9881C display panel, which is included only in Redmi 7A.
❔70Hz on a cheap Chinese display panel is dangerous! You're gonna burn my screen! No. Ilitek's ILI9881C display panel supports 70Hz natively, so it's safe to use. Check this screenshot from display's datasheet.
Telegram hopes to raise $1bn with a convertible bond private placement
The super secure UAE-based Telegram messenger service, developed by Russian-born software icon Pavel Durov, is looking to raise $1bn through a bond placement to a limited number of investors from Russia, Europe, Asia and the Middle East, the Kommersant daily reported citing unnamed sources on February 18, 2021.The issue reportedly comprises exchange bonds that could be converted into equity in the messaging service that is currently 100% owned by Durov and his brother Nikolai.Kommersant reports that the price of the conversion would be at a 10% discount to a potential IPO should it happen within five years.The minimum bond placement is said to be set at $50mn, but could be lowered to $10mn. Five-year bonds could carry an annual coupon of 7-8%.
Newly uncovered hack campaign in Telegram
The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.