Moreover, you can remove the connected devices individually or all at once. Users can add multiple devices to their account and receive messages on each one. Telegram accounts are tied to telephone numbers and are verified by SMS. The service provides end-to-end encryption for voice calls. The client-server communication is also encrypted. But them can access the Telegram service provider, who holds the encryption keys. Available for Windows, macOS, Linux, Android and iOS.ĭefault messages and media in Telegram are encrypted when stored on its servers. Users can send messages and exchange photos, videos, stickers, audio and files of any type. It’s the fastest messaging app on the market, connecting people via a unique, distributed network of data centers around the globe. This open source application ensures pure instant messaging – simple, fast, secure, and synced across all your devices. Otherwise your local configs will be erased.Telegram is a cloud-based mobile and desktop instant messaging program with a focus on security and speed. Warning: Please upgrade from v4.5.x version. Other open source licenses can be found here: … e-licenses You should have received a copy of the GNU General Public License along with this program. See the GNU General Public License for more details. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. To view the source codes or build your own apk, please refer to: To setup your own server, please refer to: Ģ. Visit our project site for more details: ġ. Open source implementions in python, node.js, golang, C#, and pure C. Avaliable on multiple platforms, including PC, MAC, Mobile (Android and iOS) and Routers (OpenWRT).Ĥ. Low resource comsumption, suitable for low end boxes and embedded devices.ģ. Bleeding edge techniques with Asynchronous I/O and Event-driven programming.Ģ.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |