Can Cyber Cell track deleted Telegram account?
Answers from top 8 papers
More filters
Papers (8) | Insight |
---|---|
18 Jul 2018 21 Citations | Therefore, in order to improve our knowledge about evolving cyber attacks and the underlying human behavior for different purposes (e. g., crime investigation, understanding career development of cyber criminals and cyber security professionals, detection of impeding cyber attacks), it will be very useful to detect cyber security related accounts on OSNs automatically, and monitor their activities. |
08 Jun 2015 17 Citations | The results show that all chats can be extracted in the form of plaintext, including some deleted messages. |
60 Citations | The theoretical considerations in addition to simulation results prove the significant gain of the telegram-splitting concept for telemetry systems. |
01 Mar 2018 | The Telegram bot prototype shows that even though Webhooks is able to provide information as requested, Webhooks setting is difficult and trickier. |
01 Jan 2018 | Telegram Bot is made able to provide convenience to the user in this academician to submit a complaint, besides the telegram bot provides the user interaction with the usual interface used by people everyday on their smartphones. |
29 Apr 2017 28 Citations | Participants who use Telegram feel secure because they feel they are using a secure tool, but in reality Telegram offers limited security benefits to most of its users. |
16 Mar 2017 | This study found that several techniques can be carried out using Telegram: attendance, one way discussions, technique 1-2-3 discussion, pictures, drawing, and audio. |
66 Citations | Although in this paper we focus on Telegram Messenger, our methodology can be applied to the forensic analysis of any application running on the Android platform. |
Related Questions
How can hack telegram or facebook?5 answersTo hack Telegram or Facebook, various methods and tools can be utilized. For instance, in the context of steganography-based botnets, hackers embed command and control messages in multimedia files like images or videos to communicate covertly, making detection challenging. Additionally, analyzing the legality of hacking operations by state agencies like Dipolcar in Chile provides insights into potential techniques used for unauthorized access to communications on platforms like WhatsApp and Telegram. Moreover, studying conspiracy theory communities on Telegram highlights the decentralized nature of discussions, emphasizing the challenges in monitoring and controlling information flow on such platforms. By understanding these aspects, individuals or entities seeking to hack Telegram or Facebook may explore exploiting vulnerabilities, utilizing malware, or employing phishing techniques to gain unauthorized access to user data and communications.
Can Cyber Cell track my phone?16 answers
How do I report a scam to cyber cell?7 answers
How to track a cell phone with an IP address?9 answers
How to track the location of a cell phone using an IP address?17 answers
How to withdraw complaint from cyber cell?7 answers