Ifound the problem: After installing telegram, strangely enough it makes telegram the default application for opening HTML files. That's why after running jupyter-notebook in the terminal, it tries to open the link with telegram.
I have been using this Telegram-desktop package from the official repo. It was already crashing when viewing videos in fullscreen in the previous version but now as the package got updated it is still crashing. I have switched to Telegram-desktop-bin which doesn't crash when I view videos in fullscreen.
I figured something out for this one for some reason when I am using Telegram-desktop this package and when using "hardware accelerated video decoding" turned on when opening video it makes telegram crash. When it's turned off nothing happens everything works just fine. Telegram-desktop-bin when using this package it doesn't matter is it turned off or on it works both ways.. there's something different in these two packages how they handle video?
When opening Telegram android app for the first time after reboot the long texts in conversation bubbles go over screen (text wrapping/setting to rows do not work).
This happens if telephone is tilted to landscape mode after reboot.
Tilting phone again seems to fix it.
On my Android on a mobile set, I recently have encountered a problem. I have Chrome and Telegram installed. The Chrome repeatedly and automatically open a link like which invites a person to join a Telegram Channel. After this page, it automatically switch to Telegram Messenger which pop-up the same message box for joining the channel.
I don't know whether the source of this pop-up is Chrome or Telegram. Anyway I restricted people who can invite me to Channels on Telegram to my contacts and even blocked suspicious contacts, but it doesn't solve the problem. I disabled pop-ups in Chrome setting but it still didn't help.
The link to open the telegram channel will be there in your incognito windows tabs.Close that tabes from your incognito window.Then these telegram channels opening automatically when you open chrome browser will be stopped.
Telegram from pacman started crashing when I saw media 2-3 month ago, but I solved this problem via going telegram Flatpak
Yesterday I have updated the flatpak apps and granted GPU acceleration via flatseal
but now I am took of this permission, but nosing is change.
if I type telegram-desktop in terminal, I am getting this output:
QGuiApplication::setDesktopFileName: the specified desktop file name ends with .desktop. For compatibility reasons, the .desktop suffix will be removed. Please specify a desktop file name without .desktop suffix
but 2 months ago, output was like: SVG reading error.
When i open a new tab suddenly the telegram app desktop launches itself, then i cant write until i click again in the search bar because telegram is on top! im getting mad, it's very weird. Can you please help?Anyway thanks for your browser, it's really awesome :)
Thank you for your help.I tried launching firefox in safe mode but the issue is still there. What's really weird, is that the telegram app comes on top even if it's totally closed. I tried quitting it then launching firefox in safe mode and when i clicked the new tab it "magically" appeared on top, opening the app. If app is already opend it just comes on top. And the funniest part is that it happens in random moment but very frequently, at least every three times i click a new tab.
Hi, My telegram app doesn't open on my iphone 6s but i still recive my notifcitions, i thought it's becuse my ios was old and i update my phone but still have the problem and i can't try to uninstall the app because i have secret chats i can't lose it now so what's the problem and how can i solve withous losing my chats please it's important to me!
Hi!
Yesterday I updated my system and Telegram got updated to version 2.8.4-153. Since the update, every time I try to download a file (I click on download, select the place to download the file and click on "Save") in the chat, Telegram gets frozen and unresponsive. The only way to stop the program is to kill it in the terminal.
algent Well, I don't know... it might be only a problem in my computer... Something was changed in the last version, because before that, it was working properly... Argg!!! It's annoying... I tried to uninstall and install again Telegram but it is still happening.
I have found, that there are two Telegram installations in my computer (although I have uninstalled the official Solus package). One is called "Telegram" (I don't know where is this coming from) and the other "Telegram Desktop".
The Flatpak package is "Telegram Desktop" but I don't know where "Telegram" is coming from. Is there a way to know which path the "Telegram" menu entry is referred to? I tried with right mouse click, but it is not working.
You can find it with menulibre. After installing it you can find it on "Menu" as "Menu Editor".
Run the program and search for "telegram"
Down in the bottom it will tell you where is that desktop file.
But anyway, the Telegram package seems to have a problem with my system... I can live with the flatpak app... I will try the Telegram package in some months, after it gets updated again... Maybe then it will work again for me!
I received a notification on top-right part of the screen, with the purple cogwheel logo, saying that I need to update my system. So I went to terminal and ran garuda update. After it finished, the notification on top-right was still there, so I clicked that notification and it disappeared as a result.
I thought that maybe I need to update my mirrorlist in order to obtain this libmbedcrypto.so.7 package. I replaced the contents of /etc/pacman.d/mirrorlist with the output of reflector. Then I run garuda-update and update and it basically says that system is already up-to-date and that there is nothing new to download. I also tried upd but I don't have that command.
This looks like a somewhat similar problem [Solved]Electron22 based software suddenly not work after update / Applications & Desktop Environments / Arch Linux Forums but isn't necessarily the same thing, maybe it's the telegram package that needs be updated (by its maintainers, not you).
Shame on me, I recall having some problem with that same mbedtls but I can't remember what I did.
Sometimes such problems can be worked around with a dirty hack: symlinking the actual .so to the expected name (that may cause the application to crash, and you'll have to remember to remove the link when there's an update). Now that I think of it... I check whether I did so, hold on.
I guess it depends which of the 6 packages is installed maybe... but they don't seem to depend on mbedtls directly.
Pactree says nothing depends on mbedtls2 on my system, yet for some reason I forgot I installed it.
Depending on mbedtls I have:
I need to download certain files from Telegram. It is mostly images and videos. I am aware that even this kind of files can contain malicious code, so I want to be 100% safe. (The files usually surpass 20 MB, so it is not scannable through DrWebBot on Telegram.)
It is extremely rare for video or image files to contain code-execution exploits that will work even if the file isn't viewed. Indeed, it is approximately impossible for any file to exploit anything if the file isn't opened at all, but unfortunately Windows Explorer (and the Windows common dialogs including the Save File dialog) will open the files to read basic data and/or generate thumbnails, so there is still a little risk. The safest way to do this would be to use a command-line interface that doesn't interact with the contents of the files at all.
Furthermore, you shouldn't fully count on Virustotal. They're very good at recognizing known malware and many common malware patterns, but malware authors are fully aware of this and don't generally release malware until it's obfuscated enough that virustotal doesn't recognize it (which they can themselves test, of course). Eventually Virustotal's detection will be updated to detect that malware too - it's a constant arms race - but it's not safe to assume that a file is clean just because VT doesn't detect anything.
A simple additional test - if you trust your sandboxing enough - would be open the files and view them through, within a sandbox. This also doesn't guarantee anything - it's not impossible to make a media file that contains a code execution exploit and also renders correctly - but it does raise the bar. Ideally, use a decoder (codec) and player that aren't the common ones the intended audience of the hypothetical malware would use. If you can do it in a different OS and ideally different platform altogether - for example, on an ARM-based Linux system, if you expect it's targeting x86 Windows - that will both reduce your risk and increase the chance that anything fishy with the file crashes the player or corrupts the output, rather than silently succeeding.
If you want to be extra thorough, use Sysinternals Process Monitor or similar to monitor system calls that the process makes (either a media player or Explorer or whatever) when opening the suspicious files, vs. when opening a trusted file of the same kind. If the process doesn't even attempt any unexpected system calls, that's a reasonably clear indication that the media file isn't attempting code execution.
With all that said, though, this is broadly a reasonable approach. You might consider using a VM (without host integration features) in addition to sandboxie / a non-Windows OS / other OS-based sandboxing (e.g. Windows' AppContainers, something like Firejail on Linux, etc.), just for defense in depth + snapshot potential, but that's also additional work that is probably only called for if the media files are extremely suspect.
3a8082e126