In the Telegram API it is stated that Telegram support Perfect Forward Secrecy in their “secret chats”. It is also stated that
official Telegram clients will initiate re-keying once a key has been used to decrypt and encrypt more than 100 messages, or has been in use for more than one week, provided the key has been used to encrypt at least one message.
So my question is, in this case, if a session key gets compromised, is it possible for an attacker to read 100 messages (or possibly more)? If yes, can we still say that perfect forward secrecy is satisfied here?
I'd like to introduce you to a new unique Bot to increase the views on your channel.
Incredible speed and quality of work
Auto view increse function. Once connected, all new posts on your channel will automatically receive views.
Speed of about 1,000 views per hour
Unlimited number of posts in your channel…
VIEWS BOT INCREASING VIEWS IN TELEGRAM CHANNELS
I am going to do some traffic analysis of Telegram for my final project. Now I wonder that how can I know how many packets are sent or received by Telegram in a second? I want to draw a diagram to show the packets I receive in a period of time like the picture I upload.
Thank you all guys!
I have recently been reading several articles about Signal and (suposedly) how secure it is next to other well-known apps like WhatsApp and Telegram, both of which are claimed to be less private due to both using external servers. I saw here that Signal apparently uses the same protocols as WhatsApp, which does not fill me with confidence due to it’s use in WhatsApp, and only blurs the picture more for me.
Is Signal still more secure compared to WhatsApp?
EDIT: It has been highlighted to me that there is a very similar question about WhatsApp and Signal from 2016, but it has not been updated since 2016, So unless the information in that answer is still accurate (which I’m not sure is the case) I’m going to keep my question open.
Selling a large base of 10.000 chats in telegrams (not channels). Chats in Russian and English.
Contact telegram @ginivan
It is often noted (for example in this question&answer) that one of the major flaws of the Telegram messenger is that it uses ‘proprietary‘ encryption instead of peer reviewed and open-source one. At the same time the source code of the app is open-source.
How is this possible that encryption algorithm is ‘proprietary‘ (i.e. close-sourced and can not be reviewed) and yet open-source client is somehow is able to decrypt received messages. To explain what I mean (assuming end-to-end encrypted secret chat): message sent from device A to device B, in order to be end-to-end encrypted must not left device A before it encrypted and must not be decrypted until it reaches device B (at least that is my current understanding), if so – algorithm of encyption/decription must be contained in the client itself, so, how then such encryption algorithm could be considered ‘proprietary‘? What am I missing here?
I recently installed Telegram in Ubuntu 18.04 But the chat format is not what it should look like. Any solutions ? As you can see that my chats should be at the right side
When using e2e encryption (secret chats), the answer is obviously no (I hope), but I am talking about NOT e2e-encrypted messages, the ones stored in the cloud.
I am of course aware that the messages are travelling on SSL encrypted connections, but are the body of the messages encrypted in any way when they reach Google/Firebase Cloud Message, APN and other 3rd party push notifications services?
In other words, if I send a message to Bob over a NON-secret chat, can Google, Apple, etc. read the body of the message I sent to him when it passes through their push notifications servers or is it encrypted?
I tried all the copy past and other things to enable my Telegram on the Lubuntu startup.