gruez 5 hours ago

For people who only read the headline, it's not as bad as the title might suggest. This attack requires backdooring the client, by which point it's already effectively game over in most threat models. The main advantage of this attack is that a compromised client can be sending "encrypted" messages that can actually be trivially decrypted by authorities, but that isn't immediately obvious to someone inspecting network traffic. Needless to say, this is a pretty pointless attack because nobody is manually inspecting every piece of data that their telegram is sending, and the client probably makes so many requests that it's trivial to smuggle data through some other side channel.

  • tptacek 5 hours ago

    The threat model of the attack is targets relying on binary/source transparency of open source clients to protect against (state-sponsored) client backdoors; in that sense, it most closely resembles the Juniper/NetScreen Dual-EC attack, which functioned basically the same way: a backdoor that was essentially not auditable, as the underlying vulnerability was realized cryptographically.

    I'm just clarifying. I agree the practical implications of the attack are not really meaningful to a general audience.

supermatou 5 hours ago

Excellent article about Telegram's encryption from Matt Green (cryptographer, for those who haven't heard of him):

https://blog.cryptographyengineering.com/2024/08/25/telegram...

  • godelski an hour ago

    I was gonna post "why do people keep calling it 'encrypted' if the encryption is not on by default?" It has always seemed odd to me that it is put into the same category as WhatsApp and Signal (which even those are a bit weird to compare).

    What confuses me more is how passionate people are about Telegram. Weirdly I see those posts degrade into Signal vs Telegram and it really feels like apples and oranges but very one sided. I get that Telegram is more feature rich, and that's a good argument, but feels weird that many argue it is also more secure. Some of those arguments even appear in the thread r721 linked.

defraudbah 3 hours ago

in short, you don't need access to the device, only to the same network

if you are on the same network and manage either intercept key to bruteforce it or guess encryption key with emoji it's possible to decrypt the whole chat. It works because telegram random generator uses time and some device information which is predictable

the study managed to decrypt 500 messages out of 500 on emulator devices. Brutewforcing takes like a few $100 worth of computing power

Honestly, durovs are exceptional people and enterpreneurs, however their encryption and what they say isn't always what it presented as

  • upofadown an hour ago

    In a very real sense you do need access to the device to install the backdoored client.

    There is no actual cryptographic weakness presented here...

taminka 5 hours ago

can anyone explain why telegram doesn't use an audited e2e implementation? is it really because they wanted more convenient and faster cross-device sync? have they been threatened and/or backdoored by the fsb? they basically stole vk from him, but left him alone w/ telegram?

it's suspicious, but at the same time, iirc, nobody's been able to find a vulnerability in their encryption protocol :shrug

  • tptacek 5 hours ago

    People have found vulnerabilities in MTProto.

    • sedatk an hour ago

      IIRC, they had even started out with basic mistakes like MAC-then-encrypt.

  • chupasaurus 4 hours ago

    1,2) NIH syndrome 3) We don't know 4) Expropriation isn't "basically stolen", Telegram was a tiny side project at the time

  • dijit 4 hours ago

    The first version of MTProto was found to have weaknesses.

    The reason they rolled their own was because it came out before the Double-Ratchet/Axolotl protocol and OtR (which double-ratchet is essentially based on) was extremely inconvenient to use properly and had its own weaknesses.

    • taminka 4 hours ago

      > The reason they rolled their own was because it came out before the Double-Ratchet/Axolotl protocol and OtR (which double-ratchet is essentially based on) was extremely inconvenient to use properly and had its own weaknesses.

      this actually makes a lot of sense lowkey, thanks :)

tptacek 5 hours ago

Reminder that Telegram has "end to end" encryption only for direct messages; the rest is client-server, which they seem to believe is just as good as end-to-end.

  • ynoxinul 5 hours ago

    *for direct messages in secret chats, which you have to enable explicitly and which reduces user expericence in comparison to normal chats.

    • fsflover 5 hours ago

      *only on non-GNU/Linux systems.

      • dijit 4 hours ago

        You've said this a lot in this thread, but my client on Arch seems to have secret chats.

        https://i.imgur.com/Pft8r3B.png

        • fsflover an hour ago

          You screenshot doesn't show how you achieved this or that you're even using Linux. There is no option to start a secret chat for me on a right click. Where did you download your client?

          This ticket suggests that there's no such option: https://github.com/telegramdesktop/tdesktop/issues/871

          See also: https://github.com/telegramdesktop/tdesktop/issues/871

          • dijit an hour ago

            Those are the same link and they’re 10 years old.

            I am using telegram-desktop from aur, I clicked the three dots (…) at the top next to the magnifying glass, then info (i) to get to the profile, then there is a “more” (…) button where there was a “Secret” option.

  • j45 3 hours ago

    It's weird that you can delete a message for you and for the other person too.

    I doubt client-server is the only way to accomplish this.

  • dijit 4 hours ago

    client-server is good enough, if you trust the server.

    If you don't trust the server, then you shouldn't trust them to supply you a client either. Since a client is basically "whatever code they decided".

    Very few people are building from FOSS, and those that do will include binary blobs too. It's theatre.

    • tptacek 3 hours ago

      There are basically zero practicing cryptography engineers who would agree with the logic you've used here, but I acknowledge this is also someting Durov believes.

      • dijit 30 minutes ago

        I know it's trite to bring in logical fallacies, but you're hinging a response on an appeal to authority without tackling the logic head on. Worse so, you're also engaging in a bit of hyperbole.

        E2EE provides strong theoretical guarantee's, but not so if the client is under the network providers control. Governments have already pressured companies to alter clients (Australia's "Assistance and Access Act" allows compelling backdoors in software).

        If you don't trust the operator, it's irrational to trust the client they supply, they can do anything before E2EE even kicks in.

        I'm not saying E2EE is useless technology, it's just useless in cases where the provider and the network are the same thing. You are gaining very little over TLS in those cases. You can configure "self-deleting" messages if you're worried about other clients logging in.

        Regardless, most reasonable security researches I know are actually more concerned with supply chain attacks than ensuring E2EE everywhere, which is precisely what I'm arguing.

cimi_ an hour ago

Lex Friedman recently did an interview with Durov: https://lexfridman.com/pavel-durov/

I listened to bits of it and I was disappointed by the lack of push back from Lex who was supper excited because he got to hang out with Durov for a couple of weeks in Dubai - the tl;dr I got from what I heard is that Telegram is amazing and Durov is a visionary freedom fighter. Lex's recent history I'm not surprised though.

Here's the transcript of the section about encryption: https://lexfridman.com/pavel-durov-transcript#chapter15_encr... I'll let you judge for yourself.

I'll comment on another section though because I'm somewhat knowledgeable having followed the subject closely in the media and by knowing the country: https://lexfridman.com/pavel-durov-transcript#chapter7_roman...

He claims: 'So, by the time the head of intelligence services met me to ask about Romania to help them silencing conservative voices in Romania, I was already wary of what can be going on next.'

I call bullshit on this. The 'conservative voices' are muppets doing Russia's bidding who broke all sorts of election laws. There was nothing serious happening on Telegram in Romania that would warrant any foreign intervention, it just doesn't make sense.

ethin 5 hours ago

Is this really something new? If memory serves, Telegram has had it's own crypto since the beginning, and I don't remember anything about it ever being audited by... Well, anybody?

Granted, I don't know how MTProto actually works all that well, but IMO Telegram should've just used Noise or something. Would've saved them a lot of trouble. Although that doesn't really resolve the underlying problem that people think Telegram is secure when it's not (i.e., you have to explicitly enable E2EE and it's off by default), at least last time I checked. I haven't used telegram in years so my knowledge might be out of date though.

  • hiimkeks 5 hours ago

    Well, the article is from 2023, but what you remember is most likely MTProto version 1, which was even more ridiculously broken, iirc

  • jansper39 5 hours ago

    > Granted, I don't know how MTProto actually works all that well

    I suppose it's what the actual goals of the app are, potentially it works out very well for someone.

  • ProofHouse 4 hours ago

    telegram is NOT safe. Far from it.

  • dijit 5 hours ago

    It was audited, found to have some serious flaws[0], then those were rectified.

    Most people dislike Telegram because:

    A) It takes away from Signals market share

    B) They don't enable E2EE by default

    C) They're owned by Pavel Durov, the Russian Zuckerberg.

    I am aware that it's an unpopular opinion, but the FUD spread against Telegram and the hagiographies of Signal make me think something weird is going on.

    Telegram has third party clients, so you can just roll your own client that runs another encryption on top if you want, like Pidgin used to do with OTR.

    [0]: https://mtpsym.github.io

    • s17n 5 hours ago

      People in the US prefer Signal over Telegram because Signal was created by people who took security seriously, and Telegram wasn't.

      People outside the US prefer telegram because they assume that Signal is probably compromised, or at least highly vulnerable to compromise, by US intelligence - they trust Pavel Durov's history of expropriation and arrest more than they trust some nerds who claim that our product is secure.

    • celsoazevedo an hour ago

      As someone that uses Telegram almost every day, the sad true is that most messages are not private. Most people simply don't use "secure chats". Not only it's not the default, but encrypted chats also don't work across devices.

      So it shouldn't be a surprise that Signal users speak against Telegram. It's simply not private for most people. It's like recommending using Facebook Messenger (pre-E2EE)... privacy minded people won't do that. Signal itself is criticised by other more privacy minded users because it requires a phone number.

      Signal doesn't have the best call quality (voice/video) especially on slow connections, sending media can be a pain in the rear, their desktop client is way too simple, they move slowly, etc. Telegram beats them in almost everything, but not privacy...

      Between having to trust Durov forever with our texts and system that uses e2ee by default and may or may not (no proof) have some flaw, I think most people that want privacy will use the option that uses e2ee for everything.

    • hiimkeks 5 hours ago

      D) They don't enable E2EE for groups at all

      E) (I believe) don't enable E2EE with more than one device

      • dijit 5 hours ago

        D) True aside from group calls afaik

        E) Neither does Whatsapp/Signal; they rely on a backdoor interface to your phone to send messages.

        • tptacek 5 hours ago

          Signal very definitely does multiparty end-to-end secure messaging.

          • dijit 5 hours ago

            Weird, every time I mention Signal on HN tptacek responds.

            But I'm having trouble discerning what you mean.

            Either you're saying group chats are encrypted E2EE - which, I never claimed.

            Or, you're mentioning that you can have multiple phones/devices on the same account, which doesn't work the last time I checked.

            • mahemm 4 hours ago

              You replied to a claim that Telegram doesn't do E2EE for groups saying 'Neither does Whatsapp/Signal'.

              That's wrong as `tptacek noted. If you meant something else, that wasn't clear.

              • dijit 4 hours ago

                > E) (I believe) don't enable E2EE with more than one device

                my response was:

                > E) Neither does Signal/Whatsapp.

                The thread of the "E" topic is relevant here, i'm not claiming that Signal/Whatsapp support (or do not support) encryption for group chats.

                Sorry that it wasn't clear, I thought referring to them directly by letter would make it easier to differentiate.

            • rockskon 4 hours ago

              It does work. How do you think Signal desktop works?

              • dijit 4 hours ago

                I thought it worked the same as Whatsapp, whereby there's a sort of backdoor connection to the app running on your phone to send messages.

                However, after doing a smidge more research it seems like somehow Signal is sharing it's key with the desktop app and only syncing history of messages directly: https://news.ycombinator.com/item?id=15596980

                I'm not 100% sure how it works as the server is fake-open-source and not actual open-source.

                • porridgeraisin 4 hours ago

                  Whatsapp doesn't need a connection to your phone anymore either. It used to be the case until a few years ago though.

        • fsflover 5 hours ago

          E) Yet it works fine on Matrix.

          • skeledrew 3 hours ago

            I've tried to use Matrix a few times and eventually end up leaving. The idea is good, but it's just missing so many nice features that it kinda isn't worth the pain. Features that Telegram just keeps dropping like candy.

            • fsflover an hour ago

              Your complains are quite vague. It seems to be working fine for me.

      • fsflover 5 hours ago

        F) They don't allow E2EE on GNU/Linux, including phones and desktop.

    • tptacek 5 hours ago

      I like how you sandwiched "the encryption story is bad" between two irrelevant social claims.

    • weberer 4 hours ago

      D) They moved to the enshittification phase and started displaying ads

    • BoredPositron 4 hours ago

      I mean Durov is going down the deep end in the last few weeks. Messaging all Telegram user with an Emergency feature with a doomer manifest.

      https://t.me/durov/452

      • skeledrew 3 hours ago

        I was pretty ticked off about this. I don't disagree with the message content itself, but having political content pushed to me is a big no-no. If this kind of thing keeps up I'll be dropping my premium sub.

      • ur-whale 3 hours ago

        > with a doomer manifest

        Can you point at anything in his message that's not factually correct?

        • a57721 2 hours ago

          One factual thing that looks off is "the UK is imprisoning thousands for their tweets". I'm not in the UK and not following closely the situation there, but "thousands", really? Genuine doubt, would love to see some evidence.

          Otherwise, the "doomer manifest" is OK, but the comically inflated ego of Durov is annoying, him thinking that such banal and commonplace sentiments are worth pushing as an alert message to all users, wrapping everything into announcing his birthday (that he doesn't want to celebrate, oh no).

        • skeledrew 3 hours ago

          It's not about the content IMO; it's about the principle. Should not be sending content to users, unless they opted into said content being sent to them.

        • jazzyjackson an hour ago

          There is a grossly sexist omission in "built by our fathers"

        • simion314 3 hours ago

          >Can you point at anything in his message that's not factually correct?

          He also got involved in Romanian and Moldovan elections, by sending a message to target users in the day of the elections( when doing campaign is illegal) with claims he presented no evidence for, basically the bastard works for Ruzzia, he might be forced to but the facts do not lie.

      • asacrowflies 4 hours ago

        Seems pretty cognizant of the modd of entire HN front page past few weeks honestly