Seems it’s fixed now?
Seems it’s fixed now?
It actually seems more like a windows 10 compatibility dilemma for developers. You can support older systems but it would require some effort. The problem is not the absence of some specific certificates, but the absence of newer ciphers altogether.
This does give security but also removes backwards compatibility with some clients that might be important for some websites.
There is still plenty of fish for advertisers, sadly.
It’s barely anonymous, and poorly encrypted. The latter is the reason Durov is in custody
There is no logic here. If it was poor it would be very easy to track anyone including criminals. You can check the news to find the reasons.
There have absolutely been cases where a backdoor/weakness/lack of encryption used to catch criminals before
I meant telegram related cases.
Some are staying safe, others are being caught precisely because of this.
I didn’t see any proofs of that.
Using better encryption schemes is definitely part of that.
Part of what? I don’t get the point here.
is not any different from just having TLS for transport
Yes, in simple terms, all encrypted transfer protocols are similarly protected from mitm attacks.
That just means that they store both your data in some encrypted way and the key. They can still read it trivially.
They can and they said the decryption keys are always kept separately (there are probably more layers than I can describe) from the data to make sure the servers are not used to decrypt the data locally. They can be lying for all I care. The bigger problem is that people somehow assume this a huge threat, while all previous cases didn’t involve anything like that. People are getting into trouble for their public content - protected by some encryption but visible to anyone interested (who then report it to oppressive authorities).
While some go extra mile to explain to you how you should use e2e for your family group chats, real criminals do their stuff everywhere (especially on telegram) for years, staying safe. Problem is not how weak or strong the encryption is, but that once you are under oppression and do opposition activities, you’re going to learn by yourself how to deal with it. Signal will not save you from people in your group chats if they are there to report on you.
That’s not correct. Toy may call it TLS but it’s a custom protocol. Data is not kept unencrypted on their servers, according to their docs.
the messages are decrypted on the server
What you said means they can be decrypted on the server. But there is no proof of that happening in the past. People got into problems not because someone uncovered their content in telegram, but because that content was effectively public from the beginning.
You switched the topic of the discussion. My original comment stands, as it corrects some part of your first comment.
I didn’t suggest anyone to use telegram.
They have repeatedly worked with governments and worked against the interests of their users.
Even though those allegations are arguable, I know what you mean. And those cases don’t involve compromising the actual encryption from what I understand.
Ah yes, definitely go with a messenger that has known vulnerabilities in its crappy encryption protocol, instead of one with an actual secure E2EE implementation.
Feel free to go any way you want. I’m not asking you to use telegram.
You can still make encrypted backups
Spend time for that, and keep them where? Maybe also need a feature to sync them between mobile and desktop?
Only Telegram is too incompetent to do that.
Not an implementation issue but a trust issue.
Just stop lying. Telegram Secret Chats have been introduced in 2017
https://telegram.org/evolution see October 2013.
both Signal and WhatsApp have had E2EE (including for group chats!) for much longer.
Whatsapp had them inctorudec in 2016.
Are you mad that Signal is focusing on privacy and security by improving their encryption protocol, instead of wasting time on some UI garbage?
I’m perfectly fine with that. More apps using electron means less chance for my pc to run garbage applications on a regular basis.
keep in mind that Telegram can read all of your messages, as well as hand them over to governments.
Keep in mind that any person in your secret chats can read your message, copy or screenshot it and hand it to anyone else. Those people know much better if you’re doing anything sketchy (or something actually good but against their beliefs), than an app developer.
I think you are falling for the “genius inventor” fallacy clueless normies love a lot.
People advertising signal everywhere look like those kind of normies to me too. Doesn’t mean much.
The reason it’s not known to be broken is that it’s not a high value target - most people don’t use “secret chats” in TG.
Fair assumption. But it means you accept most people are stupid enough to not want such a feature or smart enough to not need it. Telegram user base is reported to be 900 million though.
Something not being standardized doesn’t mean it’s bogus.
Cool. So that gives people authority to say “if it’s used by signal and is standardized then it should be used by everyone”?
It doesn’t look like any of those are used by “major” messengers. Especially signal. This means “major” players prefer their own implementations, which removes the meaning from calling unused stuff a “standard”.
So if an app doesn’t support e2ee all data is being saved in plain text suddenly. You prefer calling telegram shitty because you don’t care to actually learn what it uses. So it should be fair for me to call any other client shitty for other nonsense.
has been proven to have critical weaknesses
Those are not critical, just some aspects being below some arbitrary expectational values. Also it seems there is still no proofs those vector attacks are being used at all.
Yes it can
They chose to target convenience over max security. Shoving strongest options to every user by default is agaiantt that. Reasons include: no history is being saved in this mode, and the desktop client doesn’t support it.
Signal has had group chats for many years now
Just because it was implemented by others doesn’t mean it’s a way to go for everyone. From what I understand, e2e in group chats means that there is going to be a transaction of keys between all members of the chat on adding any new member, and/or on new message, which excessively increases the burden on clients and servers in case of big active chats.
You can ask telegram to implement that, but you can’t blame it for keeping it behind some gates. Telegram got implemented e2e between 2 users before other messengers got it working in any form of group chats.
and use Signal
I’ll think about it if they ditch electron.
There is no normal e2ee because there is no standard for implementation, especially when it comes to group chats with >2 people.
Alternate clients are blocked from using that functionality because they may include ability to capture data somewhere, for example taking a screenshot of a protected chat.
Useless. Current allegations are related to the absence of moderation. Moderation of public content, in public channels or chats. As you can guess, end to end encryption does not protect public content.
That bad encryption was not cracked for now. The other one, that is used to process chats between 2 users in end to end mode, can’t be enabled by default because it assumes no history is kept and no support for group chats.
Also, the arrest doesn’t seem to be related to any of the things you mentioned. If anything it shows there are no ways for (certain) governments to affect the messenger, for now.
That’s also a lie. There is no way it would be impossible to remove the protection code (or parts of it) or make it not execute. That alone makes him a clown.