(no title)
plexicle | 3 years ago
It's why you are able to just login to your Telegram account on another device and magically get all of your message history.
So while the tech might be solid, the keys are still out there. They can be leaked. They can be subpoenaed, etc.
gwd|3 years ago
tptacek|3 years ago
https://nebuchadnezzar-megolm.github.io/
skyyler|3 years ago
Secret chats are secure, and you cannot access them except on the device you start them with. It's one of the pain points for people that use them: they don't sync like normal chats.
palata|3 years ago
lloeki|3 years ago
That's an entirely different problem than TFA (an attacker accessing and being able to impersonate an account by subverting a third party 2FA middleman), which Telegram guards against as as soon as you have one device enrolled the code is sent over Telegram, not SMS.
> It's why you are able to just login to your Telegram account on another device and magically get all of your message history.
Being able to log in and get your history to sync is not a telltale sign that history is not encrypted and thus visible server side.
It could be stored encrypted and upon login decrypted locally (how to achieve that is left as an exercise to the reader, see 1password, restic, borg, and many others that store with zero trust yet are accessible by multiple devices, or even multiple parties)
(side note: claims that multi-device messaging can't be done because E2E are incorrect, e.g iMessage does it, by having each message encrypted multiple times, once for each device of the recipient account)
> So while the tech might be solid, the keys are still out there. They can be leaked. They can be subpoenaed
IIRC it was advertised that Telegram keys (presumably for data at rest) are stored split upon two (or more) different servers residing in different jurisdictions so that subpoenas would only get at most half of it or require international cooperation.
But then if you enter that ground, Telegram just as much as Signal could be court-pressured to produce a client that wiretaps data right where it's decrypted and phone home, so E2E only saves you if you audit every client version that this does not happen.
As always in matters of security, first step is to define your threat model, and who you want to secure against, as there's no such thing as perfect security.
> No analysis needed.
I would definitely like to see one done by an unbiased party, because everything I can find are blanket gut-feeling statements without reference.
EDIT: just found this, which is a bit light but still something: https://restoreprivacy.com/secure-encrypted-messaging-apps/t... and this: https://arxiv.org/pdf/2012.03141v1.pdf
orangepurple|3 years ago