(no title)
testing12341234 | 12 years ago
The contest limitations rule out most of the likely attack vectors for breaking the protocol in the real world. It's like saying "Our bank vans are 100% secure. Just try stealing money from them without puncturing our tires or bribing one of our employees."
simias|12 years ago
Yesterday someone blogged an example of a completely broken cryptosystem that would still pass Telegram's challenge with the same limitations: http://www.thoughtcrime.org/blog/telegram-crypto-challenge/
StavrosK|12 years ago
raverbashing|12 years ago
More to the point, KPA,CPA, etc are very important, and systems should be definitely tested against them, but in real attacks, they may not be available