Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
jbz
@jbz@indieweb.social  ·  activity timestamp 2 weeks ago

Subverting Telegram’s End-to-End Encryption | IACR

「 Our attack exploits MTProto2.0’s degree of freedom in choosing the random padding length and padding value. Accordingly, we strongly recommend that Telegram should revise MTProto2.0’s padding methodology. In particular, we show that a minor change in the padding description of MTProto2.0 makes it subversion-resistant in most of the practical scenarios 」

https://tosc.iacr.org/index.php/ToSC/article/view/10302

#mtproto #telegram #cybersecurity #privacy

Subverting Telegram’s End-to-End Encryption
| IACR Transactions on Symmetric Cryptology
  • Copy link
  • Flag this post
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0-rc.3.21 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login