200
submitted 2 months ago by neme@lemm.ee to c/technology@lemmy.world
you are viewing a single comment's thread
view the rest of the comments
[-] woelkchen@lemmy.world 14 points 2 months ago

Telegram, including secret chats, is not blocked because Russian elites happen to use that, too.

[-] brrt@sh.itjust.works 45 points 2 months ago

I could put on my tinfoil hat and say if signal is blocked but telegram isn’t, maybe that means that telegram isn’t as secret as they make it out to be.

[-] woelkchen@lemmy.world -2 points 2 months ago

It's open source. Look can up the encryption yourself.

[-] Varcour@lemm.ee 21 points 2 months ago

No need, all you have to do is read the whitepaper. they home brewed the encryption algorithm and nobody actually knows if it's worth a damn. That's not exactly a secret.

[-] Andromxda@lemmy.dbzer0.com 4 points 2 months ago

And it isn't even encrypted by default, you manually have to enable that. By default, all your plain text messages are stored on their servers.

[-] woelkchen@lemmy.world 3 points 2 months ago

nobody actually knows if it’s worth a damn.

After all these years, security researchers still don't know if the encryption is any good?

[-] HarriPotero@lemmy.world 11 points 2 months ago

On that level it usually falls on computer scientists. Formal methods can prove that any implementation is correct, but proving the absence of unintended attacks is a lot harder.

Needham-Schroeder comes to mind as an example from back when I was studying the things.

[-] woelkchen@lemmy.world -1 points 2 months ago

On that level it usually falls on computer scientists.

And not a single one has been able to analyze the encryption in all these years? Fact is, Telegram is the tool the Russian opposition and even Ukrainians use to communicate without Putin being able to infiltrate.

[-] HarriPotero@lemmy.world 2 points 2 months ago* (last edited 2 months ago)

No. It kind of falls on Dijkstra's old statement. "Testing can only prove the presence, not absence of bugs."

You can prove logical correctness of code, but an abstract thing such as "is there an unknown weakness" is a bit harder to prove. The tricky part is coming up with the correct constraints to prove.

Security researchers tend to be on the testing side of things.

A notable example is how DES got its mixers changed between proposal and standardisation. The belief at the time was that the new mixers had some unknown backdoor for the NSA. AFAIK, it has never been proven.

load more comments (14 replies)
load more comments (14 replies)
load more comments (16 replies)
this post was submitted on 09 Aug 2024
200 points (97.6% liked)

Technology

58665 readers
4352 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS