Is Telegram really an encrypted messaging app? (blog.cryptographyengineering.com)
from solrize@lemmy.world to privacy@lemmy.ml on 26 Aug 00:16
https://lemmy.world/post/19053192

Blog post by crypto professor Matthew Green, discussing what Telegram does (I wasn’t familiar with it) and criticizing its cryptography. He says Telegram by default is not end-to-end encrypted. It does have an end-to-end “secret chat” feature, but it’s a nuisance to activate and only works for two-person chats (not groups) where both people are online when the chat starts.

It still isn’t clear to me why Telegram’s founder was arrested. Green expresses some concern over that but doesn’t give any details that weren’t in the headlines.

#privacy

threaded - newest

just_another_person@lemmy.world on 26 Aug 00:40 next collapse

Only under very specific circumstances.

merde@sh.itjust.works on 26 Aug 01:15 next collapse

same subject 3 hours ago ☞ lemmy.dbzer0.com/post/26612132

solrize@lemmy.world on 26 Aug 02:58 collapse

Hmm, so this is kind of a dup thread. I wonder if there is a way to lock and forward it, or at least mark it as a cross post. Thanks.

BearOfaTime@lemm.ee on 26 Aug 01:25 next collapse

I mean really, we don’t need an entire article to explain how encryption works on Telegram.

  1. Chats by default aren’t fully e2e. Your key must be kept on the server(s) to enable instant sync with other devices

  2. There is a full e2e chat, you can enable this at any time. But, it doesn’t do groups, it’s only between 2 parties, and it doesn’t sync across devices.

  3. Telegram’s encryption isn’t open source, so no one can verify it’s soundness or risks.

None of this is new info, it’s been talked about for 2 years now.

pivot_root@lemmy.world on 26 Aug 01:43 next collapse

We really don’t need more than #3 for a reason to stay far away from Telegram. Security through obscurity is not security, and neither is rolling your own crypto.

Andy@programming.dev on 26 Aug 19:05 collapse

Just note that the comment was inaccurate, in that their weird encryption is indeed open source at least.

kboy101222@sh.itjust.works on 26 Aug 02:01 next collapse

Are there any programs that can do e2e in a group chat? My limited knowledge of e2e and encryption makes me think that’d be extremely difficult and even clunkier

adespoton@lemmy.ca on 26 Aug 02:59 next collapse

Messages app by Apple. Not extremely difficult, but has its trade offs, and easier when all devices share a CA.

KLISHDFSDF@lemmy.ml on 26 Aug 06:24 collapse

CA?

adespoton@lemmy.ca on 26 Aug 17:50 collapse

Certificate Authority

KLISHDFSDF@lemmy.ml on 26 Aug 23:52 collapse

Doesn’t the concept of using a CA (which are generally also central authorities) go against the idea of E2EE that only required to (or more) endpoints or am I missing something? Signal group messages (and the protocol/concept behind it) work without a CA. I think I’m missing something, can you connect the dots for me?

adespoton@lemmy.ca on 27 Aug 04:04 collapse

The CA is purely a way to provide validation that the endpoints being connected are who they say they are; the actual signing certificates are still private. Apple uses a central directory; Signal depends on certificates linked to one way hashes of phone numbers.

polluteyourjorts@lemmy.one on 26 Aug 03:00 next collapse

Signal

yogthos@lemmy.ml on 27 Aug 16:12 collapse

Ah yes, the metadata collection app for the NSA.

kali@fedia.io on 27 Aug 16:31 collapse

Isn't Signal's whole thing that they reduce metadata as much as they can? What do you recommend? Matrix and XMPP certainly aren't options if you value metadata protection.

yogthos@lemmy.ml on 27 Aug 18:17 collapse

The phone number is the most important piece of metadata, and collecting numbers of people who want to use e2ee and are willing to use an app that’s inconvenient, then building graphs of these people and cross referencing the numbers with all the other data the government has is clearly valuable.

Whether other apps are better or worse in terms of collection of metadata is completely irrelevant when evaluating whether Signal itself is safe. However, as far as alternatives go Simplex simplex.chat seems to be one of the better options.

Even if no chat app protected metadata properly, that’s still an important fact to acknowledge. Furthermore, it may be more important for people to protect their metadata from a specific government that has agency over them. If you live in US or a US protectorate, then data being leaked to the US government is your primary concern.

kali@fedia.io on 27 Aug 18:49 collapse

I mean, Signal has over 100 million downloads on the Play Store alone. Even on the odd chance those phone numbers do somehow end up in the hands of the NSA or whatever the chances of it actually relaying any real information about you is second to none.

Even then, you can't assume everyone who uses Signal wants to use e2ee explicitly. Some might just like the app's style, some might have family members who only use Signal, some might have an ethical problem with corporate apps but aren't computer-brained enough to know how SimpleX or Jabber or some other obscure alternative works.

Is the phone number requirement bad? Yes, absolutely. Does that instantly rule out all opportunity for it being a good app, privacy wise? Definitely not.

Further; privacy should be simple. Signal is designed to be as close to perfect as it can be without compromising too much privacy. They have decided that a phone number is necessary to prevent spam, and to combat the privacy implications of that they have chosen not to block temporary numbers for those who are more concerned.

Private chat apps are useless if noone knows how to use them. Signal tries to fix that, and I think they're doing a pretty good job even if it does have it's pitfalls.

yogthos@lemmy.ml on 27 Aug 18:56 collapse

I think you missed the point there. The value for the NSA is in knowing which phone numbers communicate with other phone numbers which is precisely the metadata that Signal leaks. This allows you to build networks of users who are doing private communication. Next, you can cross reference the phone numbers with the data from Google, Meta, etc. and then if you see that one of them is a person of interest, then you immediately know the other people they talk to who are now also of interest.

The fact that people keep trying to downplay this is truly phenomenal to me. Once again, Signal is an app that uses a central server based in the US, that almost certainly shares data with the government. Anybody who minimally cares about their privacy should be concerned about this.

Signal is not an app that’s private. Period. If you don’t understand this then you don’t understand what the term privacy means.

sunzu2@thebrainbin.org on 27 Aug 19:13 next collapse

which phone numbers communicate with other phone numbers which is precisely the metadata that Signal leaks.

Has this been confirmed? I had this theory before but got told this ain't true...

yogthos@lemmy.ml on 27 Aug 20:26 collapse

If the metadata is being leaked then you have to assume it’s being used in an adversarial way. Privacy can’t be trust based. Either the protocol is secure and it guarantees that your metadata is private, or you’re taking it on faith that people operating Signal servers are good actors and will never leak this data to anybody you wouldn’t want them to.

Also worth noting that thanks to US laws, Signal would not even be allowed to say they’re sharing data with the government even if they wanted to.

sunzu2@thebrainbin.org on 27 Aug 20:33 collapse

I have no doubt that signal will turn over whatever they had but does they have the info about who is contacting who?

I was explained that they don't

Obvi all this shit is a trust me bro

yogthos@lemmy.ml on 27 Aug 20:37 collapse

As far as I know, nothing in the protocol prevents the server from connecting who is talking to whom. In fact, given that the phone number is how an account is identified, the server effectively has to do this in order to pass messages between people.

kali@fedia.io on 27 Aug 20:20 collapse

Even then, you're jumping to the conclusion that

a) Signal sends this data to the NSA
and
b) Signal doesn't protect phone numbers in somr way

Neither of these do I care about enough to keep entertaining this conversation. Goodbye.

yogthos@lemmy.ml on 27 Aug 20:24 collapse

Assuming that data that can be leaked is being leaked is the only sensible thing to do if you care about privacy. Clearly this is too difficult a concept for you to wrap your head around.

Thanks for at least being honest that you don’t actually care about privacy. Bye.

sunzu2@thebrainbin.org on 27 Aug 21:04 collapse

Assuming that data that can be leaked is being leaked is the only sensible thing to do if you care about privacy.

Aint this is the rule among cryptography types anyway?

yogthos@lemmy.ml on 27 Aug 21:27 collapse

Right, and it’s strange to me that such a fundamental rule is being ignored when it comes to Signal. All of a sudden people start making all kinds of excuses as to why it’s not a problem in this case.

solrize@lemmy.world on 26 Aug 04:43 next collapse

Group chat is a tricky problem and the modern crypto group (moderncrypto.org) talked about it at great length a few years back. I don’t know whether any software exists that incorporates all those ideas, but that’s mostly because I haven’t really been looking for it.

poVoq@slrpnk.net on 26 Aug 10:34 collapse

There is the MLS standard now that was explicitly developed with e2ee group chat applications in mind. From what I have read so far, this new standard seems well regarded by cryptography experts.

solrize@lemmy.world on 26 Aug 10:39 collapse

Thanks, I’ll ask my crypto homies about it. I remember they were trying to handle some subtle problems.

MLS info: en.m.wikipedia.org/wiki/Messaging_Layer_Security

kugmo@sh.itjust.works on 26 Aug 18:22 next collapse

Element (really any Matrix client that supports e2ee) but rooms with hundreds I’d people and having encryption enabled is going to to have lots of messages with key exchange errors.

dsilverz@thelemmy.club on 26 Aug 18:42 collapse

PGP/GPG encryption. It works with any IM, social network, anything (at least if the platform/program/app/medium allows for sufficiently lengthy messages so to carry the encrypted payload). There are some IMs that bring PGP/GPG natively, as well as extensions for existing IMs that also adds PGP/GPG feature, but PGP/GPG doesn’t need to be native to the app to convey encrypted messages, it’s a base64 text. It’s really an E2EE.

solrize@lemmy.world on 26 Aug 02:02 next collapse

Sure, I just have never used telegram or paid attention to it until that guy got arrested. So the quick overview by a cryptographer was helpful.

wildbus8979@sh.itjust.works on 26 Aug 03:39 next collapse

2 years? Try ten!

poVoq@slrpnk.net on 26 Aug 10:31 collapse

Telegram’s encryption isn’t open source, so no one can verify it’s soundness or risks.

This is not true, it is available in the open-source Telegram clients.

What you probably mean is that it is using an unusual and not well studied encryption algorithm. This means you need to be a real cryptography expert to spot flaws in it.

Telegram justifies this with a bit of FUD about well known encryption algorithm being NSA sponsored etc, but when cryptography experts did look at Telegram’s homegrown algorithm they were less than impressed.

yogthos@lemmy.ml on 27 Aug 16:12 collapse

As I recall, Telegram put up bounties for people actually demonstrating exploits in its encryption. Have any of these cryptography experts actually shown exploits?

pupbiru@aussie.zone on 27 Aug 17:00 collapse

telegram put up bounties relating to specific properties of their encryption, yes but there’s more to private messaging than just encryption… for example afaik it’s trivial to do things like replay attacks

their encryption may not be flawed, but they failed to design an algorithm that protects against the wide array of modern attacks, as they are mathematicians; not security experts. they understood the maths, but not the wider scope of implementation

a good example of these is linked down thread about MLS

Security properties of MLS include message confidentiality, message integrity and authentication, membership authentication, asynchronicity, forward secrecy, post-compromise security, and scalability.

the telegram bounties afaik only cover 1 security property

yogthos@lemmy.ml on 27 Aug 18:13 collapse

But can you provide an example of an actual flaw being demonstrated by anybody with or without a bounty?

pupbiru@aussie.zone on 28 Aug 11:54 collapse

i neither have the time nor inclination to research to that degree - i’m merely saying that the bounties prove very little, and change nothing about how people should treat non-standard protocols and algorithms. in fact, the lack of substance is proof that they don’t fully understand the scope of what’s required in the field of security

yogthos@lemmy.ml on 28 Aug 14:38 collapse

And I’m saying that despite people constantly throwing shade on the protocol, nobody has actually showed any flaws in it over many years. The whole dogma that non-standard protocols and algorithms should be shunned out of principle is just that. Meanwhile, plenty of exploits have been found in standard protocols. Not only that there are known cases where US security agencies introduced exploits into popular protocols. theverge.com/…/nsa-paid-10-million-for-a-back-doo…

solrize@lemmy.world on 26 Aug 03:00 next collapse

This is pretty good, a discussion of possible motivation of the founder’s arrest, and comparison with an earlier scuffle involving the RIM Blackberry.

oblomovka.com/…/pavel-durov-and-the-blackberry-ra…

autonomoususer@lemmy.world on 26 Aug 04:00 next collapse

They can shut off that server whenever they want and then it won’t matter how encrypted your unsent message is.

Telegram is service as a software substitute.

possiblylinux127@lemmy.zip on 27 Aug 00:53 collapse

Not quite

SaaSub is when you have a server do your computing for you. This is just delivering messages. You technically could make a Telegram server if you were motivated enough. The server is just a relay for the most part.

That doesn’t make it good by any stretch.

possiblylinux127@lemmy.zip on 27 Aug 00:52 next collapse

No

Although Telegram is probably better than Instagram, WhatsApp or whatever other spyware.

LemmyHead@lemmy.ml on 27 Aug 13:49 collapse

Functionality-wise it definitely is, but secure wise no. There’s probably same kind of tracking for profit going on in the background like with WhatsApp and signal. SimpleX is a better alternative privacy and security wise, but it’s still in heavy development

cypherpunks@lemmy.ml on 27 Aug 13:06 next collapse

en.wikipedia.org/…/Betteridge's_law_of_headlines

aaaaace@lemmy.blahaj.zone on 27 Aug 15:11 collapse

Is Betteridge’s law always correct?

cypherpunks@lemmy.ml on 27 Aug 15:25 collapse

<img alt="close-up of sweating guy from two buttons meme" src="https://lemmy.ml/pictrs/image/0f83ce8c-7130-47fd-a25f-962d8a3fccfc.png">

jjlinux@lemmy.ml on 27 Aug 16:26 next collapse

No.

Kimusan@feddit.dk on 27 Aug 16:56 collapse

There is a reason the Russian government allow the use of it and even let their military use it - and it is not due to security! They have a backdoor into the chats and UAE it actively for listening in on things and spreading propaganda and disinformation.

Ranger@lemmy.blahaj.zone on 28 Aug 12:08 collapse

Then why do the Ukrainians also use it?

Kimusan@feddit.dk on 03 Sep 16:53 collapse

Nør for military communication. Just for public info