Security researchers discovered a vulnerability in Telegram's MTProto2.0 encryption protocol that enables algorithm substitution attacks. The attack exploits flexibility in padding methodology to recover encryption keys with high probability and low latency, potentially enabling mass surveillance through compromised third-party

2m read timeFrom tosc.iacr.org
Post cover image

Sort: