Security researchers discovered a vulnerability in Telegram's MTProto2.0 encryption protocol that enables algorithm substitution attacks. The attack exploits flexibility in padding methodology to recover encryption keys with high probability and low latency, potentially enabling mass surveillance through compromised third-party
Sort: