TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A Telegram bug that disclose phone numbers of any users in public groups

116 pointsby 07d046over 5 years ago

9 comments

22cover 5 years ago
Whilst not the same as mentioned in TFA, I noticed in Signal that if you allow it access to your contacts it will tell you how many of your contacts are already on Signal. I understand this is useful from a usability&#x2F;discoverability aspect, but from a privacy perspective I have no reason to be made aware of the fact that one of my old bosses who&#x27;s number is in my phone is on Signal and neither should they know that I am on Signal for the same reasons (or lack thereof).<p>What&#x27;s worse is there seems to be no way to opt-out of this behavior. I can deny Signal access to my contacts, thereby not knowing which of my contacts are on Signal, but that doesn&#x27;t stop the other party from knowing if I am on Signal if they have given Signal access to their contacts.<p>It&#x27;s not farfetched to consider a world where an oppressive regime may outlaw the use of something like Signal, Telegram or even WhatsApp and they&#x27;d be able to easily determine if you&#x27;re using such a service through passive techniques such as these.<p>As far as I know, Wickr is a bit more privacy focused, but it doesn&#x27;t tick the open source box for me (although the supposed source code is published[1] for public review).<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;WickrInc&#x2F;wickr-crypto-c" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;WickrInc&#x2F;wickr-crypto-c</a>
评论 #20779738 未加载
评论 #20778612 未加载
评论 #20781601 未加载
评论 #20777659 未加载
评论 #20778226 未加载
评论 #20779643 未加载
评论 #20778172 未加载
RichardHeartover 5 years ago
1 point by RichardHeart 44 minutes ago | parent | edit | delete [-] | on: Telegram 0-day vulnerability that can be used to d...<p>&quot;TELEGRAM&#x27;S REPLY ZDNet has reached out to Telegram for comment earlier today, and the company has looked into the issue reported by Hong Kong protesters. &quot;We have safeguards in place to prevent importing too many contacts - exactly to prevent the scenario,&quot; a Telegram spokesperson said.<p>&quot;In fact, our data shows that the bot displayed on the screenshots got banned from further imports after two seconds - and only managed to successfully import 85 contacts (not 10,000),&quot; it said. &quot;Once you get banned from importing contacts, you can only add up to 5 new numbers per day. The rest of the contacts you add will look like they&#x27;re not using Telegram - even if they are.&quot;<p>However, this ban limit can be bypassed. A determined threat actor like the Chinese state can easily employ multiple bots to exploit this issue, instead of just one, and they&#x27;ll eventually import the entire phone number sequence they want to cover.&quot;
yaro2015over 5 years ago
<a href="https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;telegram-voicemail-hack-used-against-brazils-president-ministers&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;telegram-voicemail-hack-used-a...</a>
chipotle_coyoteover 5 years ago
You know what would be a great way to mitigate this kind of attack vector? Stop insisting on tying identity to phone numbers.
samatover 5 years ago
Telegram says they block massive contacts imports, says that particular bot was able to add only 85 contacts and then throttled to 5 new contacts per day.<p>My questions is how do they distinguish legitimate imports? I have 2K phone numbers in my address book. Would it take a year for me to be able to message my friends on telegram?
评论 #20787016 未加载
mahemmover 5 years ago
The widespread usage of Telegram in a situation as sensitive as the Hong Kong protests is a failure on behalf of the security industry in educating the public.<p>Even WhatsApp is miles better, but in reality it should be a no-brainer for the relevant people to use Signal or perhaps Threema&#x2F;Wire. What a shame that charlatans have successfully marketed themselves to the top of this segment with a distinctly inferior product.
评论 #20786834 未加载
评论 #20779148 未加载
评论 #20782692 未加载
评论 #20798636 未加载
hmnomover 5 years ago
It could be argued you already had the phone number of your victim.<p>If mobile numbers in your country are in the 2________ range, how feasible is it to add millions of phone numbers to your contact list to find out the number of someone? I think this is nonsensical.
评论 #20778016 未加载
评论 #20776964 未加载
评论 #20779491 未加载
评论 #20778756 未加载
评论 #20776949 未加载
评论 #20777189 未加载
johnnycabover 5 years ago
This <i>appears</i> to be a similar attack vector, to the one which might have been used for scamming Swiss Revolut customers, by determining legitimate users via the phone number range, in order to deliver fraudulent SMS messages.<p><a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;Revolut&#x2F;comments&#x2F;cu07cv&#x2F;revolut_scam_swiss_why_did_the_scammer_have_my&#x2F;exq79mv?utm_source=share&amp;utm_medium=web2x" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;Revolut&#x2F;comments&#x2F;cu07cv&#x2F;revolut_sca...</a>
anthony_barkerover 5 years ago
f*ck no wonder I get so many robo calls
评论 #20777649 未加载