TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How I Hacked Telegram’s “Encryption”

40 pointsby PaulSecover 10 years ago

7 comments

paulsecwhattover 10 years ago
TL;DR - the author claims to have hacked their encryption by reading the messages in phone memory.<p>I don&#x27;t understand how this is a valid exploit&#x2F;vulnerability? How would any device, Android or not, render the actual picture of the message on the GPU without having the unencrypted string in memory? It&#x27;s not possible. If you have local memory&#x2F;code execution, you will ALWAYS have access to the messages any client application is rendering&#x2F;using.
评论 #9095902 未加载
treeformover 10 years ago
I am not even a security novice, but isn&#x27;t getting root on the devices basically a game over? The suggestions the author hard to encrypt the stuff in memory and on disk would just add a extra step for the attacker to find the key? If they key had to be entered by the user every time the attack can just wait until the user does so? If thats too hard... just monitor the user. With root you can just wait and take screen shots... (as the author shows) which would work for any thing the user does ever and is simpler?
评论 #9095959 未加载
dustyfreshover 10 years ago
The attack vector wasn&#x27;t even through the Telegram application but depending on if you get access to disk or memory. Sure that&#x27;s not hard to do...but it&#x27;s still safe in-transit? A pretty interesting read, but I&#x27;m not seeing the leetness here.
eugeneionescoover 10 years ago
This is clickbait unfortunately, his attacks require root access on the device.
moeover 10 years ago
tldr; End-to-end encryption does nothing when an adversary controls one of the ends.<p>I&#x27;d say this guy is trying a little too hard to promote his &quot;Zimperim Mobile Security&quot; brand here...
评论 #9096053 未加载
packetizedover 10 years ago
Also neat that you really can recompose the entire conversation, as the timestamps are clearly available in the DB.<p>Offset 0056e1c, 0x54ba8a1d is unixepoch 1421511197 - which is January 17th, at 16:13:17GMT - which, given that the author is in Tel Aviv (GMT+2), corresponds with the 6:13PM timestamp for &#x27;Shlookiedo&#x27; seen in the photos.
chatmastaover 10 years ago
I find it hard to believe that Telegram did not respond to the author. How can one company simultaneously host a $200k security contest, yet not respond to a simple email disclosing a vulnerability?
评论 #9095924 未加载
评论 #9095937 未加载