TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How I Hacked Telegram’s “Encryption”

40 点作者 PaulSec大约 10 年前

7 条评论

paulsecwhatt大约 10 年前
TL;DR - the author claims to have hacked their encryption by reading the messages in phone memory.<p>I don&#x27;t understand how this is a valid exploit&#x2F;vulnerability? How would any device, Android or not, render the actual picture of the message on the GPU without having the unencrypted string in memory? It&#x27;s not possible. If you have local memory&#x2F;code execution, you will ALWAYS have access to the messages any client application is rendering&#x2F;using.
评论 #9095902 未加载
treeform大约 10 年前
I am not even a security novice, but isn&#x27;t getting root on the devices basically a game over? The suggestions the author hard to encrypt the stuff in memory and on disk would just add a extra step for the attacker to find the key? If they key had to be entered by the user every time the attack can just wait until the user does so? If thats too hard... just monitor the user. With root you can just wait and take screen shots... (as the author shows) which would work for any thing the user does ever and is simpler?
评论 #9095959 未加载
dustyfresh大约 10 年前
The attack vector wasn&#x27;t even through the Telegram application but depending on if you get access to disk or memory. Sure that&#x27;s not hard to do...but it&#x27;s still safe in-transit? A pretty interesting read, but I&#x27;m not seeing the leetness here.
eugeneionesco大约 10 年前
This is clickbait unfortunately, his attacks require root access on the device.
moe大约 10 年前
tldr; End-to-end encryption does nothing when an adversary controls one of the ends.<p>I&#x27;d say this guy is trying a little too hard to promote his &quot;Zimperim Mobile Security&quot; brand here...
评论 #9096053 未加载
packetized大约 10 年前
Also neat that you really can recompose the entire conversation, as the timestamps are clearly available in the DB.<p>Offset 0056e1c, 0x54ba8a1d is unixepoch 1421511197 - which is January 17th, at 16:13:17GMT - which, given that the author is in Tel Aviv (GMT+2), corresponds with the 6:13PM timestamp for &#x27;Shlookiedo&#x27; seen in the photos.
chatmasta大约 10 年前
I find it hard to believe that Telegram did not respond to the author. How can one company simultaneously host a $200k security contest, yet not respond to a simple email disclosing a vulnerability?
评论 #9095924 未加载
评论 #9095937 未加载