Telegram update fixes security flaws with Cloud Chats encryption


Telegram rolled out an update to patch various security vulnerabilities with the MTProto protocol. A bunch of researchers from Royal Holloway, University of London analysed the MTProto encryption protocol utilized by Telegram and listed the flaws with the app’s cloud chats methodology.

The MTProto protocol is utilized by Telegram when customers don’t opt-in for end-to-end encryption (E2EE). Telegram’s MTProto protocol is the corporate’s model of transport layer security, or TLS, a preferred cryptographic commonplace meant to make sure the security of knowledge in transit.

TLS security does defend Telegram customers in opposition to man-in-the-middle assaults to an extent however does come with its flaws, one in all which is that it doesn’t cease servers from studying texts utterly.

The protocol will also be reportedly exploited to re-order messages, which an attacker may use to control Telegram bots. Another flaw permits attackers to extract plain textual content from encrypted messages. Found in Android, iOS and the desktop model of the app, the flaw would require a whole lot of work on the attacker’s half however nonetheless allowed extraction to be doable.

Telegram has now stated that it has rolled out updates to the app, fixing the observations made by the researchers. “None of the changes were critical, as no ways of deciphering or tampering with messages were discovered,” Telegram added in a brand new weblog submit.

If you’re utilizing Telegram on desktop, Android or iOS, now is an effective time to get the app up to date to the newest model from the App Store or Play Store to ensure these security vulnerabilities don’t make you a goal for attackers.


Please enter your comment!
Please enter your name here