Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium 2017
DOI: 10.1145/3150376.3150382
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of the Telegram IM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 2 publications
1
6
0
Order By: Relevance
“…[11], and corroborates prior work that established the use of Telegram by activists [33]. However, Telegram has received relatively little attention from the cryptographic community [53,58] or information security research [1,6,97]. As noted in [58], academic attention is focused on the Signal Protocol partly due to its strong security promises such as forward secrecy and post-compromise security.…”
Section: Secure Messagingsupporting
confidence: 67%
“…[11], and corroborates prior work that established the use of Telegram by activists [33]. However, Telegram has received relatively little attention from the cryptographic community [53,58] or information security research [1,6,97]. As noted in [58], academic attention is focused on the Signal Protocol partly due to its strong security promises such as forward secrecy and post-compromise security.…”
Section: Secure Messagingsupporting
confidence: 67%
“…The procedure taken in this research development consists of 9 steps described as follows: (1) In the analysis of problem-solving needs include activities: (a) analyzing the existing conditions, namely looking for the root problems of the needs to be solved by learners (learners) who is the goal of problem-solving learning outcomes; (b) identify what needs to be mastered (knowledge, attitudes, and skills) to solve problems and follow up on possible new problems that need to be solved; (c) identify the difference between the expected goal condition and the existing condition; (d) determine and document the strengths that exist related to performance, and (e) determine what are the priorities to overcome the existing problems. The needs analysis is done by observation, interviews, and questionnaires, (2) In the analysis of learning resources includes activities analyzing the sources of people and media, namely: (a) Identification of learning resources includes the ability to teach staff, other teaching staff, computer technicians to develop online learners, offline, and mobile both owned by schools and outside the school, (b) identification of learning resources available include print, audio, audiovisual, computer, internet, and smartphone learning resources at school, (c) identification of learning resources There are printed learning resources, audio, audiovisual, computer, internet, and smartphone that are outside the school (WEB and other accesses. (3) At this stage, an analysis of the initial abilities and characteristics of students will be conducted, (4) Formulating learning objectives have been identified based on the previous steps, then arranged in order of the most important things.…”
Section: Research and Development Proceduresmentioning
confidence: 99%
“…Online learning enables the learning process that can achieve in the form of "complex skills" needed in the global era while enabling student-centered learning [1]. Meanwhile, according to [2] mentions some potential that can be developed from online learning resources in the learning process, it enables the learning process that can achieve achievements in the form of "complex skills" needed in the global era while enabling student-centered learning [3]. Meanwhile, according to [4] mentions some potential that can be developed from online learning resources in the learning process namely: (1) drawing on web-based material to be used by students both within and outside lesson time, (2) teachers modifying and adapting web-based resources for use with their students, (3) teachers using the Internet to support their professional needs.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, earlier versions of the protocol did not provide forward secrecy, and message sequence numbers were managed by the server, so that a malicious server could easily perform replay attacks [12]. Another form of replay attack was discovered in Android's Telegram client v3.13.1 [18], where the same message could be accepted twice by a client after 300 more messages had been sent. This was due to a flaw in the implementation, which did not abide by Telegram's Security Guidelines for Client Developers; in particular, the app did not check that the message ID of the received message was greater than any of the stored IDs.…”
Section: Related Workmentioning
confidence: 99%
“…This was due to a flaw in the implementation, which did not abide by Telegram's Security Guidelines for Client Developers; in particular, the app did not check that the message ID of the received message was greater than any of the stored IDs. This was fixed in Telegram v3.16 [18].…”
Section: Related Workmentioning
confidence: 99%