I don’t want to see PGP rejection based on usability. So, to level the field at user level we take Delta Chat, which uses PGP. If I understand that correctly.
I have no knowledge of telegram security at all.
I don’t want to see PGP rejection based on usability. So, to level the field at user level we take Delta Chat, which uses PGP. If I understand that correctly.
I have no knowledge of telegram security at all.
Beyond the fact that security on Telegram is a joke (E2EE not enabled by default, only available in 1-to-1 chats, groups chats are all unencrypted, homespun encryption algo), they have never had a full, independent audit of their encryption standard.
It looks like there are a handful of papers that looked at parts of the earlier standard Telegram used (MTProto 1), but nothing on the current version (MTProto 2).
https://courses.csail.mit.edu/6.857/2017/project/19.pdf
https://eprint.iacr.org/2015/1177.pdf
https://eprint.iacr.org/2015/1177.pdf
Anyway, long story short, Delta Chat has had independent audits several times. I’d say that says it all, really.
https://delta.chat/en/help#security-audits
(Also, thanks for introducing me to Delta Chat, was unaware of the project up to now. Neat stuff.)
Agreed.
No audit…then we don’t know.
Have you seen an audit for SwissCows’ Teleguard?
I’ve been testing it for a few days now, after a comment about it here.
They claim to not store your chats, they’re deleted after delivery. To sync a new device requires an encrypted backup from an existing device.
I’ve tested this by restoring a backup from yesterday to sync a new device, and it only has data from yesterday.
That said, I really don’t know how trustworthy they are.
Nice, I hadn’t heard of them until now, either.
I’m just excited that end-to-end-encrypted services have become in such high demand that we’re seeing lots of different implementations.
It took a while, but it looks like Veilid finally has a basic chat built in their protocol as well. It says it’s secure, but I can’t find any info on its particulars.
https://gitlab.com/veilid/veilidchat
While I don’t disagree with you, I don’t believe that if MTProto 2 was breakable govts would be putting the shit show they’re putting right now.
breakable for the NSA doesn’t mean the police have access
also the current issue is with moderation: telegram is refusing to take down CSAM channels etc
And what about signal? If some gov founds a group chat they don’t like, will they take it down? How will they even know if all the contente is encrypted?
CSAM? More like copyright infringement. CSAM is the usual cheap excuse to shut down everything because of the obvious social implications.
while true, that doesn’t mean that it isn’t compromised but not hackable yet, or that a weakness won’t be found in the future. I would heed the advice of those in the field of cryptography and stay away from Telegram and MProto