Telegram, as it states on its home page, is a secure messenger. Over the years it became a simple, powerful multi-device messenger which is selected as the main messaging platform by many people (the official Android app has more than 100 million installs, for example).
Many people say Telegram really is a secure messenger. They trust Pavel Durov, its creator, they get overwhelmed with its promotion, they get obsessed. I will try to dissolve Telegram as a secure messenger suitable for private messaging from the end user’s point of view.
So, let’s start with the main promotional Telegram’s feature which was heavily advertised—the secret chats.
Secret chats is the way Telegram does end-to-end encryption on your messages. They are said to leave no trace on Telegram’s servers and to be not available to them. This is the recommended way to message securely on Telegram.
However, they are pretty unconvenient, as you have to start them by hand. They also have a few problems that make their usage painful.
Secret chats don’t work on multiple devices. According to Telegram FAQ, the secret chats are device-specific and can be opened only from device they were created from. We now can already conclude the secret chats are not scalable (or why would someone limit their usage to only one device?), so are not suitable for convenient messaging.
All secret chats in Telegram are device-specific and are not part of the Telegram cloud. This means you can only access messages in a secret chat from their device of origin.
Messengers really caring about end-to-end encryption of its clients should provide the way to somehow synchronize encrypted chats, or such feature would not be used by masses. For example, Signal Protocol, the cryptographic protocol used by Signal, does scale, so as its port to XMPP, OMEMO, and Proteus, the port made for Wire messenger. They achieve multi-device encryption by encrypting the message separately for every recipient device.
Secret chats don’t allow you to start chats at any time. You’ll have to wait for the recipient to become online to send him encrypted messages on Telegram, when you don’t need this if using protocols designed to provide offline messages delivery, like Signal Protocol, which was already mentioned above.
Telegram’s secret chats are like OTR in XMPP—an old encryption protocol that doesn’t allow you to neither synchronize messages nor send messages to offline devices.
OTR has significant usability drawbacks for inter-client mobility. As OTR sessions exist between exactly two clients, the chat history will not be synchronized across other clients of the involved parties. Furthermore, OTR chats are only possible if both participants are currently online, due to how the rolling key agreement scheme of OTR works.
Introduction to XEP-0384, the motivation to replace OTR
Secret chats don’t work on Telegram Desktop. Here comes another problem of the secret chats — they are only available on the mobile phones (and on the Telegram client from App Store). Telegram Desktop, the official Telegram app for Windows, macOS and Linux, doesn’t support secret chats, while this feature was first requested at June 1, 2014. There were many requests since then (1, 2, 3, etc), but secret chats are still unimplemented as of Jule 5 in the official desktop app of the messenger which claims itself secure.
Secret chats don’t work in group chats. You can’t end-to-end encrypt Telegram group chats at all, that’s it. If you want to chat with many people at once securely… you can’t, forget it. The E2EE protocol of Telegram doesn’t allow you to group chat securely, when modern protocols, like Signal Protocol, actually allow you to, by the technique already stated above—encrypting messages to every recipient separately.
Secret chats just aren’t usable. The whole secret chats thing just does it the wrong way. As Telegram’s secret chats are not really suitable for multi-device environment and do not allow you to use them in group chats, and you have to force them by hand, you probably won’t use them at all, therefore your messages will be easily available to Telegram.
Any security protocol should be independently audited to be trusted on being secure. MTProto, the homegrown encryption protocol used by Telegram to encrypt messages, wasn’t audited, but instead a challenge was posted by Pavel Durov to crack the secret chat he started with his brother.
The lack of winners noted by Pavel Durov is the thing he mostly admires when claiming the protocol security. Why is a marketing promotional better than an independent expert audit which would state things better? We only have to guess and hope the protocol is really secure.
Spreading fear and doubt
Pavel Durov recently stated the encryption of Signal was funded by US government, so the backdoor is predicted to be found in 5 years.
The encryption of Signal (=WhatsApp, FB) was funded by the US Government. I predict a backdoor will be found there within 5 years from now.
The development of a new crypto is a hard task to accomplish. The cryptoexperts funded by the governments know there shouldn’t be any backdoors, as any security tamper used by “good guys” can eventually be used by “bad guys”.
If the protocol is sound from the bad guys, it is safe and sound from anyone, so predicting the protocol to be found vulnerable in just 5 years sounds more like spreading FUD among people to help promoting Telegram. Not only it doesn’t look like a fair play, it’s a very dangerous thing to do as people trusting Durov probably will just abandon on things after such statements.
Undermining the competitors isn’t a good thing to do. Undermining them with spreading FUD among people is even worse.
Telegram is a program with sources published under the GNU General Public License v2 . Yet the only apps whose recent code is always available are Telegram Desktop and Telegram for Web while the mobile apps’ code is updated irregularly (Android, iOS).
The repos linked above face occasional updates with the interval close to 6 months or something about that. This is a rare case in the open source world, where the development almost always goes social, so you can see any interaction happened with the app’s code. But Telegram’s mobile apps development goes behind closed curtains: no pull requests are accepted, no issues are closed, commits do not link to individual changes, but instead consist of huge changesets pushed at once.
What prevents the messenger’s team from going fully open source as others already do? No idea. Still the reason to watch out.
Let’s summarize the things we’ve learned:
- Telegram uses its own cryptographic protocol, which hasn’t been audited by third-parties, but instead was starred in an advertisement promotional;
- Telegram’s secret chats are not scalable, do not allow to sync messages and do not apply to group chats;
- there isn’t an implementation of Telegram’s end-to-end encryption in the official desktop client;
- there isn’t any proof the Telegram servers do not spoof on messages except for its creator’s statements;
- Telegram’s creator makes FUD statements to promote his own service and undermine the competitors;
- the code for the mobile apps is updated irregularly, no one can tell why.
If you’re going to use Telegram for secure messaging, you’ll have to trust it on being secure, and there are many signs you shouldn’t. So, why don’t you make a change then? There are already a few secure messengers on the market that allow you to chat securely while handling things like multiple devices much better than Telegram does, like Wire or Signal.
1: The apps licensed under the GNU GPLv2 are Telegram’s mobile apps. Telegram for Web and Telegram Desktop are licensed under the GNU GPLv3.