@kravietz
In theory they can't do much with the nonce without already knowing the shared secret, in which case game over anyway, but that's not the place you want to be inserting a possibly attacker-made value, and even if you do, you want to hash it in, not XOR it.

Also did they just change MitM into PitM? I already have way too many acronyms to remember as it is without people making up new ones with the same meaning :|

@cjd

Yeah, I also wondered about the PitM when first saw the article summary :) As for the attack details, as I understand it that's the very point of the backdoor/bug - you establish a classic MitM where you're proxying the connection between the Telegram server and the victim so this happens *before* shared secret is even established.

Sign in to participate in the conversation
Mastodon πŸ” privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!