171
submitted 3 weeks ago* (last edited 3 weeks ago) by Pro@programming.dev to c/technology@lemmy.world

Telegram Response.

  • A company owned by a Russian network engineer named Viktor Vedeneev controls thousands of Telegram IP addresses and maintains its servers.
  • Vedeneev’s other companies have a history of collaborating with Russia’s defense sector, the FSB security service, and other highly sensitive agencies.
  • Because of the way Telegram’s encryption protocols work, even users who use its “end-to-end” encryption features are vulnerable to being tracked by anyone who can monitor its network traffic.
top 11 comments
sorted by: hot top controversial new old
[-] cyrano@lemmy.dbzer0.com 16 points 3 weeks ago

Not to dismiss (I agree with the premise) but is that a legit source?

[-] Pro@programming.dev 15 points 3 weeks ago

Yes, they are even republished by OCCRP.

[-] humanspiral@lemmy.ca 12 points 3 weeks ago

He's also been arrested by western governments, and certainly there were "conditions for release".

[-] Kyrgizion@lemmy.world 10 points 3 weeks ago

Look, in today's world, you get to choose who spies on you depending on your chosen platform, but spy on you they absolutely will. Wether it's the Russians, the Chinese or USA. The only way to not get spied on is to not use electronic communications at all.

[-] homoludens@feddit.org 13 points 3 weeks ago

Okay, who spies on me when I use e.g. Signal?

[-] dubyakay@lemmy.ca 6 points 3 weeks ago

The recipient of your messages.

[-] WhyJiffie@sh.itjust.works 7 points 3 weeks ago

that's not just useless defeatism, but also false. effective end to end encryption exists in multiple forms today.

signal, maybe even with a custom server.
matrix if the server is being ran on trusted hardware.
XMPP too with the right extensions.

[-] Albbi@lemmy.ca 7 points 3 weeks ago

Look, in today's world the entire banking sector relies on private communications to operate using the Internet. Why can't private citizens get the same?

[-] Kyrgizion@lemmy.world 2 points 3 weeks ago

End-to-end encryption should cover you, but anything that can set up man-in-the-middle attacks is poised to defeat that.

[-] homesweethomeMrL@lemmy.world 9 points 3 weeks ago

fully audited FOSS E2EE ftw

[-] AllNewTypeFace@leminal.space 8 points 3 weeks ago

This is my surprised face.

this post was submitted on 10 Jun 2025
171 points (100.0% liked)

Technology

72262 readers
2484 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS