After getting acquainted with the
post and
another post.I wanted to learn more about Telegram.
Automatically driving a Telegram hashtag into
Twitter , I stumbled upon a blog of one IB company ...

How NOT to develop your application.
A few days ago, Pavel Durov announced a
campaign to correct bugs, for the protocol of decryption Telegram. Further it will be shown how personal data from the secret chat can be captured without any decryption methods due to "design failure".
Test tools
Android 4.3 in Virtual Box
Wireshark running on the local machine.
HTC One with Android 4.0.3
Telegram 1.3.800 (in virtual box)
')
Technique
First, let's install Telegram, and let's call the users, for example, Alice and Bob. After that, create Telegram accounts and add each other as a friend:

Now we create a secret chat:

We send a test message:

As we can see in Wireshark, all data passes through SSL and looks encrypted.
But...
What if we try to send some attachment? For example, geolocation?


Aha Open unencrypted TCP session. Let's take a closer look:

By default, Telegram uses the Google-Maps API in unencrypted form to download a map fragment.
In terms of security and anonymity, this is a complete failure ...
The person who controls the channel can intercept all geolocation attachments, bypassing the secret chat from two sides.
In practice, if Snowden sends someone who is
tapped by the NSA , his geographical position through Telegrams ... the tomahawk will be enough to satisfy
General Alexander .
Bug fix.
The Security Council reacted relatively quickly to this
incident and asked them to unsubscribe to the post office for a reward.
If I'm not mistaken, the fix looks like
this .
It is curious how much the authors will be paid for the bug found.
A source.