Answer the question
In order to leave comments, you need to log in
How resistant is the MTProto protocol to a Man-in-the-middle attack?
The cryptographic strength of this protocol is being actively discussed. As far as I know, the Man-in-the-middle attack is still relevant, despite active protection against it. Was Telegram able to deal with this problem?
Answer the question
In order to leave comments, you need to log in
FAQ - Authentication - Q: How are Secret Chats authenticated?
Those. to make sure that there is no intercepting major in the middle, it is recommended to visually compare the graphic fingerprints of the generated keys.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question