• JavaScriptPHPHTMLCssPythonWordPressWeb developmentLinuxMySQLAndroid
    WindowsJavaC++ / C#LayoutReactUbuntuYiiDjangoProgramming1C-Bitrix
    LaravelSystem administrationTelegramJSONDebianPostgreSQLIOSGoogleHtaccessWindows Server
    GitMacOSGoogle ChromeCMSWooСommerceBootstrapNginxSQLUnityAPI
  • Ask
  • Leaders

Categories

JavaScriptPHPHTMLCssPythonWordPressWeb developmentLinuxMySQLAndroidWindowsJavaC++ / C#LayoutReactUbuntuYiiDjangoProgramming1C-BitrixLaravelSystem administrationTelegramJSONDebianPostgreSQLIOSGoogleHtaccessWindows ServerGitMacOSGoogle ChromeCMSWooСommerceBootstrapNginxSQLUnityAPI
Programming
JavaScript PHP HTML Css Python WordPress Web development Linux MySQL Android Windows Java C++ / C# Layout React Ubuntu Yii Django Programming 1C-Bitrix Laravel System administration Telegram JSON Debian PostgreSQL IOS Google Htaccess Windows Server
Make a leaderReport
J
J
john_chees72020-04-29 20:39:15
Information Security
john_chees7, 2020-04-29 20:39:15

Is mtproto really secure?

How secure is the Telegram encryption protocol? How is it different, for example, from the Signal Protocol?

Reply
Answer the question

Answer the question

In order to leave comments, you need to log in

2 answer(s)
Report
D
Dimonchik, 2020-04-29
@dimonchik2013

by 100500%
if. of course, who needs the keys

Similar questions
A
Andrew2017-06-20 09:26:22
How to transfer data from Google Authenticator to another device? 2Reply
G
Grigory Bondarenko2021-05-13 12:44:17
How to securely connect from a domain controller to workstations via Powershell? 4Reply
H
HMR2015-07-13 00:36:17
Is there a difference between a buffer overflow in VirtualBox and real hardware? 0Reply
M
mr_blond972015-07-13 20:03:56
Is it possible to make it so that the site can only be accessed via openvpn? 3Reply
D
Dmitry Kulikov2015-07-14 10:47:19
Is it possible to change a file retroactively in linux? 3Reply

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question

banners