From f378a64f05fe144de8e45d2a6573cd51e7de6d8b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 9 Sep 2022 18:41:25 +0000 Subject: [PATCH] Update content of files --- data/web/telegram.org/blog/cryptocontest-ends.html | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/data/web/telegram.org/blog/cryptocontest-ends.html b/data/web/telegram.org/blog/cryptocontest-ends.html index 1821458af2..04a73e0396 100644 --- a/data/web/telegram.org/blog/cryptocontest-ends.html +++ b/data/web/telegram.org/blog/cryptocontest-ends.html @@ -86,7 +86,7 @@

Security researchers are welcome to submit any issues they find in the Telegram apps or protocol to us at security@telegram.org. All submissions which result in a change of code or configuration are eligible for bounties, ranging from $500 to $100,000 or more, depending on the severity of the issue.

The current round of our contest to crack Telegram’s encryption ends with no winners. Despite the $300,000 bounty and the fact that contestants could act as the Telegram server passing info between the users (i.e. use any kinds of active attacks, manipulate traffic etc.) no one could decipher their Secret Chats by the beginning of February.

-

To demonstrate that the contest was fair, we‘ve added a decryption method to the contest bot’s list of commands – KEY. KEY returns the 256-byte encryption key used in the secret chat, so the task of the contest is now easily achieved.

+

To demonstrate that the contest was fair, we've added a decryption method to the contest bot's list of commands – KEY. KEY returns the 256-byte encryption key used in the secret chat, so the task of the contest is now easily achieved.

Why are contests important?

One of the reasons we trust Telegram’s Secret Chats more than many of their alternatives, is that they're open to scrutiny from the world’s security experts. And while having open source apps and a well documented API makes this kind of scrutiny possible, it is our contests that create incentive for it.

That’s why we will definitely launch the next round of our contest later this year. It’ll take us some time to determine whether we can further simplify the task for the contestants. Once ready, we’ll announce the new round on Twitter.

@@ -94,6 +94,10 @@

February 11, 2015
The Telegram Team

+
+

This contest is over, but Telegram's bug bounty program is always open.

+

Security researchers are welcome to submit any issues they find in the Telegram apps or protocol to us at security@telegram.org. All submissions which result in a change of code or configuration are eligible for bounties, ranging from $500 to $100,000 or more, depending on the severity of the issue.

+