As an epilogue, the Telegram client misused a non-secure random number generator mrand48 for the keys used in their contest. A student, Thijs Alkemade, was able to recover their keys and decrypt the contest message transcripts: https://blog.thijsalkema.de/blog/2014/04/02/breaking-half-of-the-telegram-contest/
On Thu, Mar 20, 2014 at 9:41 AM, Tony Arcieri <basc...@gmail.com> wrote: > > Moxie's point was that a cryptosystem can be obviously broken in multiple > different ways and its creator might still not lose such a contest (though > Telegram did). > > The Telegram "contest" was much more a PR stunt then a serious attempt at a > sort of "bug bounty" for the system's design and implementation > -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.