As an epilogue, the Telegram client misused a non-secure random number
generator mrand48 for the keys used in their contest. A student, Thijs
Alkemade, was able to recover their keys and decrypt the contest
message transcripts:
https://blog.thijsalkema.de/blog/2014/04/02/breaking-half-of-the-telegram-contest/

On Thu, Mar 20, 2014 at 9:41 AM, Tony Arcieri <basc...@gmail.com> wrote:
>
> Moxie's point was that a cryptosystem can be obviously broken in multiple 
> different ways and its creator might still not lose such a contest (though 
> Telegram did).
>
> The Telegram "contest" was much more a PR stunt then a serious attempt at a 
> sort of "bug bounty" for the system's design and implementation
>
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to