Mindanao State University at Naawan
College of Marine and Allied Sciences
Department of Information Technology
Name: Villareal, Grant Gil A Date: October 19, 2024
Subject Code: ITE185 Section: IT4B
Telegram Information Management and Security
A. Company Description
Telegram is a cloud-based messaging app and was founded by Pavel and Nikolai Durov
in 2013. It offers for both individual or group communication and interactions. Telegram allows
users to send text, media, files and also voice and video calls. It also offers unique features
such as having up to 200,000 members in group chat, bots for automation, and channels for
broadcasting. The service can also be accessed via smartphones, personal computers,
and web browsers, with users’ conversations syncing between devices. Telegram operates
under multiple legal frameworks, including data protection regulations like General Data
Protection Regulation (GDPR), though it has a less formal registration process, requiring only a
phone number for user accounts.
B. Information Management
Telegram manages its data primarily online, relying heavily on cloud-based storage.
They claim to use distributed infrastructure with data centers in various countries to ensure
availability. Telegram's backend uses relational databases to manage users, chats, and
channels. For media storage, a custom Content Delivery Network (CDN) is used to speed up
access to files. Telegram uses end-to-end encryption, meaning the company can access the
data. In addition, ensures offline backup, allowing users to export their chats and data.
C. Intrusion Issues and Resolutions
Telegram has experienced security related challenges, particularly with state-sponsored
hacking attempts during periods of political in June 2019, Telegram was hit by a large-scale
DDoS attack, which the company linked to Chinese state actors during the Hong Kong protests.
The attack causes service outages for users; however, they remain secure even after
disruptions. They resolved these issues by using military-grade encryption and two-factor
authentication to enhance and improve their encryption protocols. They also resist government
pressure to provide access to user data and prioritize user privacy. (Ilascu, 2019)
D. Client Protection and Privacy Policies
The telegram privacy policy emphasizes the protection of personal data. They
implemented end-to-end encryption for secret chats, and other messages were protected using
server-client encryption with their MTProto protocol. Telegram has a strict no-sharing policy and
has historically refused to share user data with third parties unless it is legally necessary in
Mindanao State University at Naawan
College of Marine and Allied Sciences
Department of Information Technology
response to court orders. While Telegram does have an advertising platform, it operates
differently from its competitors by not using personal data for targeting. Ads appear only in large
public channels and are based on channel topics rather than user behavior or data. This
approach maintains user privacy while supporting platform operations.
E. Effectiveness of Solutions
Telegram assures users of their security measures, including encryption for secret chats
and distributed data centers that store user data across different controls. This improvement
makes it difficult for governments to access user information without multiple court orders. They
also conduct a security audit and offer a bug bounty program that has been active since 2014,
allowing ethical hackers to report vulnerabilities in exchange for rewards ranging from $100 to
over $100,000, depending on the severity of the issue. (Telegram Bug Bounty Program, n.d.)
F. Personal Take on Improved Security
By implementing default end-to-end encryption for all chats, not just secret chats, to
secure all communications widely, it could enhance its platform. In addition, there is increased
transparency in server-side operations about how data is stored and processed. Offering clearer
information and regular transparency reports can build user trust. Group management tools can
handle large groups, and moderators require more advanced features, such as automatic
content filtering and improved spam detection, to manage communities more effectively. They
must also improve their verification process so that users can easily identify real channels,
reducing the risk of impersonation and fraud. Lastly, Improved backup options, such as
automated and encrypted backups, would make it easier for users to safely store their
messages in cross-platform synchronization.
REFERENCES
Larson, G. W. (2024, October 1). instant messaging. Encyclopedia Britannica.
https://www.britannica.com/topic/instant-messaging
Ilascu, I. (2019, June 13). DDoS attack on Telegram Messenger leaves users hanging.
BleepingComputer. https://www.bleepingcomputer.com/news/security/ddos-attack-on-telegram-
messenger-leaves-users-hanging/
Telegram Bug Bounty program. (n.d.). https://core.telegram.org/bug-bounty
$300,000 for cracking Telegram encryption. (n.d.). Telegram.
https://telegram.org/blog/cryptocontest