Hacker News new | past | comments | ask | show | jobs | submit login

Unless backed with solid evidence intent and use, assuming incompetence rather than malice is sufficient explanation of errors in security protocols' design and implementation. This stuff is hard and any shortcuts you take are quickly proven to be the weak points, any weak points become back doors.



> any shortcuts you take

This wasn't a shortcut, they added extra complexity to to the protocol.


It was a shortcut to protect weaker clients

"nonce was there to protect clients with weak random number generators. "


Exactly. Adding a nonce like that was exactly what I did in a CS100 level course when I was over complicating a blackjack exercise that was intended to teach us about stack data structures. I'm really grateful to my prof who took the time to point out the issues with my RNG code instead of being annoyed that I'd turned in ~3x the average LOC.

This is such a basic cryptographic fail that one has to assume either the telegram team is incompetent or they were introducing a backdoor. Given that the excuse is so weak, one tends to assume the latter. I get rolling one's one crypto is hard, but this is a such an easily caught fundamental error that those are the options, and neither is good.


That's the justification they cooked up. But that doesn't mean that was the motivation.


I meant mental shortcuts like thinking that "if we make the protocol more complex it will be more secure".




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: