Q: How secure is Telegram?

Telegram is more secure than mass market messengers like WhatsApp and Line. We are based on the MTProto protocol (see description and advanced FAQ), built upon time-tested algorithms to make security compatible with high-speed delivery and reliability on weak connections. We are continuously working with the community to improve the security of our protocol and clients.


Q: What if I’m more paranoid than your regular user?

We’ve got you covered. Telegram’s special secret chats use end-to-end encryption, leave no trace on our servers, support self-destructing messages and don’t allow forwarding. On top of this, secret chats are not part of the Telegram cloud and can only be accessed on their devices of origin.




Q: So how do you encrypt data?

We support two layers of secure encryption. Server-client encryption is used in Cloud Chats (private and group chats), Secret Chats use an additional layer of client-client encryption. All data, regardless of type, is encrypted in the same way — be it text, media or files.

Our encryption is based on 256-bit symmetric AES encryption, 2048-bit RSA encryption, and Diffie–Hellman secure key exchange. You can find more info in the Advanced FAQ.

See also: Do you process data requests?

电报是开放的,任何人都可以检查我们的源代码,协议和API,了解一切工作原理并做出明智的决定。实际上,我们欢迎安全专家审核我们的系统,并希望通过[email protected]telegram.org获得反馈(更多有关此信息)



Q: Why should I trust you?

Telegram is open, anyone can check our source codeprotocol and API, see how everything works and make an informed decision. In fact, we welcome security experts to audit our system and will appreciate any feedback at [email protected] (more about this)

On top of that, Telegram’s primary focus is not to bring a profit, so commercial interests will never interfere with our mission.

See also: articles about Telegram


Q: Do I need to trust Telegram for this to be secure?

When it comes to secret chats, you don‘t — just make sure that the visualized key of your secret chat matches the one in your friend’s secret chat settings. More about this below.

欢迎声称自己可以解密电报消息的任何人在我们的比赛中证明这一要求并赢得$ 300,000。您可以查看《破解竞赛说明》以了解更多信息。

欢迎对任何有关电报的安全性发表评论,网址为[email protected]。所有导致代码或配置更改的提交都将有资格获得悬赏,金额从100美元到100,000美元不等,具体取决于问题的严重性。请注意,对于已解决的公开问题,我们无法提供任何奖励。

Q: What if my hacker friend says they could decipher Telegram messages?

Anyone who claims that Telegram messages can be deciphered is welcome to prove that claim in our competition and win $300,000. You can check out the Cracking Contest Description to learn more.

Any comments on Telegram’s security are welcome at [email protected]. All submissions which result in a change of code or configuration are eligible for bounties, ranging from $100 to $100,000 or more, depending on the severity of the issue. Please note that we can not offer bounties for issues that are disclosed to the public before they are fixed.




Q: Can Telegram protect me against everything?

Telegram can help when it comes to data transfer and secure communication. This means that all data (including media and files) that you send and receive via Telegram cannot be deciphered when intercepted by your internet service provider, owners of Wi-Fi routers you connect to, or other third parties.

But please remember that we cannot protect you from your own mother if she takes your unlocked phone without a passcode. Or from your IT-department if they access your computer at work. Or from any other people that get physical or root access to your phones or computers running Telegram.

If you have reasons to worry about your personal security, we strongly recommend using only Secret Chats in official or at least verifiable open-source apps for sensitive information, preferably with a self-destruct timer. We also recommend enabling 2-Step Verification and setting up a strong passcode to lock your app, you will find both options in Settings — Privacy and Security.


您可以在“设置” –“隐私和安全性–两步验证”中执行此操作。启用后,您将既需要SMS代码也需要密码才能登录。您还可以设置辅助邮箱地址,以便在忘记密码时可以重新获得访问权限。如果这样做,请记住,重要的是,还应使用强密码和两步验证来保护恢复电子邮件帐户。


Q: How does 2-Step Verification work?

Logging in with an SMS code is an industry standard in messaging, but if you’re looking for more security or have reasons to doubt your mobile carrier or government, we recommend protecting your cloud chats with an additional password.

You can do this in Settings – Privacy and Security – 2-Step Verification. Once enabled, you will need both an SMS code and a password to log in. You can also set up a recovery email address that will help regain access, should you forget your password. If you do so, please remember that it’s important that the recovery email account is also protected with a strong password and 2-Step Verification when possible.

Check this out for tips on creating a strong password that is easy to remember.



Q: Why can jailbroken and rooted devices be dangerous?

Using a rooted or jailbroken device makes it easier for a potential attacker to gain full administrative control over your device — root access.

A user with root access can easily bypass security features built into the operating system, read process memory or access restricted areas, such as the internal storage. Once an attacker has root access, any efforts to mitigate threats become futile. No application can be called safe under these circumstances, no matter how strong the encryption.

群组/频道内容并非本站观点:Telegram群组资源大全 » telegram电报安全性相关问题解答

赞 (1) 打赏

说两句吧 0

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址