SpywareWatchdog/articles/telegram.html

59 lines
3.7 KiB
HTML

<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style2.css">
<meta charset="UTF-8">
<title>Telegram - Spyware Watchdog</title>
</head>
<body>
<img src="../images/telegram_logo.png" alt="Telegram Logo">
<h1>Telegram</h1>
<p>
Telegram is an instant messaging program that allows you to send text, images, videos and also any other files to other Telegram users.
</p>
<h2>Spyware Level: <font color="yellow">Medium</font></h2>
<p>
Telegram has some spyware features in it such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information<sup><a href="#1">[1]</a></sup>.
</p>
<h3>Telephone Number Required</h3>
<p>
Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.
</p>
<h3>Centralized communication routing</h3>
<p>
Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy<sup><a href="#1">[1]</a></sup> that it does not collect any information, but it is impossible to prove this.
</p>
<p>
Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because
of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.
</p>
<h3>Telegram does not follow its GPLv2 Obligations</h3>
<p>
Telegram clients are advertised as free software, but in practice the source code is not immediately accessible<sup><a href="#2">[2]</a></sup>, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since its not provable whether or not the binaries that are distributed have unknown spyware or not.
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://telegram.org/privacy">Telegram Privacy Policy</a>
<a href="https://web.archive.org/web/20180528161128/https://telegram.org/privacy">[web.archive.org]</a>
<a href="https://archive.is/Rn64n">[archive.is]</a><br>
<a name="2">2.</a>
<a href="https://github.com/overtake/TelegramSwift/issues/163">Where are the sources of the latest releases?</a>
<a href="https://archive.li/2018.05.29-092521/https://github.com/overtake/TelegramSwift/issues/163">[archive.li]</a><br>
</p>
<hr>
<p><b>
This article was last edited on 2/18/2019
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>