Review attack surface on Telegram example
It’s been a while since I wrote something here… Let’s dig an iceberg of “security in general” again.
This is a very brief review that is using Telegram mobile application, which connects through the mobile network to a remote server, just as an example. The attack surface may be different for you, but it can still contain the same basic elements (not always).
Application layer (Telegram app) Libraries OS + backups Device + GSM stack Network layers API service + some backend Third-party services 1.
[archive] unconquered
I will just keep it here for no reason:
Out of the night that covers me, Black as the pit from pole to pole, I thank whatever Gods may be For my unconquerable soul. In the fell clutch of circumstance I have not winced nor cried aloud. Under the bludgeonings of chance My head is bloody, but unbowed. Beyond this place of wrath and tears Looms but the horror of the shade, And yet the menace of the years Finds and shall find me unafraid.