Review attack surface on Telegram example

It’s been a while since I wrote something here… Let’s dig an iceberg of “security in general” again. This is a very brief review that is using Telegram mobile application, which connects through the mobile network to a remote server, just as an example. The attack surface may be different for you, but it can still contain the same basic elements (not always). Application layer (Telegram app) Libraries OS + backups Device + GSM stack Network layers API service + some backend Third-party services 1.
Read more →

SUID vs Capabilities

Read more →

[outdated] Information security in generic

Read more →