Anyone who reads the article may be surprised to find that it contains literally no evidence to support the claim made in its clickbait headline. The author of the article comes to pretty different, much more limited conclusion:
Based on the analysis of packet captures above, I believe it is clear that anyone who has sufficient visibility into Telegram’s traffic would be able to identify and track traffic of specific user devices. Including when perfect forward secrecy protocol feature is in use.
This would also allow, through some additional analysis based on timing and packet sizes, to potentially identify who is communicating with whom using Telegram.
This is way more different thing than claiming and proving that Telegram is somehow FSB honeypot.
Furthermore, the author of the article does not even attempt to somehow prove a Telegram/FSB connection and takes this claim for granted based on the article published on websites of OCCRP and its Russian affiliate Istories. Let's check this article and the evidence it presents:
Reporters obtained the company’s internal accounting documents for 2024 which show that one of its most important government clients is the FSB.
The documents show that Electrotelecom installs and manages equipment for a system that is being used by the FSB offices in St. Petersburg and the Leningrad region for surveillance.
Unlike the conclusions made in the rys.io article, which have a vast evidence base and can be verified, in this case we are simply asked to take the word of the so-called "investigative journalism outlet".
And what do we know about OCCRP?
In 2024, it was reported that OCCRP receives nearly half its funding from USAID
https://en.wikipedia.org/wiki/Organized_Crime_and_Corruption_Reporting_Project
I think that's enough.
TLDR:
-
Telegram uses a suboptimal method of handling user IDs in its packets, which allows to track which user ID is sending messages to which user ID.
-
The Telegram/FSB link claim is based solely on unverifiable statements made by shills on USAID payroll.