Telegram learned to disguise as HTTPS

Telegram learned to disguise as HTTPS

A special “strip” was added between the Telegram client and the proxy server - an encapsulation layer overlaid on top of TCP. Moreover, the data is now sent not over TCP, but is wrapped in TLS records, that is, artificially masked as HTTPS traffic.

In the traditional scheme, the provider will see the following chain: subscriber's IP address → server IP address → connection domain. Pretending to be HTTPS and avoiding the use of non-standard protocols that cause increased attention from the means of blocking, Telegram literally "goes unnoticed."

In other words, the provider believes that the person requested a resource directly from the domain and is outside the field of suspicion, and the connection scheme is simplified to the IP address of the user and domain, and the registration of the latter will also disappear soon with the introduction of eSNI - an encrypted header .

The new mode is already available in the beta version of Telegram Desktop, the official client for iOS and in the stable version of the messenger for Android.

  • White Facebook Icon
  • Белый Vkontakte Иконка
  • Белый Instagram Иконка
  • Белый RSS Icon
  • image