SlideShare a Scribd company logo
TELEGRAM
MESSENGER
BRIEF HISTORY
o Telegram LLC. was founded by
Pavel Durov- the founder of VK
Groups.
o Telegram was launched in Dec.
25th, 2013.
o Telegram is registered with both
British “LLP” & American “LLC”.
o Main Server with database is
located in Berlin, Germany.
Compatible with:
APP
o Telegram is the fastest
and most optimized
messenger.
o Public Chats up to 5,000
people
o No Ads and Spam
Mac/PC App Tablet App
APP
o Cloud-Based Messages
o Bots
o Channels
And one more thing…
SECURITY
Secret Chats:
o End-to-End encryption.
o Auto-delete option.
o Passcode or Fingerprint security.
Encryption:
o MTProto connection.
o Cloud-servers are mostly in Berlin, Germany
o Encryption is going through Telegram LLC.
Servers in Philippines and Thailand.
DEMO
COST
For private users: For corporate users:
RISKS
o Loss of data if back up is
off.
o Loss of data when Secret
Chats are deleted
automatically.
RECOMMENDATIONS
o Fast App.
o Cross- platform.
o Secured.
o Cloud storage.
o Documents share option.
THANK YOU!
BY: PROJECT DUO

More Related Content

Similar to TELEGRAM LLC.

Anonymous security handbook
Anonymous security handbookAnonymous security handbook
Anonymous security handbook
i4box Anon
 
Telegram
TelegramTelegram
Telegram
sanoofarmuhseen
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
pgmaynard
 
Decentralized Applications development FOR YOUR BUSINESS.pdf
Decentralized Applications development FOR YOUR BUSINESS.pdfDecentralized Applications development FOR YOUR BUSINESS.pdf
Decentralized Applications development FOR YOUR BUSINESS.pdf
Julie dsouza
 
Tails os
Tails osTails os
Tails os
SADEED AMEEN
 
digiCRYPT_ENG
digiCRYPT_ENGdigiCRYPT_ENG
digiCRYPT_ENG
Akihiro Ota
 
The 5 most dangerous proxies
The 5 most dangerous proxiesThe 5 most dangerous proxies
The 5 most dangerous proxies
seldridgeD9
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
Gregory Hanis
 
PrivateWave - sales presentation_en
PrivateWave - sales presentation_enPrivateWave - sales presentation_en
PrivateWave - sales presentation_en
Marco Pissarello
 
Telegram app
Telegram appTelegram app
Telegram app
anandshukla99
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
P-e-t-a-r
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
Jaskaran Narula
 
Puzzle Lock
Puzzle LockPuzzle Lock
Puzzle Lock
Senad Aruc
 
A Brief History Of Telegram From Its Release Date To Its Massive Userbase Today
A Brief History Of Telegram From Its Release Date To Its Massive Userbase TodayA Brief History Of Telegram From Its Release Date To Its Massive Userbase Today
A Brief History Of Telegram From Its Release Date To Its Massive Userbase Today
Tvisha technologies
 
Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?
Biznes to Rozmowy
 
CybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leakCybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leak
Thomas Garnier
 
Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
TechSoup
 
Cryptography
CryptographyCryptography
Cryptography
Vedant Singh
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
Charles Klondike
 

Similar to TELEGRAM LLC. (20)

Anonymous security handbook
Anonymous security handbookAnonymous security handbook
Anonymous security handbook
 
Telegram
TelegramTelegram
Telegram
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Decentralized Applications development FOR YOUR BUSINESS.pdf
Decentralized Applications development FOR YOUR BUSINESS.pdfDecentralized Applications development FOR YOUR BUSINESS.pdf
Decentralized Applications development FOR YOUR BUSINESS.pdf
 
Tails os
Tails osTails os
Tails os
 
digiCRYPT_ENG
digiCRYPT_ENGdigiCRYPT_ENG
digiCRYPT_ENG
 
The 5 most dangerous proxies
The 5 most dangerous proxiesThe 5 most dangerous proxies
The 5 most dangerous proxies
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
 
PrivateWave - sales presentation_en
PrivateWave - sales presentation_enPrivateWave - sales presentation_en
PrivateWave - sales presentation_en
 
Telegram app
Telegram appTelegram app
Telegram app
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Puzzle Lock
Puzzle LockPuzzle Lock
Puzzle Lock
 
A Brief History Of Telegram From Its Release Date To Its Massive Userbase Today
A Brief History Of Telegram From Its Release Date To Its Massive Userbase TodayA Brief History Of Telegram From Its Release Date To Its Massive Userbase Today
A Brief History Of Telegram From Its Release Date To Its Massive Userbase Today
 
Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?
 
CybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leakCybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leak
 
Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
 
Cryptography
CryptographyCryptography
Cryptography
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 

TELEGRAM LLC.