<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Dark Master</title>
    <description>The latest articles on DEV Community by Dark Master (@darkmaster0345).</description>
    <link>https://dev.to/darkmaster0345</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3882200%2F17cfc069-222c-4bb0-941b-6ed202e24a91.jpeg</url>
      <title>DEV Community: Dark Master</title>
      <link>https://dev.to/darkmaster0345</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/darkmaster0345"/>
    <language>en</language>
    <item>
      <title>Is Telegram Really Anonymous? Let’s Be Honest.</title>
      <dc:creator>Dark Master</dc:creator>
      <pubDate>Tue, 28 Apr 2026 12:51:16 +0000</pubDate>
      <link>https://dev.to/darkmaster0345/is-telegram-really-anonymous-lets-be-honest-44jb</link>
      <guid>https://dev.to/darkmaster0345/is-telegram-really-anonymous-lets-be-honest-44jb</guid>
      <description>&lt;p&gt;There’s this idea floating around — in tech circles, activist groups, even among regular people who just “heard it somewhere” — that Telegram is the anonymous, private messaging app. The one that governments can’t touch, hackers can’t crack, and cops can’t trace.&lt;/p&gt;

&lt;p&gt;I want to gently push back on that. Not because Telegram is bad. It’s not. But because anonymous is a very specific word, and Telegram earns it only in very specific situations.&lt;/p&gt;

&lt;p&gt;First, what does “anonymous” even mean?&lt;br&gt;
There’s a difference between private and anonymous. Private means your content is hidden. Anonymous means your identity is unknown. You can have one without the other. Telegram promises a version of privacy. It mostly does not promise anonymity — and that matters.&lt;/p&gt;

&lt;p&gt;The phone number problem&lt;br&gt;
To use Telegram, you need a phone number. That’s it — that’s the conversation starter right there. Your phone number is your identity. It’s linked to a SIM card, which is linked to your name in most countries (especially in Pakistan, where NADRA ties every SIM to your CNIC).&lt;/p&gt;

&lt;p&gt;Yes, you can hide your number from other users. But Telegram still knows it. And if someone subpoenas them, or a government agency sends a valid legal request to the country Telegram operates from at that moment — they have your number. And with your number, they have you.&lt;/p&gt;

&lt;p&gt;The registration phone number is never truly hidden. It’s a persistent link between your real identity and your account — regardless of what name or photo you use.&lt;/p&gt;

&lt;p&gt;What about “Secret Chats”?&lt;br&gt;
Here’s where Telegram actually does something right. Secret Chats use end-to-end encryption (E2EE) via the MTProto 2.0 protocol. That means only you and the recipient can read those messages. Not Telegram, not their servers, not anyone intercepting traffic.&lt;/p&gt;

&lt;p&gt;But here’s the catch most people miss: regular chats are NOT end-to-end encrypted. Your normal conversations — the ones in groups, channels, and standard DMs — are encrypted in transit and at rest, but Telegram holds the keys. That means they can technically read them. Or hand them over.&lt;/p&gt;

&lt;p&gt;Secret chats&lt;/p&gt;

&lt;p&gt;End-to-end encrypted&lt;br&gt;
No cloud backup&lt;br&gt;
Self-destruct timers&lt;br&gt;
Device-to-device only&lt;br&gt;
Regular chats&lt;/p&gt;

&lt;p&gt;Cloud-stored by Telegram&lt;br&gt;
Telegram holds the keys&lt;br&gt;
Can be legally requested&lt;br&gt;
No E2EE by default&lt;br&gt;
Most people never touch Secret Chats. They use the default chat mode, sync across devices, and enjoy the convenience. That’s fine — but they shouldn’t call it anonymous.&lt;/p&gt;

&lt;p&gt;The metadata issue&lt;br&gt;
Even if your messages were perfectly encrypted, metadata is a whole other beast. Who you talk to, when, how often, from what IP address — this is metadata. Telegram collects some of it. And in intelligence and law enforcement, metadata is often more useful than content. It builds a map of your relationships, habits, and patterns.&lt;/p&gt;

&lt;p&gt;Has Telegram actually handed over data?&lt;br&gt;
Yes. After years of claiming they’d never comply, Telegram updated their privacy policy in late 2024 and acknowledged they can — and do — share user data with law enforcement under valid legal requests. This followed the arrest of Telegram’s CEO Pavel Durov in France in August 2024, which put significant pressure on the platform’s policies.&lt;/p&gt;

&lt;p&gt;This isn’t a gotcha. It’s just reality. No company operating at Telegram’s scale can exist in a legal vacuum forever.&lt;/p&gt;

&lt;p&gt;Real-world case&lt;/p&gt;

&lt;p&gt;In 2024, following Durov’s arrest, Telegram disclosed that it had provided IP addresses and phone numbers of users to authorities in response to court orders — something they had previously implied would never happen.&lt;/p&gt;

&lt;p&gt;So when IS Telegram relatively safe?&lt;br&gt;
To be fair — and fairness matters here — Telegram is genuinely useful for certain threat models:&lt;/p&gt;

&lt;p&gt;If you’re worried about a random hacker intercepting your traffic on public Wi-Fi, Telegram handles that fine. If you’re avoiding casual corporate surveillance or don’t want your messages sitting in a Google or Meta server, Telegram is better than WhatsApp for that. If you’re using Secret Chats for sensitive one-on-one conversations, the E2EE is solid.&lt;/p&gt;

&lt;p&gt;Where it fails as an anonymity tool is against nation-state actors, legal subpoenas, or any adversary who can obtain your phone number and trace it back to you.&lt;/p&gt;

&lt;p&gt;What should you use instead?&lt;br&gt;
If actual anonymity is your goal — not just privacy, but real you-can’t-find-me anonymity — the honest answer involves tools like Signal (E2EE by default, minimal metadata, open source), Session (no phone number required, decentralized), or for the highest-risk situations, Briar or Cwtch over Tor.&lt;/p&gt;

&lt;p&gt;Telegram is not in that category. It’s a feature-rich, fast, convenient messaging app with optional strong encryption. That’s a genuinely useful thing. Just don’t confuse convenience with anonymity.&lt;/p&gt;

&lt;p&gt;Final verdict&lt;br&gt;
Telegram is private-ish, not anonymous. It has good security features if you deliberately use them. It’s built by people who care about privacy more than, say, Meta does. But it’s not a shield against a determined, legally-equipped adversary.&lt;/p&gt;

&lt;p&gt;The next time someone tells you “just use Telegram, they can’t track you” — you’ll know what to say.&lt;/p&gt;

&lt;p&gt;Written from the perspective of someone who runs a Tor bridge, tests apps for F-Droid, and has spent way too many late nights reading privacy architecture docs. Take it with appropriate context.&lt;/p&gt;

</description>
      <category>anonymous</category>
      <category>opensource</category>
      <category>cybersecurity</category>
      <category>privacy</category>
    </item>
    <item>
      <title>I Built a File Encryption App in Rust. Here’s What I Learned About Trust.</title>
      <dc:creator>Dark Master</dc:creator>
      <pubDate>Thu, 16 Apr 2026 10:17:55 +0000</pubDate>
      <link>https://dev.to/darkmaster0345/i-built-a-file-encryption-app-in-rust-heres-what-i-learned-about-trust-3coo</link>
      <guid>https://dev.to/darkmaster0345/i-built-a-file-encryption-app-in-rust-heres-what-i-learned-about-trust-3coo</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcshaut5r6tadisjqrqvc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcshaut5r6tadisjqrqvc.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I’m 17. I live in Karachi. I have 8GB of RAM and a laptop that throttles if you look at it wrong.&lt;/p&gt;

&lt;p&gt;And I just shipped a desktop encryption app in Rust.&lt;/p&gt;

&lt;p&gt;Not because someone asked me to. Because I needed it to exist.&lt;/p&gt;

&lt;p&gt;Why Rust&lt;/p&gt;

&lt;p&gt;I could’ve done this in Python in a weekend. But Python wouldn’t give me what I actually wanted — control. When you’re encrypting someone’s files, you don’t want a garbage collector making decisions behind your back. You don’t want mystery allocations. You want to know exactly what’s in memory and when it leaves.&lt;/p&gt;

&lt;p&gt;Rust forces that conversation. The borrow checker is annoying until it saves you from a mistake you didn’t know you were making.&lt;/p&gt;

&lt;p&gt;It took longer. It was worth it.&lt;/p&gt;

&lt;p&gt;The Stack&lt;/p&gt;

&lt;p&gt;AES-256-GCM-SIV for encryption. Argon2id for key derivation. HKDF-SHA512 to stretch the key material. egui for the UI because I didn’t want to ship an Electron app that weighs 200MB to encrypt a text file.&lt;/p&gt;

&lt;p&gt;Each of these choices was deliberate. GCM-SIV over plain GCM because nonce reuse is a real-world failure mode, not a theoretical one. Argon2id because it’s memory-hard and scrypt has a worse story on GPUs. HKDF because you should never use a password directly as a key.&lt;/p&gt;

&lt;p&gt;Security isn’t one big decision. It’s a hundred small ones.&lt;/p&gt;

&lt;p&gt;18 Bugs&lt;/p&gt;

&lt;p&gt;The first version had 18 bugs. I’m not hiding that. UTF-8 panics on non-ASCII filenames. The NSIS installer writing to the wrong path. A title bar gap being counted twice in the layout.&lt;/p&gt;

&lt;p&gt;Become a Medium member&lt;br&gt;
Most of them were embarrassing in hindsight. None of them were unfixable.&lt;/p&gt;

&lt;p&gt;I used AI tooling heavily — Roo Code, Jules — to move through them faster. The AI didn’t replace the thinking. It replaced the typing. I still had to understand every change before it merged.&lt;/p&gt;

&lt;p&gt;That distinction matters.&lt;/p&gt;

&lt;p&gt;Why This Project, Really&lt;/p&gt;

&lt;p&gt;Here’s the honest answer.&lt;/p&gt;

&lt;p&gt;I live in a part of the world where privacy is not a default. Where your data going somewhere you didn’t intend is normal. Where you can’t always trust the platform, the app store, or the company behind the software you’re using.&lt;/p&gt;

&lt;p&gt;I’m also Muslim. There’s a word in Arabic — amanah — it means a trust. Something given to you that you are responsible for. I think about that a lot when I think about other people’s files, other people’s messages, other people’s data.&lt;/p&gt;

&lt;p&gt;If you handle someone’s information, that’s an amanah. Most software treats it like a liability.&lt;/p&gt;

&lt;p&gt;I wanted to build something that treats it like what it actually is.&lt;/p&gt;

&lt;p&gt;What’s Next&lt;/p&gt;

&lt;p&gt;The app is called Neuron-Encrypt. It’s on GitHub. It’s GPL-v3 because I don’t want it locked behind anyone’s business model.&lt;/p&gt;

&lt;p&gt;Version 1 works. It encrypts. It installs. It doesn’t phone home.&lt;/p&gt;

&lt;p&gt;Version 2 will do more. But I’d rather ship something honest and small than something bloated and impressive-looking.&lt;/p&gt;

&lt;p&gt;If you’re a developer who cares about this stuff — not the buzzwords, the actual problem — I’d like to hear from you.&lt;/p&gt;

&lt;p&gt;Ubaid ur Rehman is a DAE Electronics student in Karachi building FOSS privacy tools. GitHub: darkmaster0345.&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>rust</category>
      <category>security</category>
      <category>showdev</category>
    </item>
  </channel>
</rss>
