**Telegram** in its response to reports about security vulnerability on its desktop client confirmed that the flaw has been fixed and comes along in its latest Telegram for Desktop v1.4.0 update. The vulnerability was first founded by a Mumbai-based researcher Dhiraj Mishra. The vulnerability was consistent in Windows, Mac, and Linux. [caption id=“attachment_5314701” align=“alignnone” width=“1024”]  Telegram.[/caption] According to Mishra, during voice calls, the IP addresses of the user would appear. Additionally, the IP address of people was also noticed for long hours in Telegram’s server logs and they were not encrypted. Revealing a user’s IP address not only puts a user’s internet activity at risk, but it can reveal a lot about a user’s browsing history, choices, and preferences about their private lives. Since the IP address was visible only while making voice calls through a peer-to-peer connection for which a user’s IP address is needed. According to Telegram, in its mobile app, it had given users the option to switch off the peer-to-peer call function and create voice calls via the Telegram server, but the same option was not available on its desktop app. Telegram in its response said, “Telegram Desktop, which is used in less than 0.01 percent of **Telegram** calls, was the only platform where this setting was missing. Thanks to a researcher who pointed that out, we made the Telegram Desktop experience consistent with the rest of our apps.” Telegram app is known to be one of the safest modes of communication, at a time when already there is so much threat to user data privacy, however, such as flaw creates an iota of doubt whether our private user data is indeed safe.
Telegram confirms that the flaw has been fixed in its latest Telegram for Desktop v1.4.0 update.
Advertisement
End of Article