There's not a single actual practical vulnerability in the second paper. http://telegra.ph/mtproto-security-01-17
And the first one is outdated.
There's not a single actual practical vulnerability in the second paper. http://telegra.ph/mtproto-security-01-17
And the first one is outdated.