Scan with iPhone to joinTestFlight beta
We launched ZERϴ believing users shouldn't pay to transact onchain. We were obsessed with moving onchain mainstream. We still are. But the world didn't need more blockchains - it needs a better way to access them. The fastest path runs through Zerion API that helps 1500+ teams ship onchain products faster. We're winding down ZERϴ to go all-in on our core products.
DO NOT use Telegram in sensitive applications. Telegram does not need to have its message encryption broken for users to be tracked at the network layer. Telegram sends MTProto over unencrypted TCP, exposing auth_key_id - a long-lived identifier tied to the client’s authorisation key. An ISP, hotel WiFi operator, mobile carrier, transit provider, or surveillance system on the network path can see that identifier if they can observe the traffic. It can remain stable across app restarts, IP changes, VPN use, network switches, and location changes. Secret Chats protect message content, but this leak is below that layer. That makes the attack passive. The risk is in retroactive correlation. Think a journalist using Telegram from different networks for months, then joining hotel or corporate WiFi under a real name. That one identity anchor could make old logs searchable for the same auth_key_id. The fix is simple - mandatory transport encryption for all MTProto connections, with no unencrypted fallback. Telegram chose not to do this. Source: @kaepora https://symbolic.software/pdf/gnmx-01.pd…