Telegram Disables Features Used For Illegal Activity

Telegram founder Pavel Durov who is under criminal in investigation following his recent arrest in France has said that the messaging app would tackle criticism of its content moderation and remove some features that had been abused for illegal activity.  

Durov says the service has stopped new media uploads to its standalone blogging tool, Telegraph, because it was “misused by anonymous actors.” In particular, the changes to the app will affect its built-in blog posts and a “People Nearby” location-based feature.

Durov’s has said, “Telegram’s abrupt increase in user count to 950 million caused growing pains that made it easier for criminals to abuse our platform. That’s why I made it my personal goal to ensure we significantly improve things in this regard.” He also said that during the four-day interview after his arrest, “I was told I may be personally responsible for other people’s illegal use of Telegram, because the French authorities didn’t receive responses from Telegram.” 

Telegram has changed its guidelines surrounding private chats and moderation and followed up with these new updates. It is also enabling a read-only mode for its in-app browser.

“While 99.999% of Telegram users have nothing to do with crime, the 0.001% involved in illicit activities creates a bad image for the entire platform... That’s why this year we are committed to turn moderation on Telegram from an area of criticism into one of praise.” Durov says in a  statement.

Telegraph, which was launched in 2016, allows anyone to  anonymously create a post, upload media, and then share the webpage on social media or Telegram. But, security researchers report allows criminals use the tool for phishing scams by creating phony website landing pages or notices that trick users into disclosing personal information. 

Telegram will replace the 'People Nearby' feature with “Businesses Nearby” instead, allowing “legitimate, verified businesses” to display products and accept payments. “That’s why this year we are committed to turn moderation on Telegram from an area of criticism into one of praise.” according to Durov 

The changes Telegram are making will be closely watched by law enforcement, privacy advocate as well as the other big social media platforms.

Telegram has positioned itself as a privacy-first platform, attracting widespread criticism from governments that claim the app is too permissive of criminal activities and the changes announced by Durov suggest a more active moderation policy for content on the platform. This in markedt contrast to X / Twitter which, following its acquisition by Elon Musk, fired most of the platform moderators. 

It remains to be seen if the measures Durov is putting in place will have a restrictive effect on  abusive content on Telegram, even if they assist him in his defence against prosecution.

Durov’s legal troubles highlight the growing tension between technology companies and regulators as they grapple with the implications of encrypted communications and the balance between privacy and security.

Pavel Durov   |  The Verge   |   Guardian   |   Newsable   |    Gazette   |   France24  

Image: Ideogram

You Might Also Read: 

X Blocked In Brazil By Supreme Court Order:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« How AI Will Help Disrupt Elections Around The Globe
Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

AnchorFree

AnchorFree

AnchorFree is a Virtual Private Network services provider offering secure encrypted access to the internet.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

Capgemini

Capgemini

Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. Areas of expertise include Cybersecurity.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.