{"id":29016,"date":"2019-09-11T12:14:55","date_gmt":"2019-09-11T12:14:55","guid":{"rendered":"http:\/\/31c283a5-9e8d-490e-9086-8e18baee17ce"},"modified":"2019-09-11T12:14:55","modified_gmt":"2019-09-11T12:14:55","slug":"telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/","title":{"rendered":"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2019\/09\/11\/eb1da467-5380-499a-bef0-cf21e815359e\/thumbnail\/770x578\/9a0c8397192e6dcb44fa85a19efb91d4\/screenshot-2019-09-11-at-12-19-33.png\" class=\"ff-og-image-inserted\"><\/div>\n<section class=\"shortcode media-source\">\n<p><iframe loading=\"lazy\" width=\"500\" height=\"282\" allowfullscreen title=\"YouTube content\" id=\"iframe_youtube\" src=\"https:\/\/www.youtube.com\/embed\/_S64ApkqH1Y\">[embedded content]<\/iframe><\/p>\n<\/section>\n<p>Telegram has resolved a privacy issue that degraded the pillars of security the firm&#8217;s messaging application is built upon &#8212; the ability to remove content remotely from recipient devices.&nbsp;<\/p>\n<p>Bug bounty hunter Dhiraj Mishra <a href=\"https:\/\/www.inputzero.io\/2019\/09\/telegram-privacy-fails-again.html?\/telegram-privacy-fails.html\" target=\"_blank\" rel=\"noopener noreferrer\">discovered a security failure<\/a> in the message deletion feature, which is intended to allow users to delete messages from recipient devices in cases after being sent but in cases when users wish to recall their messages and any associated content.<\/p>\n<p>While the text content of a message would be removed if a user selected the &#8216;Also Delete&#8217; function in Telegram, any images sent would stay in a handset&#8217;s internal storage along the &#8216;\/Telegram\/Telegram Images\/&#8217; path.<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/critical-vulnerabilities-impact-over-a-million-iot-radio-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\">Telnet backdoor vulnerabilities impact over a million IoT radio devices<\/a><\/p>\n<p>In other words, images would be deleted from chat windows but they would still be accessible if the recipient navigated to the Telegram Images folder.&nbsp;<\/p>\n<p>&#8220;Assume a scenario where Bob sends a message which is a confidential image and was mistakenly sent to Alice, Bob proceeds to utilize a feature of Telegram known as &#8220;Also delete for Alice&#8221; which would essentially delete the message for Alice,&#8221; the bug bounty hunter explained. &#8220;Apparently, this feature does not work as intended, as Alice would still be able to see the image stored under `\/Telegram\/Telegram Images\/` folder, concluding that the feature only deletes the image from the chat window.&#8221;<\/p>\n<p>A similar messaging service, Facebook-owned WhatsApp, asks for the same read\/write\/modify storage permissions as Telegram on install and contains a similar feature called &#8216;Delete for Everyone&#8217; which allows users to remove content including messages and images. However, in this app&#8217;s case, media is also removed from storage at the same time.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/news\/mozilla-tests-firefox-vpn-service-to-help-protect-your-privacy\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\">Mozilla tests Firefox VPN service to help protect your privacy<\/a><\/p>\n<p>In one-on-one chats, Telegram&#8217;s privacy failure might not be the end of the world, but in &#8216;supergroup&#8217; chat sessions that can contain thousands of active members, the implications may be more serious &#8212; especially if a user sends a sensitive image or two by accident.&nbsp;<\/p>\n<p>&#8220;Assume a case wherein you&#8217;re a part of a group with 2,000,00 members and you accidentally share a media file not meant to be shared in that particular group and proceed to delete by checking &#8220;delete for all members&#8221; present in the group,&#8221; Mishra notes. &#8220;You&#8217;re relying on a functionality that is broken since your file would still be present in storage for all users.&#8221;<\/p>\n<p>Mishra verified the validity of the bug in Telegram for Android version 5.10.0 (1684) and it is possible the problem also impacted Telegram for Windows and iOS, but tests were not performed.<\/p>\n<p>After submitting his findings to Telegram, the messaging service accepted the research and accompanying proof-of-concept (PoC). A fix has been included in the latest version of Telegram, version 5.11.&nbsp;<\/p>\n<p>Mishra was awarded \u20ac2,500 ($2,749) for the report.&nbsp;<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/google-hopes-to-protect-users-with-open-source-differential-privacy-library\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\">Google hopes to protect users with open source differential privacy library<\/a><\/p>\n<p>In August, Check Point researchers <a href=\"https:\/\/www.zdnet.com\/article\/whatsapp-vulnerabilities-puts-words-in-your-mouth-lets-hackers-tamper-with-text\/\" target=\"_blank\" rel=\"noopener noreferrer\">disclosed vulnerabilities<\/a> in the WhatsApp messaging platform which could be exploited to &#8220;essentially put words in [a contact&#8217;s] mouth.&#8221;<\/p>\n<p>The bugs allowed attackers to intercept and manipulate messages through the service &#8212; which is protected via end-to-end encryption &#8212; as well as change the identity of senders, and to send messages which are marked as &#8216;private&#8217; but could be viewed publicly in a group chat.&nbsp;<\/p>\n<p>Facebook said that one of the vulnerabilities has been fixed, but the other two were problematic due to structural and architectural limitations.&nbsp;<\/p>\n<h3>Previous and related coverage<\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/telegram-fixes-privacy-breaking-bug-that-prevented-full-recipient-message-deletion\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even after deletion, images would remain in storage on user devices.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29017,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-29016","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Telegram fixes privacy-breaking bug that stopped recipient message and image deletion 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-11T12:14:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion\",\"datePublished\":\"2019-09-11T12:14:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/\"},\"wordCount\":624,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/\",\"name\":\"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png\",\"datePublished\":\"2019-09-11T12:14:55+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/","og_locale":"en_US","og_type":"article","og_title":"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-09-11T12:14:55+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion","datePublished":"2019-09-11T12:14:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/"},"wordCount":624,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/","url":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/","name":"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png","datePublished":"2019-09-11T12:14:55+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/telegram-fixes-privacy-breaking-bug-that-stopped-recipient-message-and-image-deletion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Telegram fixes privacy-breaking bug that stopped recipient message and image deletion"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29016"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29016\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29017"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}