{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:45:07Z","timestamp":1730328307494,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["NWA.1162.18.301"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656121","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T23:25:07Z","timestamp":1716247507000},"page":"20-30","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8237-0539","authenticated-orcid":false,"given":"Maurantonio","family":"Caprolu","sequence":"first","affiliation":[{"name":"RC3 Center, CEMSE Division, King Abdullah University of Science and Technology (KAUST), Thuwal 23955 - 6900, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0974-3639","authenticated-orcid":false,"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"ORCID":"http:\/\/orcid.org\/0009-0006-3224-7851","authenticated-orcid":false,"given":"Aleksandar","family":"Grigorov","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"ORCID":"http:\/\/orcid.org\/0009-0000-9122-5691","authenticated-orcid":false,"given":"Velyan","family":"Kolev","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9637-0430","authenticated-orcid":false,"given":"Gabriele","family":"Oligeri","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"415","volume-title":"WhatsApp, and Threema,\"","author":"R\u00f6sler P.","year":"2018","unstructured":"P. R\u00f6sler, C. Mainka, and J. Schwenk, \"More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema,\" 2018, pp. 415--429."},{"key":"e_1_3_2_1_2_1","first-page":"294","volume-title":"Security and Trust (PST). IEEE","author":"Alkhulaiwi R.","year":"2016","unstructured":"R. Alkhulaiwi, A. Sabur, K. Aldughayem, and O. Almanna, \"Survey of secure anonymous peer to peer Instant Messaging protocols,\" in 2016 14th Annual Conf. on Privacy, Security and Trust (PST). IEEE, 2016, pp. 294--300."},{"key":"e_1_3_2_1_3_1","first-page":"2035","volume-title":"Analysis of Telegram, an instant messaging service,\" in Proc. of the 2017 ACM on Conf. on Information and Knowledge Management","author":"Nobari A. Dargahi","year":"2017","unstructured":"A. Dargahi Nobari, N. Reshadatmand, and M. Neshati, \"Analysis of Telegram, an instant messaging service,\" in Proc. of the 2017 ACM on Conf. on Information and Knowledge Management, 2017, pp. 2035--2038."},{"key":"e_1_3_2_1_4_1","volume-title":"com\/telegram-users","author":"People Use How Many","year":"2023","unstructured":"\"How Many People Use Telegram in 2023? 55 Telegram Stats,\" https:\/\/backlinko. com\/telegram-users, 2023, accessed: 07-Feb-2024."},{"key":"e_1_3_2_1_5_1","first-page":"87","volume-title":"Four Attacks and a Proof for Telegram,\" in 2022 IEEE Symp. on Security and Privacy","author":"Albrecht M.","year":"2022","unstructured":"M. Albrecht, L. Marekov\u00e1, K. Paterson, et al., \"Four Attacks and a Proof for Telegram,\" in 2022 IEEE Symp. on Security and Privacy, 2022, pp. 87--106."},{"key":"e_1_3_2_1_6_1","volume-title":"The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram,\" in Proc. of EuroUSEC","author":"Abu-Salma R.","year":"2017","unstructured":"R. Abu-Salma, K. Krol, S. Parkin, et al., \"The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram,\" in Proc. of EuroUSEC, 2017."},{"key":"e_1_3_2_1_7_1","unstructured":"\"$300 000 for Cracking Telegram Encryption \" https:\/\/web.archive.org\/web\/20190518221133\/https:\/\/telegram.org\/blog\/cryptocontest 2019 accessed: 07-Feb-2024."},{"key":"e_1_3_2_1_8_1","first-page":"97","volume-title":"Conf. on Web Services (ICWS)","author":"Morgia M. L.","year":"2023","unstructured":"M. L. Morgia, A. Mei, A. M. Mongardini, and J. Wu, \"It's a Trap! Detection and Analysis of Fake Channels on Telegram,\" in 2023 IEEE Int. Conf. on Web Services (ICWS), 2023, pp. 97--104."},{"key":"e_1_3_2_1_9_1","volume-title":"html","author":"Massive Fine For Telegram Receives","year":"2022","unstructured":"\"Telegram Receives Massive Fine For Failing To Report Illegal Content,\" https:\/\/www.digitalinformationworld.com\/2022\/10\/telegram-receives-massive-finefor. html, 2022, accessed: 07-Feb-2024."},{"key":"e_1_3_2_1_10_1","unstructured":"\"Telegram adds location-flavored extras and full group ownership transfers \" https:\/\/tinyurl.com\/3hv42cn4 2019 accessed: 07-Feb-2024."},{"volume-title":"The impact of social media geolocation on national security and law enforcement.\" Issues in Information Systems","author":"Hartle F. X.","key":"e_1_3_2_1_11_1","unstructured":"F. X. Hartle, M. Garfinkel, D. O'Neil, G. Scalise, N. Sauer, and C. Willard, \"The impact of social media geolocation on national security and law enforcement.\" Issues in Information Systems, vol. 23, no. 1, 2022."},{"key":"e_1_3_2_1_12_1","unstructured":"\"Telegram Nearby Map \" https:\/\/github.com\/tejado\/telegram-nearby-map 2023 accessed: 07-Feb-2024."},{"key":"e_1_3_2_1_13_1","unstructured":"\"Don't Use Telegram's New 'People Nearby' Feature \" https:\/\/lifehacker.com\/dont-use-telegrams-new-people-nearby-feature-1846017886 2023 accessed: 07-Feb-2024."},{"key":"e_1_3_2_1_14_1","unstructured":"\"Telegram's People Nearby feature reveals exact user locations through triangulation \" https:\/\/www.androidpolice.com\/2021\/01\/05\/telegrams-people-nearbyfeature- reveals-exact-user-locations-through-triangulation\/ 2021 accessed: 07-Feb-2024."},{"key":"e_1_3_2_1_15_1","volume-title":"viber and telegram: which is the best for instant messaging?","author":"Sutikno T.","year":"2016","unstructured":"T. Sutikno, L. Handayani, D. Stiawan, M. A. Riyadi, and I. M. I. Subroto, ''Whatsapp, viber and telegram: which is the best for instant messaging?'' 2016. Online. Available: https:\/\/api.semanticscholar.org\/CorpusID:61685613"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3150376.3150382"},{"key":"e_1_3_2_1_17_1","volume-title":"Analyzing the telegram ban in iran,\" Berkman-Klein Center Research Publication, no. 4","author":"Kargar S.","year":"2018","unstructured":"S. Kargar and K. McManamen, \"censorship and collateral damage: Analyzing the telegram ban in iran,\" Berkman-Klein Center Research Publication, no. 4, 2018."},{"volume-title":"The telegram ban: How censorship \"made in russia\" faces a global internet,\" First Monday","author":"Ermoshina K.","key":"e_1_3_2_1_18_1","unstructured":"K. Ermoshina and F. Musiani, \"The telegram ban: How censorship \"made in russia\" faces a global internet,\" First Monday, vol. 26, no. 5, 2021."},{"key":"e_1_3_2_1_19_1","volume-title":"A safe space to hate: White supremacist mobilisation on telegram,\" Institute for Strategic Dialogue","author":"Guhl J.","year":"2020","unstructured":"J. Guhl and J. Davey, \"A safe space to hate: White supremacist mobilisation on telegram,\" Institute for Strategic Dialogue, vol. 26, 2020."},{"issue":"2","key":"e_1_3_2_1_20_1","first-page":"100","article-title":"Us extremism on telegram","volume":"15","author":"Walther S.","year":"2021","unstructured":"S. Walther and A. McCoy, \"Us extremism on telegram,\" Perspectives on Terrorism, vol. 15, no. 2, pp. 100--124, 2021.","journal-title":"Perspectives on Terrorism"},{"key":"e_1_3_2_1_21_1","first-page":"3146","volume-title":"From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers,\" in 2023 IEEE Symp. on Security and Privacy (SP)","author":"Ludant N.","year":"2023","unstructured":"N. Ludant, P. Robyns, and G. Noubir, \"From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers,\" in 2023 IEEE Symp. on Security and Privacy (SP), 2023, pp. 3146--3161."},{"key":"e_1_3_2_1_22_1","volume-title":"Naha, Jap\u00f3n. Disponible en https:\/\/bit. ly\/36aX3TK","author":"Lee J.","year":"2017","unstructured":"J. Lee, R. Choi, S. Kim, and K. Kim, \"Security analysis of end-to-end encryption in telegram,\" in Simposio en Criptograf\u00eda Seguridad Inform\u00e1tica, Naha, Jap\u00f3n. Disponible en https:\/\/bit. ly\/36aX3TK, 2017."},{"key":"e_1_3_2_1_23_1","volume-title":"Analysis of telegram, an instant messaging service,\" in Proc. of the 2017 ACM on Conf. on Information and Knowledge Management","author":"Nobari A. Dargahi","year":"2017","unstructured":"A. Dargahi Nobari, N. Reshadatmand, and M. Neshati, \"Analysis of telegram, an instant messaging service,\" in Proc. of the 2017 ACM on Conf. on Information and Knowledge Management, 2017, p. 2035--2038."},{"key":"e_1_3_2_1_24_1","volume-title":"A Survey of the Privacy Preferences and Practices of Iranian Users of Telegram,\" in Workshop on Usable Security (USEC)","author":"Vaziripour E.","year":"2018","unstructured":"E. Vaziripour, J. Wu, R. Farahbakhsh, K. Seamons, M. O'Neill, and D. Zappala, \"A Survey of the Privacy Preferences and Practices of Iranian Users of Telegram,\" in Workshop on Usable Security (USEC), vol. 1, 2018."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.09.002"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58793-2_29"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5578914"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.29"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.045230"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2604383"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Y. Ding S. T. Peddinti and K. W. Ross \"Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery \" in Proc. of the 4th ACMWorkshop on Security and Privacy in Smartphones & Mobile Devices ser. SPSM '14 2014 p. 75--80.","DOI":"10.1145\/2666620.2666625"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T10:27:49Z","timestamp":1719484069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":31,"alternative-id":["10.1145\/3643833.3656121","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656121","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}