Skip to Content

Telegram’s boss hints that China was behind a cyberattack during Hong Kong protests

Protesters in Hong Kong on their smartphones
Protesters in Hong Kong on their smartphonesAssociated Press

Activists have been using encrypted messaging apps like Telegram to organize demonstrations.

The news: Telegram was hit by a distributed denial of service (DDoS) attack yesterday, which appears to have affected some of its 200 million users worldwide. Its founder, Pavel Durov, tweeted that the IP addresses behind the “state actor-sized” attack were mostly located in China.

Background: There have been huge protests in Hong Kong this week that spilled over into violence yesterday, with at least 72 people injured. Activists are angry about a proposed law in Hong Kong that would let criminal suspects be extradited to mainland China for the first time. They fear China is increasingly tightening its grip on Hong Kong, which is a semi-autonomous territory.

How is Telegram being used in Hong Kong? Protesters are using it to disseminate plans and coordinate the distribution of supplies like masks, headgear, and water. Hong Kong police arrested one of the Telegram groups’ administrators yesterday.

Telegram’s role: Encrypted messaging is a vital tool for protesters around the world, as it allows them to communicate away from the authorities’ prying eyes. Unsurprisingly, then, it’s seen as a threat by authoritarian governments. Both Russia and Iran have repeatedly tried to block Telegram, and it’s blocked in China. 

This story first appeared in our daily newsletter The Download. Sign up here to get your dose of the latest must-read news from the world of emerging tech.

Deep Dive


Everything dies, including information

Digitization can help stem the tide of entropy, but it won’t stop it.

What’s next in cybersecurity

“When it comes to really cutting off ransomware from the source, I think we took a step back.”

Moving money in a digital world

Security is the critical element to expanding digital-first payments.

Cyber resilience melds data security and protection

Organizations face pervasive and sophisticated cyberattacks, but modern data protection techniques can provide a multifaceted defense.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.