[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
EFail - OpenPGP S/MIME Vulnerability
- Subject: EFail - OpenPGP S/MIME Vulnerability
- From: admin at pilobilus.net (Steve Kinney)
- Date: Wed, 16 May 2018 01:52:12 -0400
- In-reply-to: <CAD2Ti2_u_=Tvvp0nGwGkvj1pUKj+UAn9UdhkGKfr_DVpb2hQWg@mail.gmail.com>
- References: <CAD2Ti2_u_=Tvvp0nGwGkvj1pUKj+UAn9UdhkGKfr_DVpb2hQWg@mail.gmail.com>
On 05/14/2018 01:48 PM, grarpamp wrote:
> The EFAIL attacks break PGP and S/MIME email encryption by coercing
> clients into sending the full plaintext of the emails to the attacker.
Werner & Co. respond:
https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html
Spoiler: If your e-mail client software is not borken and
malconfigured, this is Not A Thing.
If it is, you lost the game a long time ago because don't know anything
about the rules, the board, the pieces or the objective.
:o/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20180516/f4d0b6f9/attachment.sig>