EFail - OpenPGP S/MIME Vulnerability
Steve Kinney
admin at pilobilus.net
Tue May 15 22:52:12 PDT 2018
On 05/14/2018 01:48 PM, grarpamp wrote:
> The EFAIL attacks break PGP and S/MIME email encryption by coercing
> clients into sending the full plaintext of the emails to the attacker.
Werner & Co. respond:
https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html
Spoiler: If your e-mail client software is not borken and
malconfigured, this is Not A Thing.
If it is, you lost the game a long time ago because don't know anything
about the rules, the board, the pieces or the objective.
:o/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20180516/f4d0b6f9/attachment.sig>
More information about the cypherpunks
mailing list