EFail - OpenPGP S/MIME Vulnerability

Steve Kinney admin at pilobilus.net
Tue May 15 22:52:12 PDT 2018



On 05/14/2018 01:48 PM, grarpamp wrote:

> The EFAIL attacks break PGP and S/MIME email encryption by coercing
> clients into sending the full plaintext of the emails to the attacker.

Werner & Co. respond:

https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html

Spoiler:  If your e-mail client software is not borken and
malconfigured, this is Not A Thing.

If it is, you lost the game a long time ago because don't know anything
about the rules, the board, the pieces or the objective.

:o/





-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20180516/f4d0b6f9/attachment.sig>


More information about the cypherpunks mailing list