Advertisement
defango

efail

May 14th, 2018
343
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.58 KB | None | 0 0
  1. PGP and Efail Vulnerabilty exposing encrypted Emails via PGP/GPG and S/mine
  2. Youtube
  3. https://www.youtube.com/watch?v=kUOkwg9VvKQ
  4.  
  5. Steemit
  6. https://steemit.com/new/@defango/pgp-and-efail-vulnerabilty-exposing-encrypted-emails-via-pgp-gpg-and-s-mine
  7.  
  8. If you use PGP or S/MIME for email encryption you should immediately disable it in your email client. Researchers have discovered a critical vulnerability they’re calling EFAIL that exposes the encrypted emails in plaintext, even for messages sent in the past.
  9.  
  10. THE UBIQUITOUS EMAIL encryption schemes PGP and S/MIME are vulnerable to attack, according to a group of German and Belgian researchers who posted their findings on Monday. The weakness could allow a hacker to expose plaintext versions of encrypted messages—a nightmare scenario for users who rely on encrypted email to protect their privacy, security, and safety.
  11.  
  12. Digital security trainers, whistleblowers, journalists, activists, cryptographers, industry, and nonprofit organizations have relied on PGP for 27 years as a way to protect email communications from eavesdroppers and ensure the authenticity of messages. If you’re like us, you likely have recommended PGP as an end-to-end encrypted email solution in workshops, trainings, guides, cryptoparties, and keysigning parties. It can be hard to imagine a workflow without PGP once you’ve taken the time to learn it and incorporate it in your communications.
  13.  
  14. Digital security trainers, whistleblowers, journalists, activists, cryptographers, industry, and nonprofit organizations have relied on PGP for 27 years as a way to protect email communications from eavesdroppers and ensure the authenticity of messages. If you’re like us, you likely have recommended PGP as an end-to-end encrypted email solution in workshops, trainings, guides, cryptoparties, and keysigning parties. It can be hard to imagine a workflow without PGP once you’ve taken the time to learn it and incorporate it in your communications.
  15.  
  16.  
  17. White Paper
  18. https://efail.de/efail-attack-paper.pdf
  19.  
  20. Links
  21. https://efail.de/
  22. https://gizmodo.com/email-no-longer-a-secure-method-of-communication-after-1826002682
  23. https://www.wired.com/story/efail-encrypted-email-flaw-pgp-smime/
  24. https://lifehacker.com/how-to-secure-your-email-now-that-pgp-is-compromised-1826008338
  25. https://www.pcmag.com/news/361179/email-encryption-with-pgp-may-have-a-serious-flaw
  26. https://www.technadu.com/s-mime-and-pgp-email-encryption-flaws-affecting-millions-discovered-by-eff/28800/
  27. https://gizmodo.com/securedrop-safe-from-the-new-pgp-attack-so-please-cont-1826016199
  28. https://www.androidcentral.com/efail
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement