PGP and EFAIL: Frequently Asked Questions

The second attack abuses the underspecification of certain details in the OpenPGP standard to exfiltrate email contents to the attacker by modifying a previously obtained encrypted email. This second vulnerability takes advantage of the combination of OpenPGP’s lack of mandatory integrity verification combined with the HTML parsers built into mail software.

Read full news article on Electronic Frontier Foundation

 


Date:

Categorie(s):