- Joined
- May 6, 2012
- Messages
- 184 (0.04/day)
- Location
- Estonia
System Name | Steamy |
---|---|
Processor | Ryzen 7 2700X |
Motherboard | Asrock AB350M-Pro4 |
Cooling | Wraith Prism |
Memory | 2x8GB HX429C15PB3AK2/16 |
Video Card(s) | R9 290X WC |
Storage | 960Evo 500GB nvme |
Case | Fractal Design Define Mini C |
Power Supply | Seasonic SS-660XP2 |
Software | Windows 10 Pro |
Benchmark Scores | http://hwbot.org/user/kinski/ http://valid.x86.fr/qfxqhj https://goo.gl/uWkw7n |
https://efail.de/
https://arstechnica.com/information...s-can-reveal-encrypted-e-mails-uninstall-now/
https://arstechnica.com/information...s-can-reveal-encrypted-e-mails-uninstall-now/
The Internet’s two most widely used methods for encrypting email—PGP and S/MIME—are vulnerable to hacks that can reveal the plaintext of encrypted messages, a researcher warned late Sunday night. He went on to say there are no reliable fixes and to advise anyone who uses either encryption standard for sensitive communications to remove them immediately from email clients.
The flaws “might reveal the plaintext of encrypted emails, including encrypted emails you sent in the past,” Sebastian Schinzel, a professor of computer security at Münster University of Applied Sciences, wrote on Twitter. “There are currently no reliable fixes for the vulnerability. If you use PGP/GPG or S/MIME for very sensitive communication, you should disable it in your email client for now.”
Last edited: