PGP: Difference between revisions
From osint.info
Jump to navigationJump to search
Line 4: | Line 4: | ||
|- | |- | ||
|Date||Source||Title||Tags | |Date||Source||Title||Tags | ||
|- | |||
|20180514||gnupg.org||[https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060315.html Efail or OpenPGP is safer than S/MIME]||[[PGP]] | |||
|- | |- | ||
|20180514||efail.de||[https://efail.de/efail-attack-paper.pdf Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (draft 0.9.0)]||[[PGP]] | |20180514||efail.de||[https://efail.de/efail-attack-paper.pdf Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (draft 0.9.0)]||[[PGP]] |
Revision as of 18:42, 14 May 2018
Articles
Date | Source | Title | Tags |
20180514 | gnupg.org | Efail or OpenPGP is safer than S/MIME | PGP |
20180514 | efail.de | Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (draft 0.9.0) | PGP |
20180514 | efail.de | EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails. | PGP |
31.07.2012 | cryptome.org | Comments from Chile | CRYPTOCAT / PGP / GMAIL / OTR / HOTMAIL |