Let's go ahead and document the fails for posterity. First I got was a cold e-mail, with the nondescript subject (translated) "I am interested in your work", a "message.pgp" attachment, and a "please read the attached message" style body.
-
-
So I replied in cleartext, asking for a key, *explicitly* asked for a signed message and a verbatim public key for me to use. They replied in the same style, just with the public key pasted into the encrypted message, but no signature.
Show this thread -
But now I have their key, in ASCII armored format, and it starts like this. Yes, they were using a non-commercial freeware version of PGP Desktop for commercial purposes. Version 9.10.0 has a code exec CVE from 2010. https://nvd.nist.gov/vuln/detail/CVE-2010-3397/ …pic.twitter.com/ghfwxEHBjN
Show this thread -
So let's recap: 5 year old webmail, 6 year old e-mail server, >2 year old PGP with an arbitrary code exec CVE. The key itself? The userid was "CCN-CERT.PublicKey <CCN-CERT.PublicKey.Depart@CCN.es>", which does not match the sender of the e-mail either.
Show this thread -
Not that this was going to go anywhere by now, but I replied with inline PGP, and sent them my phone number to see what their story was. I didn't hear back for two weeks. Apparently they had gone on vacation.
Show this thread -
At least they managed to sign their message when they finally replied? Still using attachments though. I figured this wasn't worth wasting any more of my time on by then, didn't reply and never heard back.
Show this thread -
So there you go, that was my recruiting experience from a branch of Spain's NSA. Not exactly a shining example of competence.
Show this thread
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.