There's a major debate over the Efail vulnerabilities and whether they're exaggerated. Nay sayers argue the plaintext exfiltration happens only if users do unsafe things like enable HTML mail and ignore error messages. Filippo makes an excellent counter argument.https://twitter.com/FiloSottile/status/996010161427935233 …
-
-
Replying to @dangoodin001
Honestly, I think both are right. A general purpose design must be used correctly in order to be secure. A special purpose design must be designed to prevent misuse. This case is of a generic purpose tool being used for a specific purpose. Hence the dispute.
1 reply 0 retweets 1 like -
Replying to @ircmaxell @dangoodin001
Example: the argument that pgp should never return decrypted output in event of a failure only works if your output is reasonably small. If it is many GB or TB, then it is totally impractical if not impossible to do that. Hence generic tools don't make specificity apis.
1 reply 0 retweets 2 likes
This. Ideal crypto API design is great and all, but in the real world sometimes APIs cannot be designed to be fully idiot-proof. Of course, then you can misuse them, like that time Nintendo bricked a bunch of Wiis by flashing the bootloader *before* checking the hash.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.