When you simplify it to “active content” you do a disservice to both the cryptographic sophistication of the attack AND the severity of the vuln (particularly for S/MIME). This is why things don’t ever get fixed.
-
-
Replying to @matthew_d_green
I'm not considering S/MIME here at all since most of the FUD seems to be about PGP. I couldn't care less about S/MIME and have not analyzed that vector.
1 reply 0 retweets 0 likes -
-
Replying to @matthew_d_green @marcan42
Also: let me be clear. “I can fully decrypt your encrypted PGP emails with almost no user interaction” is not FUD. If you doubt the vuln exists, say so. But don’t say it’s not extremely serious for a crypto vuln.
1 reply 0 retweets 3 likes -
Replying to @matthew_d_green
"I can fully decrypt your encrypted PGP emails with almost no user interaction" is FUD. "I can fully decrypt your encrypted PGP emails if I can guess some plaintext and the zlib stars align and you enable HTML and and you're running outdated TB and Enigmail and blah blah" isn't.
2 replies 0 retweets 3 likes -
Replying to @marcan42
1. You can almost always guess some plaintext. That’s a key point of the paper. 2. Zlib is tough but it’s 1/3 not 1/100,000. Not a huge ask. 3. By outdated, do you mean “a version that was current for the past N years prior to this disclosure” because duh.
2 replies 0 retweets 3 likes -
Replying to @matthew_d_green @marcan42
The EFF said “disable or uninstall plugins until there’s a patch”. That’s pretty straightforward advice. Not panic.
1 reply 0 retweets 2 likes -
Replying to @matthew_d_green
Except there had been a patch for months already.
1 reply 0 retweets 0 likes -
Replying to @marcan42
That seems on the EFF. But I saw some threads from 5/14 re: Enigmail saying that some modes were still vulnerable. So I’m a bit skeptical about this.
1 reply 0 retweets 0 likes -
Replying to @matthew_d_green
No, mostly it's on the researchers, who seemed to be completely lost as to what was being mitigated when and where, and who were entirely responsible for feeding the info to the EFF as far as I can tell (and on the EFF for buying it).
2 replies 0 retweets 1 like
The "vulnerable modes" in Enigmail (until the update a few days ago) are simply old pre-MDC ciphers where you cannot enforce the integrity requirement. The newer Enigmail just errors out on those entirely now (thus refusing to decrypt old messages altogether AFAICT).
-
-
Replying to @marcan42 @matthew_d_green
Note that that still requires the leak in Thunderbird, which has been fixed in the current version as of some time ago (and you can mitigate it on prior versions with a simple pref change).
0 replies 0 retweets 1 likeThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.