Skip to content
By using Twitter’s services you agree to our Cookies Use. We and our partners operate globally and use cookies, including for analytics, personalisation, and ads.
  • Home Home Home, current page.
  • About

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @
  • Language: English
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English UK
    • Español
    • Filipino
    • Français
    • Hrvatski
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Ελληνικά
    • Български език
    • Русский
    • Српски
    • Українська мова
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Have an account? Log in
    Have an account?
    · Forgot password?

    New to Twitter?
    Sign up
seecurity's profile
Sebastian Schinzel
Sebastian Schinzel
Sebastian Schinzel
@seecurity

Tweets

Sebastian Schinzel

@seecurity

Professor of computer security @fh_muenster. Also husband, dad, mountain biker. PGP: https://keybase.io/seecurity 

Münster, Germany, Europe
sebastian-schinzel.de
Joined June 2011

Tweets

  • © 2018 Twitter
  • About
  • Help Center
  • Terms
  • Privacy policy
  • Cookies
  • Ads info
Dismiss
Previous
Next

Go to a person's profile

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @

Promote this Tweet

Block

  • Tweet with a location

    You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more

    Your lists

    Create a new list


    Under 100 characters, optional

    Privacy

    Copy link to Tweet

    Embed this Tweet

    Embed this Video

    Add this Tweet to your website by copying the code below. Learn more

    Add this video to your website by copying the code below. Learn more

    Hmm, there was a problem reaching the server.

    By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.

    Preview

    Why you're seeing this ad

    Log in to Twitter

    · Forgot password?
    Don't have an account? Sign up »

    Sign up for Twitter

    Not on Twitter? Sign up, tune into the things you care about, and get updates as they happen.

    Sign up
    Have an account? Log in »

    Two-way (sending and receiving) short codes:

    Country Code For customers of
    United States 40404 (any)
    Canada 21212 (any)
    United Kingdom 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Ireland 51210 Vodafone, O2
    India 53000 Bharti Airtel, Videocon, Reliance
    Indonesia 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italy 4880804 Wind
    3424486444 Vodafone
    » See SMS short codes for other countries

    Confirmation

     

    Welcome home!

    This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.

    Tweets not working for you?

    Hover over the profile pic and click the Following button to unfollow any account.

    Say a lot with a little

    When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.

    Spread the word

    The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.

    Join the conversation

    Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.

    Learn the latest

    Get instant insight into what people are talking about now.

    Get more of what you love

    Follow more accounts to get instant updates about topics you care about.

    Find what's happening

    See the latest conversations about any topic instantly.

    Never miss a Moment

    Catch up instantly on the best stories happening as they unfold.

    Sebastian Schinzel‏ @seecurity May 13

    We'll publish critical vulnerabilities in PGP/GPG and S/MIME email encryption on 2018-05-15 07:00 UTC. They might reveal the plaintext of encrypted emails, including encrypted emails sent in the past. #efail 1/4

    11:00 PM - 13 May 2018
    • 2,419 Retweets
    • 1,858 Likes
    • Sonny Espinoza Bourgogne Digitale Innovation 📡 Darrell Guernier Bunny Futuregadget Privacy Pro PLOW Jukka Haapasaari Nikolai Klaus S.M. Ali Minhal
    97 replies 2,419 retweets 1,858 likes
      1. New conversation
      2. Sebastian Schinzel‏ @seecurity May 13

        There are currently no reliable fixes for the vulnerability. If you use PGP/GPG or S/MIME for very sensitive communication, you should disable it in your email client for now. Also read @EFF’s blog post on this issue: https://www.eff.org/deeplinks/2018/05/attention-pgp-users-new-vulnerabilities-require-you-take-action-now … #efail 2/4

        17 replies 496 retweets 369 likes
        Show this thread
      3. Sebastian Schinzel‏ @seecurity May 13

        Here are @EFF’s guides for disabling PGP/GPG in Thunderbird https://www.eff.org/deeplinks/2018/05/disabling-pgp-thunderbird-enigmail …, Apple Mail https://www.eff.org/deeplinks/2018/05/disabling-pgp-apple-mail-gpgtools …, and Outlook https://www.eff.org/deeplinks/2018/05/disabling-pgp-outlook-gpg4win …. #efail 3/4

        3 replies 174 retweets 163 likes
        Show this thread
      4. Sebastian Schinzel‏ @seecurity May 13

        This is joint research with Damian Poddebniak, @dr4ys3n, @jensvoid @Murgi @seecurity @cryptosorcerer @jurajsomorovsky and Jörg Schwenk from @fh_muenster, @ruhrunibochum, @LeuvenU. #efail 4/4

        8 replies 91 retweets 143 likes
        Show this thread
      5. End of conversation
      1. New conversation
      2. Jan  🇪🇺 Wildeboer‏ @jwildeboer May 13
        Replying to @seecurity @x0rz

        Why the drama? Why not simply release the details now instead of Hollywood style „come back tomorrow for more!“

        3 replies 4 retweets 76 likes
      3. Sebastian Schinzel‏ @seecurity May 13
        Replying to @jwildeboer @x0rz

        Because of the reasons you'll learn tomorrow.

        9 replies 4 retweets 66 likes
      4. Jan  🇪🇺 Wildeboer‏ @jwildeboer May 14
        Replying to @seecurity @x0rz

        EFF focuses on PGP, while you also mention S/MIME. I gather standalone use of GPG/PGP is safe? If yes, that should be made very clear. Or should we stop signing rpms, git commits with GPG too?

        3 replies 3 retweets 24 likes
      5. Sebastian Schinzel‏ @seecurity May 14
        Replying to @jwildeboer @x0rz

        The tweets and blog posts were written very carefully. Please also read them carefully. They contain anything you need to know until tomorrow.

        3 replies 2 retweets 34 likes
      6.  🐯‏ @tigerphace May 14
        Replying to @seecurity @jwildeboer @x0rz

         🐯 Retweeted Sebastian Schinzel

        "temporarily stop sending and especially reading PGP-encrypted email" Interesting..https://twitter.com/seecurity/status/995906576170053633 …

         🐯 added,

        Sebastian Schinzel @seecurity
        We'll publish critical vulnerabilities in PGP/GPG and S/MIME email encryption on 2018-05-15 07:00 UTC. They might reveal the plaintext of encrypted emails, including encrypted emails sent in the past. #efail 1/4
        Show this thread
        3 replies 3 retweets 9 likes
      7. Erwan‏ @R1Rail May 14
        Replying to @tigerphace @seecurity and

        So we can rsummarrize this as "since there is a threat toward S/MIME and PGP now send everything in clear" ?

        1 reply 1 retweet 21 likes
      8. Jan  🇪🇺 Wildeboer‏ @jwildeboer May 14
        Replying to @R1Rail @tigerphace and

        No. “Don’t encrypt/decrypt your email using plugins until tomorrow where you can hopefully assess better what the problem is” is what we are told.

        1 reply 2 retweets 13 likes
      9. Mark Koek (HackDefense)‏ @hackdefense_com May 14
        Replying to @jwildeboer @R1Rail and

        Which the news media are reporting as "don't use PGP it's dangerous". And the way the warnings are written, I don't blame the news media.

        1 reply 3 retweets 38 likes
      10. 5 more replies
      1. New conversation
      2. floyd‏ @floyd_ch May 13
        Replying to @seecurity

        SMIME is a builtin functionality of clients. Do we need to worry there? Why only deactivating GnuPG-sorts?

        1 reply 0 retweets 3 likes
      3. Sebastian Schinzel‏ @seecurity May 13
        Replying to @floyd_ch

        You can still disable it in the config. If use S/MIME for sensitive information, disable it for now.

        2 replies 2 retweets 3 likes
      4. Morten Nielsen‏ @dotMorten May 13
        Replying to @seecurity @floyd_ch

        why disable it? Thats like saying "we know how to break into your house so don't bother locking the door"

        5 replies 2 retweets 46 likes
      5. floyd‏ @floyd_ch May 13
        Replying to @dotMorten @seecurity

        Again, it all sounds more like RCE-ish. So you rather have all your past emails stolen or just use other channels for now? When heartbleed came out, people with SSL/TLS had a potential RCE, those without had “only” insecure connections.

        1 reply 3 retweets 21 likes
      6. Patrick Webster‏ @aushack May 14
        Replying to @floyd_ch @dotMorten @seecurity

        Agree. Disable auto decryption gives it away. Controlling the memory space that contains the private key with code execution is a good reason to disable it! Sounds like a flaw in a widely implemented crypto library within email communications.

        0 replies 1 retweet 5 likes
      7. End of conversation
      1. New conversation
      2. Hash the Code‏ @HashTheCode May 13
        Replying to @seecurity

        Any research paper about this ?

        2 replies 0 retweets 3 likes
      3. Sebastian Schinzel‏ @seecurity May 13
        Replying to @HashTheCode

        We'll release it tomorrow.

        1 reply 0 retweets 13 likes
      4. Bertrand Stivalet‏ @B_Stivalet May 14
        Replying to @seecurity @HashTheCode

        https://efail.de/efail-attack-paper.pdf … ?

        1 reply 7 retweets 33 likes
      5. 1 more reply

    Loading seems to be taking a while.

    Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

      Promoted Tweet

      false

      • © 2018 Twitter
      • About
      • Help Center
      • Terms
      • Privacy policy
      • Cookies
      • Ads info