Hello tbbeta,
On Mon, 14 May 2018, at 16:54:42 [GMT +0200] (which was 16:54 where I
live) Martin wrote:
> I hope development team will check EFAIL vulnerabilities as soon as
> possible
Some important information related to GnuPG!
Update to GPG 2.2.8 and GnuPG 1.4.23!
With newer GnuPG encrypted/s
Hello tbbeta,
On Mon, 14 May 2018, at 16:54:42 [GMT +0200] (which was 16:54 where I
live) Martin wrote:
> Hi list
> I hope development team will check EFAIL vulnerabilities as soon as
> possible
We really need a solution to check for Warnings in OpenPGP error
message window after checking signat
Hello Maxim,
On Mon, 14 May 2018, at 16:54:42 [GMT +0200] (which was 16:54 where I
live) Martin wrote:
> I hope development team will check EFAIL vulnerabilities as soon as
> possible
Please check this
https://www.benthamsgaze.org/2018/05/15/tampering-with-openpgp-digitally-signed-messages-by-exp
Hello Eddie!
On Wednesday, May 16, 2018 at 12:38:23 PM you wrote:
> What I understand is that it is vulnerable when sending HTML mails. So
> I presume ordinary "Text" mails are ok.
Ordinary, plain text mail is alright. Do not send HTML, make plain
text the default for viewing mails, check links
Hi Maxim,
--->>> Maxim Masiutin / Monday 14-May-18, 23:21:32
GnuPG EFAIL
> My first glance shows that The Bat! is not vulnerable to these
> kinds of attacks, but we will check more.
What I understand is that it is vulnerable when sending HTML mails. So
I presume ordina
On Monday, May 14, 2018, 5:21:32 PM, Maxim Masiutin wrote:
> My first glance shows that The Bat! is not vulnerable to these
> kinds of attacks, but we will check more.
There is a table mail clients in the Ars article linked below which
suggests that TB! is not vulnerable to the PGP issues, but mi
My first glance shows that The Bat! is not vulnerable to these kinds of
attacks, but we will check more.
Current beta is 8.3.0.6 | 'Using TBBETA' information:
http://www.silverstones.com/thebat/TBUDLInfo.html
7 matches
Mail list logo