14th May 2018
|
ISO Quartermaster
|
|
Join Date: Mar 2014
Posts: 628
|
|
Efail: Vulnerabilities in email clients allow decryption of OpenPGP and S/MIME
https://efail.de/
Quote:
Here are some strategies to prevent EFAIL attacks:
Short term: No decryption in email client. The best way to prevent EFAIL attacks is to only decrypt S/MIME or PGP emails in a separate application outside of your email client. Start by removing your S/MIME and PGP private keys from your email client, then decrypt incoming encrypted emails by copy&pasting the ciphertext into a separate application that does the decryption for you. That way, the email clients cannot open exfiltration channels. This is currently the safest option with the downside that the process gets more involved.
Short term: Disable HTML rendering. The EFAIL attacks abuse active content, mostly in the form of HTML images, styles, etc. Disabling the presentation of incoming HTML emails in your email client will close the most prominent way of attacking EFAIL. Note that there are other possible backchannels in email clients which are not related to HTML but these are more difficult to exploit.
|
__________________
Signature: Furthermore, I consider that systemd must be destroyed.
Based on Latin oratorical phrase
|