• Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Resources
  • Industry Voice
  • Data Strategy Spotlight
  • Newsletters
  • Resources
    • Inqlogo 120x194
      Five things you should look for in choosing a Testing provider

      Choosing a Testing Partner can be complex.  So what do you look for?  This guide offers insight into the qualities you must look for in choosing a Testing provider.  Download now to learn more.

      Download
      Inqlogo 120x194
      Your questions answered: How to protect your data in the cloud

      The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • Google+
    • YouTube
  • Newsletter
  • Industry Voice
  • Data Strategy Spotlight
The Inquirer
The Inquirer
  • Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Trending
  • NHS data breach
  • iOS 12
  • Galaxy Note 9
  • iPhone 9
  • World Cup
The Inquirer
  • Security

PGP is leaking your emails in plaintext and there's no known fix

EFF advises switching to Signal

PGP is leaking your emails in plaintext and there's no known fix
PGP is leaking plain text versions of your emails and there's no known fix
  • Chris Merriman
  • Chris Merriman
  • @ChrisTheDJ
  • 14 May 2018
  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
0 Comments

YOUR EMAILS could be vulnerable to interception following a discovery of a major flaw in PGP/S-MIME encryption, far and away the most popular was of protecting emails.

Researchers at FH Munster University of Applied Sciences have released details of a vulnerability with no known patch which could allow hackers to turn a ciphered message into plain text and read it.

You could stop sending e-mails, except that even your old messages are vulnerable.

"There are currently no reliable fixes for the vulnerability. If you use PGP/GPG or S/MIME for very sensitive communication, you should disable it in your email client for now," said Sebastian Schinzel, a professor of computer security at the University.

Teams from KU Leuven University and Ruhr University have worked alongside FH Munster and the Electronic Freedom Foundation (EFF) is working with them to get the word out.

"Our advice, which mirrors that of the researchers, is to immediately disable and/or uninstall tools that automatically decrypt PGP-encrypted email," said EFF.

This includes Enigmail for Thunderbird, GPGTools for Apple Mail and Gpg4win for Outlook which all offer to decrypt emails on the fly.

It continues: "The flaws described in the paper are more widely understood and fixed, users should arrange for the use of alternative end-to-end secure channels, such as Signal, and temporarily stop sending and especially reading PGP-encrypted email."

Full instructions on how to disable these plug-ins are available here. More details are starting to drip out, but the warning is that leaving encryption active will increase the danger and so for now, using something safe is the best course of action.

The EFF points out that this action represents "a temporary, conservative stop-gap" until the security team has released full details of the problem, due tomorrow at 0700 GMT.

Once the official announcement is made, there may turn out to be more practical ways of avoiding the problem, but for now, suck it up.

It wasn't that long ago that OEMs were being warned to share details of vulnerabilities in their chips via PGP so hackers couldn't evesdrop. Erm. Oops. 

This turning into another Heartbleed is unlikely given that this level of encryption is, for most, belt and braces - nobody cares what you had for dinner - but for those who rely on PGP for genuine confidentiality? It's time to squirm, seemingly.

Alternatively, you can throw the baby out with the bath water, by publishing your PGP key like Adobe. µ  

  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Security
  • Hacking
  • pgp
  • encryption

INQ Latest

Your smartphone isn't always listening, but it could well be watching you
Your smartphone isn't always listening, but it could well be watching you

Well, recording your screen anyway. Still, ewwwww

  • Security
  • 04 July 2018
Brit cops admit facial recognition trial resulted in, er, zero arrests
Brit cops admit facial recognition trial resulted in, er, zero arrests

And controversial software only made one (wrong) 'match'

  • Security
  • 04 July 2018
Facebook confirms it's buying London-based Bloomsbury AI
Facebook confirms it's buying London-based Bloomsbury AI

The social network's AI tech is about to get a boost

  • Software
  • 04 July 2018
Sony accidentally posts a whole movie instead of its trailer
Sony accidentally posts a whole movie instead of its trailer

The trailers are always better than the films anyway....

  • Security
  • 04 July 2018
Back to Top

Most read

iPhone 9: Apple's 18W USB-C charger shown off in leaked images
iPhone 9: Apple's 18W USB-C charger shown off in leaked images
Galaxy Note 9 release date, specs and price: Hands-on review surfaces weeks before launch
Galaxy Note 9 release date, specs and price: Hands-on review surfaces weeks before launch
Asus ZenFone 5 review
Asus ZenFone 5 review
OnePlus 6 price, specs and news: OnePlus 6 'Red' edition is coming to Blighty next week
OnePlus 6 price, specs and news: OnePlus 6 'Red' edition is coming to Blighty next week
Intel accidentally reveals 9th-gen Core i5 and Core i3 Coffee Lake CPUs
Intel accidentally reveals 9th-gen Core i5 and Core i3 Coffee Lake CPUs
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • Google+
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017