Alex Schroeder ๐Ÿ is a user on octodon.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

To anybody who used my , and Guide: Something seems to have surfaced regarding PGP And GPG, so maybe switch to some other technology such as Signal for the moment.
eff.org/deeplinks/2018/05/atte
github.com/kensanata/ggg#gmail

@kensanata As far as I understood, the attack works as follows:

1) Alice sends Bob an encrypted message, I intercept it but cannot read it.

2) I craft a new email to Bob and include the crypted text as an MIME attachment.

3) Bob decrypts the complete email, through an error in his MIME parser, the decrypted text from Alice becomes part of a larger HTML text.

4) By displaying the HTML mail, the secret message may be exfiltrated as part of an URL.

Alex Schroeder ๐Ÿ @kensanata

@Masek Sounds like a short and sweet explanation. I read the statement on the mailing list but didn't understand how that would work.

ยท Web ยท 0 ยท 0

@kensanata Summary: MIME-Parsers are faulty, we knew that.

This attack is a neat trick to include a message I cannot decipher and send it someone else to decipher it and exfiltrate it back through a image URL or similar.

MUAs that call external URLs are a security risk. This was already known. This is just creatively using the problem to decipher a secret message.