On 14 Jul 2018, at 15:32 (-0400), Dave C wrote:

https://www.csoonline.com/article/3272067/security/researchers-warn-pgp-and-smime-users-of-serious-vulnerabilities.html

I didn’t see any mention of MM in the announcement (which has been updated several times).

It was mentioned in the (now very stale) original description of the problem at https://efail.de. As already said, Benny fixed MM's narrow susceptibility to the problem before it was published.

The solution in general to this class of "vulnerability" is to simple: do not generate HTML email, do not ever load any type of remote URLs in any messages without having consciously evaluated the specific trustworthiness of each URL source (not just the message source,) and do not by default interpret HTML in any message for rendering.

(Yeah, I know... Why would anyone listen to me on that matter now after ignoring me and many others for the past ~25 years? )

--
Bill Cole
[email protected] or [email protected]
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Currently Seeking Steadier Work: https://linkedin.com/in/billcole
_______________________________________________
mailmate mailing list
[email protected]
https://lists.freron.com/listinfo/mailmate

Reply via email to