EFAIL countermeasure recommendations on your site
Andrew Engelbrecht
andrew at fsf.org
Thu Jun 7 18:22:42 CEST 2018
Hello GNUPG mailing list,
Would it be possible for you to make recommendations about how to
respond to the EFAIL vulnerability on your site?
I see that you link to emailselfdefense.org, which encourages users to
use the latest version of enigmail. However I see that there are
mentions of enigmail here:
https://www.gnupg.org/software/swlist.html
https://www.gnupg.org/howtos/en/GPGMiniHowto-6.html
https://www.gnupg.org/faq/gnupg-faq.html
https://www.gnupg.org/faq/gnupg-faq.txt
https://wiki.gnupg.org/EMailClients
https://wiki.gnupg.org/E-Mail%20Format%20Preferences
Would you please consider adding comments about using the latest version
on these pages, for the sake of user security?
Thanks, :)
Andrew
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20180607/e2184d99/attachment.sig>
More information about the Gnupg-users
mailing list