EFAIL countermeasure recommendations on your site

Andrew Engelbrecht andrew at fsf.org
Thu Jun 7 18:22:42 CEST 2018


Hello GNUPG mailing list,

Would it be possible for you to make recommendations about how to
respond to the EFAIL vulnerability on your site?

I see that you link to emailselfdefense.org, which encourages users to
use the latest version of enigmail. However I see that there are
mentions of enigmail here:

https://www.gnupg.org/software/swlist.html
https://www.gnupg.org/howtos/en/GPGMiniHowto-6.html
https://www.gnupg.org/faq/gnupg-faq.html
https://www.gnupg.org/faq/gnupg-faq.txt
https://wiki.gnupg.org/EMailClients
https://wiki.gnupg.org/E-Mail%20Format%20Preferences

Would you please consider adding comments about using the latest version
on these pages, for the sake of user security?

Thanks, :)
Andrew

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20180607/e2184d99/attachment.sig>


More information about the Gnupg-users mailing list