Vulnerable clients (was: US-CERT now issuing a warning for OpenPGP-SMIME-Mail-Client-Vulnerabilities)

Martin martin at postzone.org
Wed May 16 15:55:48 CEST 2018


Hi,

Am Mittwoch, 16. Mai 2018, 10:02:21 schreiben Sie:


> Werner, my conclusion in addition is that the table is incorrect.
> Most (if not even all) of the MUA which are noted for Linux do run on
> nearly any other UNIX flavor, FreeBSD, OpenBSD, ... and mutt in addition
> runs  on Canonical Ubuntu for smartphones/tablets and UBports devices.

To show that developers of clients take the situation seriously one
example: Today I got an update for Android R2Mail2 which fixes the
#efail problem.

There's still a chance ;-)
-- 
Regards
 Martin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 484 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20180516/ca5850c2/attachment.sig>


More information about the Gnupg-users mailing list