Vulnerable clients (was: US-CERT now issuing a warning for OpenPGP-SMIME-Mail-Client-Vulnerabilities)
Martin
martin at postzone.org
Wed May 16 15:55:48 CEST 2018
Hi,
Am Mittwoch, 16. Mai 2018, 10:02:21 schreiben Sie:
> Werner, my conclusion in addition is that the table is incorrect.
> Most (if not even all) of the MUA which are noted for Linux do run on
> nearly any other UNIX flavor, FreeBSD, OpenBSD, ... and mutt in addition
> runs on Canonical Ubuntu for smartphones/tablets and UBports devices.
To show that developers of clients take the situation seriously one
example: Today I got an update for Android R2Mail2 which fixes the
#efail problem.
There's still a chance ;-)
--
Regards
Martin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 484 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20180516/ca5850c2/attachment.sig>
More information about the Gnupg-users
mailing list