On 18 May 2018, at 13:27, Benny Kjær Nielsen wrote:

On 17 May 2018, at 9:28, Bharath M Palavalli wrote:

On 14 May 2018, at 19:12, Benny Kjær Nielsen wrote:

On 14 May 2018, at 14:36, Benny Kjær Nielsen wrote:

The worst type of exploit was a technique which allowed a man-in-the-middle attacker to take any encrypted email and then send an email to the author of this email which would effectively decrypt the email and send the result to a server, for example, using an `<img src>` HTML reference.

Just to be clear here, I find this particular bug embarrassing. It is somewhat related to how MailMate “primitively” handles displaying multiple email message parts. (Also note, that it only affects email for which image blocking was disabled.)

Thanks a lot for the update Benny, one more happy Mailmate user!

Are these changes made in the version 1.11.2 (r5479) or are you referring to this new version that you asked us to wait for in case there are no bugs before you automate it (https://updates.mailmate-app.com/archives/MailMate_r5484.tbz)?

These changes have been in MailMate since a public release in March (the 1.11 release). I was notified about the “efail” issues in February.

--
Benny
https://freron.com/become_a_mailmate_patron/
_______________________________________________
mailmate mailing list
mailmate@lists.freron.com
https://lists.freron.com/listinfo/mailmate

Thanks Benny!

--
Thank you,
Bharath
www.bharathpalavalli.com
_______________________________________________
mailmate mailing list
mailmate@lists.freron.com
https://lists.freron.com/listinfo/mailmate

Reply via email to