On 18 May 2018, at 13:27, Benny Kjær Nielsen wrote:
On 17 May 2018, at 9:28, Bharath M Palavalli wrote:
On 14 May 2018, at 19:12, Benny Kjær Nielsen wrote:
On 14 May 2018, at 14:36, Benny Kjær Nielsen wrote:
The worst type of exploit was a technique which allowed a
man-in-the-middle attacker to take any encrypted email and then
send an email to the author of this email which would effectively
decrypt the email and send the result to a server, for example,
using an `<img src>` HTML reference.
Just to be clear here, I find this particular bug embarrassing. It
is somewhat related to how MailMate “primitively” handles
displaying multiple email message parts. (Also note, that it only
affects email for which image blocking was disabled.)
Thanks a lot for the update Benny, one more happy Mailmate user!
Are these changes made in the version 1.11.2 (r5479) or are you
referring to this new version that you asked us to wait for in case
there are no bugs before you automate it
(https://updates.mailmate-app.com/archives/MailMate_r5484.tbz)?
These changes have been in MailMate since a public release in March
(the 1.11 release). I was notified about the “efail” issues in
February.
--
Benny
https://freron.com/become_a_mailmate_patron/
_______________________________________________
mailmate mailing list
mailmate@lists.freron.com
https://lists.freron.com/listinfo/mailmate
Thanks Benny!
--
Thank you,
Bharath
www.bharathpalavalli.com
_______________________________________________
mailmate mailing list
mailmate@lists.freron.com
https://lists.freron.com/listinfo/mailmate