med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

362
active users

#openpgp

1 post1 participant0 posts today
Heiko<p>A new report (commissioned by the German BSI) outlines the recent evolution of the <a href="https://floss.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> standard, including the new RFC 9580 and PQC drafts, as well as the spinoff "LibrePGP" draft that the GnuPG project writes.</p><p>PDF: <a href="https://github.com/crypto-security-tools/OpenPGP-LibrePGP-comparison/releases/download/v1.4/opgp-lpgp-comp.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/crypto-security-too</span><span class="invisible">ls/OpenPGP-LibrePGP-comparison/releases/download/v1.4/opgp-lpgp-comp.pdf</span></a></p><p>(Announcement email: <a href="https://mailarchive.ietf.org/arch/msg/openpgp/2g_rjYBqwqKZE6OEgjNb0bFo098/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailarchive.ietf.org/arch/msg/</span><span class="invisible">openpgp/2g_rjYBqwqKZE6OEgjNb0bFo098/</span></a>)</p><p>Note that the document contains a one-page "Executive Summary", which (although quite technical) is worth a read.</p><p>[TL;DR: It raises concerns about the GnuPG draft's development process, as well as quality]</p>
Larvitz :fedora: :redhat:<p>Created a FreeBSD port for openpgp-card-tools and put it on my Codeberg: </p><p><a href="https://codeberg.org/Larvitz/openpgp-card-tools-freebsd-port" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/Larvitz/openpgp-c</span><span class="invisible">ard-tools-freebsd-port</span></a></p><p>It's a command-line-utility (oct), written in Rust, to manage openpgp smartcards and compatible devices (yubikey, nitrokey etc).</p><p>Usage instructions are in the repositories readme file.</p><p><a href="https://burningboard.net/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://burningboard.net/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> <a href="https://burningboard.net/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://burningboard.net/tags/port" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>port</span></a> <span class="h-card" translate="no"><a href="https://floss.social/@hko" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hko</span></a></span></p>
GnuPG<p>According to <span class="h-card" translate="no"><a href="https://social.heise.de/@ct_Magazin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ct_Magazin</span></a></span> and the press release <a href="https://merlinux.eu/press/2025-05-14-russia-deltachat.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">merlinux.eu/press/2025-05-14-r</span><span class="invisible">ussia-deltachat.pdf</span></a> Russia sues the German company merlinux GmbH over Delta Chat, an email and <a href="https://mstdn.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> based <a href="https://mstdn.social/tags/Endtoendcrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Endtoendcrypto</span></a> messenger.</p>
andre<p>Seit einiger Zeit signiere ich meine Mails mit OpenPGP.</p><p>Oft kommt die Rückmeldung: "Ich kann die Anhänge nicht öffnen."</p><p>Das ist sehr schade. Ich hätte gehofft, dass auch nicht IT-Nerds es schaffen, den Anhang mit Endung .asc zu ignorieren oder eine Suchmaschine dafür anwerfen.</p><p>Das Problem würde sich übrigens lösen, wenn öffentliche Stellen, Ärzte, Versicherung etc. auch verschlüsselte Mails nutzen würden.</p><p><a href="https://social.tchncs.de/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> <a href="https://social.tchncs.de/tags/verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>verschlüsselung</span></a> <a href="https://social.tchncs.de/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a></p>
Heiko<p>I just released version 0.7.1 of <a href="https://floss.social/tags/rsop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsop</span></a>, a stateless <a href="https://floss.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> ("SOP") CLI tool based on <span class="h-card" translate="no"><a href="https://mastodon.social/@rpgp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rpgp</span></a></span>:</p><p><a href="https://crates.io/crates/rsop/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">crates.io/crates/rsop/</span><span class="invisible"></span></a></p><p>This version adds support for the "merge-certs" SOP command, which consolidates multiple versions of a certificate into a unified aggregate view.</p><p>For more on <a href="https://floss.social/tags/SOP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOP</span></a>, see <a href="https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/draft</span><span class="invisible">-dkg-openpgp-stateless-cli/</span></a></p><p><a href="https://floss.social/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a> <a href="https://floss.social/tags/GnuPG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GnuPG</span></a></p>
Delta Chat<p><span class="h-card" translate="no"><a href="https://det.social/@lostgen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lostgen</span></a></span> <span class="h-card" translate="no"><a href="https://sueden.social/@yuchungfink" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>yuchungfink</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>signalapp</span></a></span> pretty correct but it's not gpg, the old command line tool but an audited state-of-the-art rust implementation for <a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> encryption. It has never been vulnerable to the various past flaws in gpg.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://23.social/@alios" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alios</span></a></span> no, but besides <a href="https://infosec.space/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> there are compatible interpretations like <a href="http://github.com/life4/enc/" rel="nofollow noopener" target="_blank"><code>enc</code></a> that just work!</p><ul><li><span class="h-card" translate="no"><a href="https://mastodon.social/@cacert" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cacert</span></a></span> was the better <span class="h-card" translate="no"><a href="https://infosec.exchange/@letsencrypt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>letsencrypt</span></a></span> but the <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GAFAMs</span></a> cockblocked and actuvely sabotaged that by virtue of refusing to include the <a href="https://infosec.space/tags/CACert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CACert</span></a> Root-Certificate</li></ul>
alios<p>Are there any good alternatives to <a href="https://23.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> as gerneral purpose signature and encryption protocol thing with a "web of trust" idea in the back instead of hierarchical one like in <a href="https://23.social/tags/x509" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x509</span></a> ?</p><p><a href="https://23.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> does what it should do and i like packet approach. But imo it has become too complex in its try to stay backwards compatible an beeing "too generic" ...</p><p>just to be sure I'am not looking for an alternative to sign and encrypt emails but, a framework/protocol for distrib machine 2 machine communication</p>
Arch Linux :archlinux:<p>Automated digital signing of OS artifacts</p><p><a href="https://lists.archlinux.org/archives/list/arch-dev-public@lists.archlinux.org/thread/BOMYF4UTJJ37UIBXW52OU7WJTT3YPTKS/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lists.archlinux.org/archives/l</span><span class="invisible">ist/arch-dev-public@lists.archlinux.org/thread/BOMYF4UTJJ37UIBXW52OU7WJTT3YPTKS/</span></a></p><p><a href="https://fosstodon.org/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/RFC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RFC</span></a> <a href="https://fosstodon.org/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> <a href="https://fosstodon.org/tags/DigitalSignature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSignature</span></a> <a href="https://fosstodon.org/tags/Automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Automation</span></a> <a href="https://fosstodon.org/tags/Signstar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signstar</span></a> <a href="https://fosstodon.org/tags/NetHSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetHSM</span></a></p>
Gonçalo Valério<p>"CVE-2025-47934 – Spoofing OpenPGP.js signature verification"</p><p><a href="https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeanlabs.com/blog/research/c</span><span class="invisible">ve-2025-47934-spoofing-openpgp-js-signatures/</span></a></p><p><a href="https://s.ovalerio.net/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://s.ovalerio.net/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://s.ovalerio.net/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://s.ovalerio.net/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> <a href="https://s.ovalerio.net/tags/openpgpjs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgpjs</span></a></p>
Kushal Das :python: :tor:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@gerowen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gerowen</span></a></span> Now try to do the same with my <a href="https://toots.dgplug.org/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> library for <a href="https://toots.dgplug.org/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> please <a href="https://johnnycanencrypt.readthedocs.io/en/latest/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">johnnycanencrypt.readthedocs.i</span><span class="invisible">o/en/latest/</span></a> :)</p>
Delta Chat<p>Comparing <a href="https://chaos.social/tags/XMPP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XMPP</span></a> against <a href="https://chaos.social/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a> protocols is too limited. What sets <a href="https://chaos.social/tags/deltachat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deltachat</span></a> apart is *vertical integration* and being driven by UI/UX considerations. Cross-platform Apps and Bots use the Rust core library which connects with <a href="https://chaos.social/tags/chatmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chatmail</span></a> relays and classic email servers based on a higher level API -- abstracting over SMTP, MIME, <a href="https://chaos.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> etc. See <a href="https://chatmail.at" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">chatmail.at</span><span class="invisible"></span></a> </p><p><a href="https://chaos.social/tags/webxdc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webxdc</span></a> apps in turn use an even higher level stable API abstracting over email/xmpp/... see <a href="https://webxdc.org/docs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">webxdc.org/docs/</span><span class="invisible"></span></a></p>
Dimly Lit Corners<p>The PGP Problem </p><p><a href="https://www.latacora.com/blog/2019/07/16/the-pgp-problem/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">latacora.com/blog/2019/07/16/t</span><span class="invisible">he-pgp-problem/</span></a></p><p><a href="https://fosstodon.org/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> <a href="https://fosstodon.org/tags/GnuPG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GnuPG</span></a> <a href="https://fosstodon.org/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a> <a href="https://fosstodon.org/tags/GPG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPG</span></a> <a href="https://fosstodon.org/tags/PublicKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PublicKey</span></a> <a href="https://fosstodon.org/tags/Email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Email</span></a> </p><p><a href="https://fosstodon.org/tags/AgeEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgeEncryption</span></a> <a href="https://age-encryption.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">age-encryption.org</span><span class="invisible"></span></a><br><a href="https://fosstodon.org/tags/Minisign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Minisign</span></a> <a href="https://jedisct1.github.io/minisign/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">jedisct1.github.io/minisign/</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/AgePublicKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgePublicKey</span></a> <br>age1s3n5ehvm8h3xjkc985hzjznw9cv0lk9ezj5heyy4m7l654rkzslq07ylps</p><p><a href="https://fosstodon.org/tags/MinisignPublicKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MinisignPublicKey</span></a><br>RWRK8XFYuCHjYX1J/7cKCUy6eQKNYVAurb/70Q6pK8kjGHALVORZGJ+o</p>
Heiko<p>I just released version 0.1.2 of rsop-oct, a stateless <a href="https://floss.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> ("SOP") CLI tool for use with OpenPGP card hardware devices:</p><p><a href="https://crates.io/crates/rsop-oct/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">crates.io/crates/rsop-oct/</span><span class="invisible"></span></a></p><p>Like its sibling project <a href="https://floss.social/tags/rsop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsop</span></a>, rsop-oct is based on <span class="h-card" translate="no"><a href="https://mastodon.social/@rpgp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rpgp</span></a></span></p><p>This update makes integration with <a href="https://crates.io/crates/openpgp-card-state" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">crates.io/crates/openpgp-card-</span><span class="invisible">state</span></a> optional.</p><p>rsop-oct can now implicitly use persisted PINs via openpgp-card-state, or explicitly provided ones via the standard SOP CLI parameter '--with-key-password'.</p><p>For more on <a href="https://floss.social/tags/SOP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOP</span></a>, see <a href="https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/draft</span><span class="invisible">-dkg-openpgp-stateless-cli/</span></a></p><p><a href="https://floss.social/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a> <a href="https://floss.social/tags/GnuPG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GnuPG</span></a></p>
rPGP<p>New release: <a href="https://mastodon.social/tags/rPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rPGP</span></a> version 0.16.0 🧰🔐✨</p><p><a href="https://github.com/rpgp/rpgp/releases/tag/v0.16.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/rpgp/rpgp/releases/</span><span class="invisible">tag/v0.16.0</span></a></p><p><a href="https://mastodon.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> implemented in pure <a href="https://mastodon.social/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a>, permissively licensed</p><p>This release features streaming message support: Now rPGP can process arbitrarily large messages, with modest memory requirements.</p><p>It adds experimental support for the upcoming OpenPGP <a href="https://mastodon.social/tags/PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PQC</span></a> IETF standard <a href="https://datatracker.ietf.org/doc/html/draft-ietf-openpgp-pqc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/html/</span><span class="invisible">draft-ietf-openpgp-pqc</span></a></p><p>This release also brings various improvements for key generation, support for X448/Ed448, and many minor fixes.</p>
Delta Chat<p>our friends over at <span class="h-card" translate="no"><a href="https://mastodon.social/@rpgp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rpgp</span></a></span> just published a monster milestone, humbly tagged 0.16 😍 with </p><p>- streaming decryption and encryption</p><p>- post-quantum-cryptography </p><p>- API streamlining. </p><p><a href="https://chaos.social/tags/rPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rPGP</span></a> is a full Rust implementation of <a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> which counts among the fastest and most compliant implementations today, and includes security audits. Note: <a href="https://chaos.social/tags/deltachat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deltachat</span></a> uses a restricted subset of OpenPGP, and follows best practices (eg using the same ed25519 keys implementation as <a href="https://chaos.social/tags/signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>signal</span></a>) <a href="https://github.com/rpgp/rpgp/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/rpgp/rpgp/</span><span class="invisible"></span></a></p>
Delta Chat<p><span class="h-card" translate="no"><a href="https://social.sengotta.net/@bjoern" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bjoern</span></a></span> <span class="h-card" translate="no"><a href="https://fosstodon.org/@treefit" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>treefit</span></a></span> <span class="h-card" translate="no"><a href="https://ruhr.social/@chfkch" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>chfkch</span></a></span> you can send an <a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> encrypted email to a delta chat address, yes.</p>
George E. 🇺🇸♥🇺🇦🇵🇸🏳️‍🌈🏳️‍⚧️<p><span>[ theregister.com: Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms ]<br></span><a href="https://www.theregister.com/2025/05/20/openpgp_js_flaw/" rel="nofollow noopener" target="_blank">https://www.theregister.com/2025/05/20/openpgp_js_flaw/</a><span><br><br>Well fuck. </span><a href="https://bofh.social/tags/PGP" rel="nofollow noopener" target="_blank">#PGP</a> <a href="https://bofh.social/tags/OpenPGP" rel="nofollow noopener" target="_blank">#OpenPGP</a> <a href="https://bofh.social/tags/security" rel="nofollow noopener" target="_blank">#security</a> <a href="https://bofh.social/tags/vulnerabilities" rel="nofollow noopener" target="_blank">#vulnerabilities</a></p>
securityaffairs<p>A critical flaw in <a href="https://infosec.exchange/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a>.js lets attackers spoof message signatures<br><a href="https://securityaffairs.com/178131/uncategorized/a-openpgp-js-flaw-lets-attackers-spoof-message-signatures.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/178131/unc</span><span class="invisible">ategorized/a-openpgp-js-flaw-lets-attackers-spoof-message-signatures.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Flippin' 'eck, Tucker!<p>Somewhat concerning for anyone who uses Proton Mail: there is a flaw in the OpenPGP javascript library that they use (and are the maintainers for) which means that it's possible for spoofed authentication signatures to be created.</p><p><a href="https://www.theregister.com/2025/05/20/openpgp_js_flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/05/20/ope</span><span class="invisible">npgp_js_flaw/</span></a></p><p><a href="https://social.chatty.monster/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> <a href="https://social.chatty.monster/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://social.chatty.monster/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.chatty.monster/tags/Proton" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proton</span></a> <a href="https://social.chatty.monster/tags/ProtonMail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtonMail</span></a> <a href="https://social.chatty.monster/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a></p>