Page MenuHome GnuPG
Authored By
werner
May 15 2018, 4:12 PM
Size
49 KB
Dimensions
638px × 992px
Subscribers
None

gpg-nomdc.png

File Metadata

Mime Type
image/png
Attributes
Image
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
185325

Event Timeline

This is a screenshot I received in November. What is shows is that Enigmail got the error from gpg and displays an error. However, the plaintext is also displayed (the garbled stuff) and would thus trigger the explot. But first the user has to agree to it (the blue TB warning). So this screenshot actually shows that the exploit did not work.

However, TB allows to override this warning not only global but also per sender. Thus if the sender was whitelisted the back channel could be used. The defaults are different and in the efaul paper they should have listed this as "with user consent".