The Call of the Open Sidewalk

From a place slightly to the side of the more popular path

User Tools

Site Tools


pgpfan:wtmwp

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
pgpfan:wtmwp [2022/01/20 02:01] – Typos b.walzerpgpfan:wtmwp [2022/01/28 17:48] (current) – Was not accurate/logical in context. b.walzer
Line 82: Line 82:
 >Most of these issues are //not// exploitable unless you use PGP in a non-standard way, e.g., for [[http://box.matto.nl/gnupgjabber.html|instant messaging]] or online applications. >Most of these issues are //not// exploitable unless you use PGP in a non-standard way, e.g., for [[http://box.matto.nl/gnupgjabber.html|instant messaging]] or online applications.
  
-So which issues //are// exploitable if you use PGP in a non-standard way? We are left to guess. That allows me to simply wave away the whole thing by claiming that //none// of the issues are exploitable, which is the case here.+So which issues //are// exploitable if you use PGP in a non-standard way? How non-standard are we talking here? Obviously anything can be misused if you work at it hard enough. We are left to guess what is actually meant here. I could, but will decline.
  
 The now dead link suggests that the instant messaging system example is XMPP. Off the top of my head, there is nothing in the ways that PGP is currently used over XMPP that would make any of the listed attacks work. The now dead link suggests that the instant messaging system example is XMPP. Off the top of my head, there is nothing in the ways that PGP is currently used over XMPP that would make any of the listed attacks work.
pgpfan/wtmwp.txt · Last modified: 2022/01/28 17:48 by b.walzer