中文字幕网伦射乱中文-超清中文乱码字幕在线观看-亚洲v国产v欧美v久久久久久-久久性网-手机在线成人av-成人六区-国产人与zoxxxx另类一一-青青草国产久久精品-蜜桃av久久久一区二区三区麻豆-成人av一区二区免费播放-在线视频麻豆-www爱爱-成人免费看片视频-性欧美老肥妇喷水-五月99久久婷婷国产综合亚洲-亚洲最色-各种含道具高h调教1v1男男-91丨porny丨国产-国产精品无码专区在线观看不卡-大香伊人

IT experts warn of loophole in email encryption systems

Source: Xinhua| 2018-05-15 03:28:25|Editor: Mu Xuequan
Video PlayerClose

BERLIN, May 14 (Xinhua) -- IT experts in Germany and Belgium have identified a dangerous security flaw in email encryption services, Sebastian Schnitzler, professor for computer safety at the Muenster Technical College, warned on Monday.

Writing on Twitter, Schnitzler drew attention to "critical weaknesses" in PGP/GPG and S/MIME email encryption services which threaten the security of personal information from hackers. Schnitzler said he and other researchers at the Ruhr University Bochum and KU Leuven (the Catholic University of Leuven) had discovered two pathways through which hackers could access the original text of encrypted emails.

The academics recommended to government authorities and companies to refrain from using the affected encryption services until updates were released which closed the loophole. Warnings of the security flaw have been widely-publicized in German media reports being called an "#Efail".

Reacting to the news on Monday, the German Federal Office for Information Security (BSI) highlighted, however, that "#Efail" only posed a threat to users of email encryption services under certain circumstances. In order to succeed, hackers needed to have prior access to the transport route, mail server or email post-box.

Additionally, the flaw is limited to cases where recipients have activated settings enabling the execution of HTML code and the re-loading of external content. As a consequence, PGP/GPG and S/MIME encryption services could still be used without concern as long as they were "correctly implemented" and "configured safely."

TOP STORIES
EDITOR’S CHOICE
MOST VIEWED
EXPLORE XINHUANET
010020070750000000000000011105091371789401