PGP users,
I implemented a simple #efail exploit for Apple Mail, which is vulnerable to direct exfiltration with its default settings. The mitigation, disabling remote content, works but is brittle. So never click "Load Remote Content". (Thunderbird/Enigmail is vulnerable in a similar way, but I haven't tried that one yet.)
https://www.youtube.com/watch?v=_67Pz9zpPb0&feature=youtu.be
@micahflee That's really nicely done!
It would have been even more realistic if you'd actually included a remote image as well, so clicking the button would give the victim the warm fuzzy feeling of successfully loading a kitten over the Internet. Nothing happening is suspicious.
I suspect the ease of social engineering this is why the #EFF didn't just tell people to disable remote content.
Daniel (dkg) at the ACLU is one of the smarter people in the PGP world. He says some reasonable things about#EFail (and #EFFail) here: https://www.aclu.org/blog/privacy-technology/internet-privacy/encrypted-email-and-security-nihilism
Reading this, I get the feeling he's missing point 2) from my previous toot - how #EFail is particularly scary because Lazy User A can put Careful User B at risk.
In InfoSec, we're so used to thinking in an individualistic way about how we protect ourselves, I think we often fail to consider how our choices affect others.
@edavies Yes, I think he missed an important point.
His frame there is "I need to send confidential info, therefore..."
I am pointing out the framing of "I have received confidential information from others IN THE PAST, therefore..."
Different questions lead to different outcomes.
The EFF recommendation that everyone who can, temporarily disable decryption until things are more clear, is actually quite reasonable from the latter POV.
Just my opinion, of course. ๐
@HerraBRE Doesn't his โEcosystem concernsโ section cover your point 2 or are you thinking of something else?