Skip to main content

Deeplinks Blog

Deeplinks Blog

An envelope with a pained face. Its envelope has been ripped open, exposing the message.

PGP and EFAIL: Frequently Asked Questions

Researchers have developed code exploiting several vulnerabilities in PGP (including GPG) for email, and theorized many more which others could build upon. For users who have few—or even no—alternatives for end-to-end encryption, news of these vulnerabilities may leave many questions unanswered. Digital security trainers, whistleblowers, journalists, activists, cryptographers...


JavaScript license information