Tech

An OpenPGP.js flaw just broke public key cryptography

Share
Share


  • There is a way to verify fake messages as if they were legitimate
  • The bug affects multiple versions of OpenPGP.js
  • A patch is available

A security flaw in the JavaScript implementation of OpenPGP.js allows threat actors to verify fake messages as if they were legitimate, essentially breaking public key cryptography. This is according to security researchers Edoardo Geraci and Thomas Rinsma of Codean Labs, who found and recently reported the vulnerability.

OpenPGP.js is an open-source JavaScript library that allows developers to encrypt, decrypt, sign, and verify messages using the OpenPGP standard. Normally, when a user signs a message digitally, it makes sure the content wasn’t tampered.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
Anthropic’s new Claude 4 models promise the biggest AI brains ever
Tech

Anthropic’s new Claude 4 models promise the biggest AI brains ever

Anthropic has debuted two new Claude AI models named Claude Opus 4...

Rooftop solar and EV batteries could supply 85% of Japan’s electricity needs
Tech

Rooftop solar and EV batteries could supply 85% of Japan’s electricity needs

Credit: Unsplash/CC0 Public Domain A new study led by Tohoku University has...

A new approach could fractionate crude oil using much less energy
Tech

A new approach could fractionate crude oil using much less energy

MIT engineers developed a membrane, pictured, that filters the components of crude...