Tech

An OpenPGP.js flaw just broke public key cryptography

Share
Share


  • There is a way to verify fake messages as if they were legitimate
  • The bug affects multiple versions of OpenPGP.js
  • A patch is available

A security flaw in the JavaScript implementation of OpenPGP.js allows threat actors to verify fake messages as if they were legitimate, essentially breaking public key cryptography. This is according to security researchers Edoardo Geraci and Thomas Rinsma of Codean Labs, who found and recently reported the vulnerability.

OpenPGP.js is an open-source JavaScript library that allows developers to encrypt, decrypt, sign, and verify messages using the OpenPGP standard. Normally, when a user signs a message digitally, it makes sure the content wasn’t tampered.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
How AI learns to read
Tech

How AI learns to read

Credit: Unsplash/CC0 Public Domain The language capabilities of today’s artificial intelligence systems...

Singapore turns skyscraper into a 250-million pixel canvas with projections that broke three world records
Tech

Singapore turns skyscraper into a 250-million pixel canvas with projections that broke three world records

Singapore’s skyline becomes a glowing canvas celebrating both national history and brand...

AMD’s budget server CPU just destroyed its old flagship, almost 3X faster and shockingly efficient
Tech

AMD’s budget server CPU just destroyed its old flagship, almost 3X faster and shockingly efficient

Benchmarks show AMD’s new EPYC 4005 series outperforming older eight-channel EPYC 7601...