Tech

An OpenPGP.js flaw just broke public key cryptography

Share
Share


  • There is a way to verify fake messages as if they were legitimate
  • The bug affects multiple versions of OpenPGP.js
  • A patch is available

A security flaw in the JavaScript implementation of OpenPGP.js allows threat actors to verify fake messages as if they were legitimate, essentially breaking public key cryptography. This is according to security researchers Edoardo Geraci and Thomas Rinsma of Codean Labs, who found and recently reported the vulnerability.

OpenPGP.js is an open-source JavaScript library that allows developers to encrypt, decrypt, sign, and verify messages using the OpenPGP standard. Normally, when a user signs a message digitally, it makes sure the content wasn’t tampered.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
Metal fleeces boost battery energy density by enabling thicker, faster-charging electrodes
Tech

Metal fleeces boost battery energy density by enabling thicker, faster-charging electrodes

Today’s lithium-ion battery cells are very complex in their structure and manufacturing...

OpenAI recruits legendary iPhone designer Jony Ive to work on AI hardware in .5B deal
Tech

OpenAI recruits legendary iPhone designer Jony Ive to work on AI hardware in $6.5B deal

Jony Ive attend The Metropolitan Museum of Art’s Costume Institute benefit gala...

Study shows how EV manufacturers can reduce reliance on virgin rare earth minerals
Tech

Study shows how EV manufacturers can reduce reliance on virgin rare earth minerals

The electrification of vehicle transportation depends on availability of rare earth minerals....