The wide use of open-mail open source technology enables hackers to crack digital signatures and get mail content. The problem is how to protect your e-mail messages from being compromised through the GNU Privacy Guardian. If GPG (GPG is a set of toolset for secure communication and data storage that can be encrypted and digitally signed) is not properly used, it is not possible to obtain security recognition from the information. It is entirely possible to insert additional information before and after the data is encrypted, and it is safe to mistake the user for the data. Using cryptographic techniques to authenticate or encrypt e-mail messages is quite dangerous. Some open mail sources may be affected, according to a new report. The main affected include: KDE ' s KMail, Novell's Evolution, Sylpheed, Mutt and gnumail.org. The Security Research Center says the growing of Mozilla mail users can also pose a threat to mail. It is noteworthy that this is not only a cryptographic problem, in addition to adding some additional information to the message, hackers can use the anti-spam mechanism to reveal the user's information. GnuPG is a GNU tool that guarantees data transmission and storage security and can be used to encrypt and create digital signatures. Mail uses a variety of OPENPGP protocols, not all of which need to be encrypted and signed, and the mail program is not completely secure so far. "When you are prompted that your message has been encrypted or signed, there are actually some files that are not securely set." The GNUPG research group published the latest articles to protect the encrypted information from tampering. After this security patch is generated, the hacker will not be able to get mail messages. The Enigmail software is now updated. Core published an article to help users detect and protect mail users. "Responsible editor: Snowflake TEL: (010) 68476606-8008" to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) by the original: encryption technology can effectively prevent the message from leaking back to the network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.