An OpenPGP.Js defect has just broken the public key cryptography




  • There is a way to verify false messages as if they were legitimate
  • The error affects multiple versions of OpenPGP.js
  • A patch is available

A safety failure in the implementation of JavaScript of OpenPGP.JS allows threat actors to verify false messages as if they were legitimate, essentially breaking the public key cryptography. This is according to security researchers Edoardo Geraci and Thomas Rinsma de Codean Labs, who found and recently reported vulnerability.

OpenPGP.JS is an open source JavaScript library that allows developers to encrypt, decipher, sign and verify messages using the OpenPGP standard. Normally, when a user sign a message digitally, ensures that the content was not manipulated.

Leave a Comment

Your email address will not be published. Required fields are marked *