An OpenPGP.JS defect has just broken the cryptography of the public key


  • There is a way to check false messages as if they were legitimate
  • The bug affects several versions of openpgp.js
  • A patch is available

A security defect in the JavaScript implementation of OpenPGP.JS allows threat actors to verify false messages as if they were legitimate, essentially breaking the cryptography of public key. This is according to the security researchers Edoardo Geraci and Thomas Rinsma of Codean Labs, who found and recently reported the vulnerability.

OpenPGP.JS is a JavaScript Open Source library which allows developers to encrypt, decrypt, sign and check messages using the OpenPGP standard. Normally, when a user signs a message digitally, he makes sure that the content has not been falsified.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top