[Gpg4win-commits] [git] Gpg4win - branch, website, updated. gpg4win-2.1.0-387-g48977ff

by Andre Heinecke cvs at cvs.gnupg.org
Wed May 23 08:32:14 CEST 2018


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "GnuPG for Windows".

The branch, website has been updated
       via  48977ff4eef037d48f4ff7995cec7646bb35831b (commit)
      from  92cc0a6b7a874ff63f766a328fd0efccf82d985a (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 48977ff4eef037d48f4ff7995cec7646bb35831b
Author: Andre Heinecke <aheinecke at intevation.de>
Date:   Wed May 23 08:31:32 2018 +0200

    efail: minor formatting improvement and typo fix

diff --git a/web/statement-efail.htm4 b/web/statement-efail.htm4
index 2efcec1..96738ab 100644
--- a/web/statement-efail.htm4
+++ b/web/statement-efail.htm4
@@ -58,7 +58,7 @@ tricks the email client into sending decrypted plaintext
 to a webserver of choice, when fetching the references.</p>
 <p>As this attack works on the sender and all recipients of an encrypted email,
 all the used email clients have to be safe for your communication to be safe.</p>
-<p><strong>Advise: Make sure to only send encrypted emails to people that
+<p><strong><p>Advice:</p> Make sure to only send encrypted emails to people that
 are using clients in a safe way. Put special attention to the vulnerable
 clients listed in the bottom of efail.de until fixed versions are widely
 available.</strong>
@@ -67,12 +67,12 @@ responsible for you, e.g.
 <a href="https://cert-bund.de/advisoryshort/CB-K18-0673">CB-K18-0673 (Germany)</a>
 and their <a href="https://www.bsi.bund.de/EN/Service/Information/article/efail_vulnerabilities_14052018.html">"Efail" vulnerabilities - What you should know now</a>
 or <a href="https://www.kb.cert.org/vuls/id/122919">VU#122919 (USA)</a>.</p>
-<p>Note:</p>
-<ul><li>Each communication partner already had the responsibility
-  to keep contents coming from you confidential on an organisational and
-  technical level. Right now some may just not be informed about the version
-  of their product being vulnerable to this specific attack.
-</li></ul>
+<p><b>Note:</b></p>
+   Each communication partner already had the responsibility
+   to keep contents coming from you confidential on an organisational and
+   technical level. Right now some may just not be informed about the version
+   of their product being vulnerable to this specific attack.
+
 
 <h3>"crypto gadget" attack</h3>
 <p>If an email is only encrypted and not signed, an attacker can

-----------------------------------------------------------------------

Summary of changes:
 web/statement-efail.htm4 | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)


hooks/post-receive
-- 
GnuPG for Windows
http://git.gnupg.org



More information about the Gpg4win-commits mailing list