home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   MOBILE      I think its to discuss tablet/app stuff?      945 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 890 of 945   
   August Abolins to All   
   .   
   27 Apr 23 08:42:00   
   
   MSGID: 2:221/1.58@fidonet 07d3e0eb   
   PID: OpenXP/5.0.57 (Win32)   
   CHRS: ASCII 1   
   TZUTC: -0400   
      
   cc: INTERNET, MOBILE, SECURITY, SN_INTEL   
      
   > https://www.kuketz-blog.de/mailbox-org-entdeckt-    
   unverschluesselte-passwortuebertragung-in-mymail/   
   >   
   > Severe safety issue in mymail app found.   
      
      
   Google Translate yields --   
      
    mailbox.org discovers unencrypted password transmission in myMail   
      
   The mailbox.org team recently discovered a critical   
   vulnerability in the myMail client for iOS, which leads to   
   unencrypted transmission of user passwords and emails.   
      
   mailbox.org became aware of the problem after customers pointed   
   out transmission errors in the user forum that occurred when   
   sending emails via the myMail client. After examining the logs,   
   the team found that the myMail app was attempting to transmit   
   passwords without the otherwise required TLS encryption . After   
   the connection was established, the app did not send the usual   
   STARTTLS-Kommando, but instead continued to transmit the user's   
   unencrypted login data. This enabled mailbox.org to extract or   
   read the passwords from the connection logs.   
      
   According to Peer Heinlein, managing director of mailbox.org,   
   their e-mail servers consistently reject such unencrypted   
   connections in order to ensure user security. This is the only   
   reason why the connection attempts of the myMail app failed, so   
   that users and postmasters of mailbox.org were taken aback.   
      
   This problem is not only relevant for mailbox.org customers: It   
   also represents a general security risk for all users who use   
   the myMail client. Content and passwords can be read and tapped   
   by third parties, especially if the users are in an open   
   network (e.g. WiFi airport, train, etc.). If other providers   
   allow unencrypted connections and are used in connection with   
   the current version of the myMail app, attackers can also read   
   the content of the unencrypted e-mails.   
      
   Therefore, mailbox.org strongly recommends not using the myMail   
   client in connection with their service or other e-mail   
   providers until the developers of the app have fixed the   
   security problems. There are numerous alternative email clients   
   that offer higher security standards and protect privacy   
   better. At the same time, the current incident once again   
   underlines the importance of communicating exclusively via   
   systems that are configured securely and enforce encryption.   
      
      
   --- OpenXP 5.0.57   
    * Origin:  (2:221/1.58)   
   SEEN-BY: 10/0 1 15/0 103/705 106/201 124/5016 153/757 7715 203/0 218/0   
   SEEN-BY: 218/1 700 221/1 6 360 226/30 227/114 229/110 112 113 307   
   SEEN-BY: 229/317 426 428 470 664 700 240/1120 266/512 280/464 292/854   
   SEEN-BY: 292/8125 301/1 310/31 317/3 320/219 341/66 234 396/45 423/81   
   SEEN-BY: 460/58 633/280 712/848 2320/105   
   PATH: 221/1 280/464 103/705 218/700 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca