Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Pretty Good Privacy
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===== Symantec ===== On April 29, 2010, [[NortonLifeLock|Symantec Corp.]] announced that it would acquire PGP Corporation for $300 million with the intent of integrating it into its Enterprise Security Group.<ref>{{cite web |url=https://www.computerworld.com/s/article/9176121/Symantec_buys_encryption_specialist_PGP_for_300M |title=Symantec buys encryption specialist PGP for $300M |publisher=Computerworld |date=April 29, 2010 |access-date=2010-04-29 |archive-date=July 4, 2014 |archive-url=https://web.archive.org/web/20140704095759/http://www.computerworld.com/s/article/9176121/Symantec_buys_encryption_specialist_PGP_for_300M |url-status=live }}</ref> This acquisition was finalized and announced to the public on June 7, 2010. The source code of PGP Desktop 10 is available for peer review.<ref>{{cite web|url=https://www.symantec.com/connect/downloads/symantec-pgp-desktop-peer-review-source-code |archive-url=https://web.archive.org/web/20111116233448/http://www.symantec.com/connect/downloads/symantec-pgp-desktop-peer-review-source-code |url-status=dead |archive-date=November 16, 2011 |title=Symantec PGP Desktop Peer Review Source Code |publisher=Symantec.com |date=September 23, 2012 |access-date=2013-08-06}}</ref> In May 2018, a bug named [[EFAIL]] was discovered in certain implementations of PGP which from 2003 could reveal the plaintext contents of emails encrypted with it.<ref>{{cite web |url=https://arstechnica.com/information-technology/2018/05/critical-pgp-and-smime-bugs-can-reveal-encrypted-e-mails-uninstall-now/ |website=arstechnica.com |date=May 14, 2018 |title=Critical PGP and S/MIME bugs can reveal encrypted emails—uninstall now [Updated] |access-date=May 14, 2018 |archive-date=October 5, 2024 |archive-url=https://web.archive.org/web/20241005182854/https://arstechnica.com/information-technology/2018/05/critical-pgp-and-smime-bugs-can-reveal-encrypted-e-mails-uninstall-now/ |url-status=live }}</ref><ref>{{Cite web|url=https://efail.de/|title=EFAIL|website=efail.de|language=en-US|access-date=2018-05-18|archive-date=May 14, 2018|archive-url=https://web.archive.org/web/20180514100313/https://efail.de/|url-status=live}}</ref> The chosen mitigation for this vulnerability in PGP Desktop is to mandate the use [[SEIP]] protected packets in the ciphertext, which can lead to old emails or other encrypted objects to be no longer decryptable after upgrading to the software version that has the mitigation.<ref>{{Cite web|url=https://knowledge.broadcom.com/external/article/173613/cannot-decrypt-pgp-zip-files-created-wit.html|language=en-US|access-date=2021-10-18|title=Cannot decrypt PGP Zip files created with earlier releases of Encryption Desktop|archive-date=October 18, 2021|archive-url=https://web.archive.org/web/20211018095014/https://knowledge.broadcom.com/external/article/173613/cannot-decrypt-pgp-zip-files-created-wit.html|url-status=live}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)