commit: 357e867d8c535dc311e03cf647e75968d910f2f6
parent 7753fe691139166b1ab95bcf5c51b7182a19f1c2
Author: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
Date:   Thu,  7 Mar 2019 03:08:40 +0100
articles/Pretty Bad Privacy: <pre/> on RFC4880
Diffstat:
2 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/articles/Pretty Bad Privacy.xhtml b/articles/Pretty Bad Privacy.xhtml
@@ -9,7 +9,7 @@
 </dl>
 <h2>OpenPGP standard</h2>
 <p>The OpenPGP standard mandates that some ciphers must be present in the implementation, they are now broken and well known to be. (<abbr title="As Far As I Remember">AFAIR</abbr> it’s stuff like SHA1, 3DES, …).</p>
-<blockquote>
+<blockquote><pre>
 9.1.  Public-Key Algorithms
 
 ID           Algorithm
@@ -65,8 +65,7 @@ ID           Algorithm                             Text Name
 100 to 110 - Private/Experimental algorithm
 
 Implementations MUST implement SHA-1.  Implementations MAY implement
-other algorithms.  MD5 is deprecated.
-</blockquote><cite><a href="https://tools.ietf.org/html/rfc4880">RFC4880</a>, November 2007</cite>
+other algorithms.  MD5 is deprecated.</pre></blockquote><cite><a href="https://tools.ietf.org/html/rfc4880">RFC4880</a>, November 2007</cite>
 <p>It leaks a pile of metadata (time, implementation name+version, …)</p>
 <p>There is no deniability possible, there is quite a difference between no-authentication and deniability, to be elaborated on</p>
 <p>Your public key/identity <strong>will</strong> end up on the keyservers at some point, no exception.</p>
diff --git a/feed.atom b/feed.atom
@@ -14,7 +14,7 @@
 		<link rel="alternate" type="text/html" href="/articles/Pretty%20Bad%20Privacy"/>
 		<id>https://hacktivis.me/articles/Pretty%20Bad%20Privacy</id>
 		<published>2019-03-07T01:00:04Z</published>
-		<updated>2019-03-07T01:54:33Z</updated>
+		<updated>2019-03-07T02:08:40Z</updated>
 		<content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
 <!--#include file="/articles/Pretty Bad Privacy.xhtml"-->
 		</div></content>