GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forge ...……
作者:菜鸟教程小白
|
时间:2022-7-8 08:05
|
阅读:953
|
回复:0