{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:3LCHMNYDTYUJDPHUCDPPBCPQVV","short_pith_number":"pith:3LCHMNYD","schema_version":"1.0","canonical_sha256":"dac47637039e2891bcf410def089f0ad517e318e7c5b1b2edf12b80aaf462d0e","source":{"kind":"arxiv","id":"1904.07550","version":2},"attestation_state":"computed","paper":{"title":"Re: What's Up Johnny? -- Covert Content Attacks on Email End-to-End Encryption","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Damian Poddebniak, Jens M\\\"uller, J\\\"org Schwenk, Marcus Brinkmann, Sebastian Schinzel","submitted_at":"2019-04-16T09:28:06Z","abstract_excerpt":"We show practical attacks against OpenPGP and S/MIME encryption and digital signatures in the context of email. Instead of targeting the underlying cryptographic primitives, our attacks abuse legitimate features of the MIME standard and HTML, as supported by email clients, to deceive the user regarding the actual message content. We demonstrate how the attacker can unknowingly abuse the user as a decryption oracle by replying to an unsuspicious looking email. Using this technique, the plaintext of hundreds of encrypted emails can be leaked at once. Furthermore, we show how users could be trick"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1904.07550","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-04-16T09:28:06Z","cross_cats_sorted":[],"title_canon_sha256":"7d8fcbda797d3dfde567d7b7a94e49a8bdcb22118016f60c0af2ee306805d216","abstract_canon_sha256":"b5096acf687aa36f20740961e00fb22432d359a75c13f28add86c5cd29926f69"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:48:19.555456Z","signature_b64":"5VfUknLi2ym4QRzedVWNO/r5fSqpY3TvSMR3PohCm45cvGJAQXfGQ9blxOAxnsx91C7s691lSLDK5/XbjpMrBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"dac47637039e2891bcf410def089f0ad517e318e7c5b1b2edf12b80aaf462d0e","last_reissued_at":"2026-05-17T23:48:19.554906Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:48:19.554906Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Re: What's Up Johnny? -- Covert Content Attacks on Email End-to-End Encryption","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Damian Poddebniak, Jens M\\\"uller, J\\\"org Schwenk, Marcus Brinkmann, Sebastian Schinzel","submitted_at":"2019-04-16T09:28:06Z","abstract_excerpt":"We show practical attacks against OpenPGP and S/MIME encryption and digital signatures in the context of email. Instead of targeting the underlying cryptographic primitives, our attacks abuse legitimate features of the MIME standard and HTML, as supported by email clients, to deceive the user regarding the actual message content. We demonstrate how the attacker can unknowingly abuse the user as a decryption oracle by replying to an unsuspicious looking email. Using this technique, the plaintext of hundreds of encrypted emails can be leaked at once. Furthermore, we show how users could be trick"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1904.07550","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1904.07550","created_at":"2026-05-17T23:48:19.554991+00:00"},{"alias_kind":"arxiv_version","alias_value":"1904.07550v2","created_at":"2026-05-17T23:48:19.554991+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1904.07550","created_at":"2026-05-17T23:48:19.554991+00:00"},{"alias_kind":"pith_short_12","alias_value":"3LCHMNYDTYUJ","created_at":"2026-05-18T12:33:07.085635+00:00"},{"alias_kind":"pith_short_16","alias_value":"3LCHMNYDTYUJDPHU","created_at":"2026-05-18T12:33:07.085635+00:00"},{"alias_kind":"pith_short_8","alias_value":"3LCHMNYD","created_at":"2026-05-18T12:33:07.085635+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV","json":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV.json","graph_json":"https://pith.science/api/pith-number/3LCHMNYDTYUJDPHUCDPPBCPQVV/graph.json","events_json":"https://pith.science/api/pith-number/3LCHMNYDTYUJDPHUCDPPBCPQVV/events.json","paper":"https://pith.science/paper/3LCHMNYD"},"agent_actions":{"view_html":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV","download_json":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV.json","view_paper":"https://pith.science/paper/3LCHMNYD","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1904.07550&json=true","fetch_graph":"https://pith.science/api/pith-number/3LCHMNYDTYUJDPHUCDPPBCPQVV/graph.json","fetch_events":"https://pith.science/api/pith-number/3LCHMNYDTYUJDPHUCDPPBCPQVV/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV/action/timestamp_anchor","attest_storage":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV/action/storage_attestation","attest_author":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV/action/author_attestation","sign_citation":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV/action/citation_signature","submit_replication":"https://pith.science/pith/3LCHMNYDTYUJDPHUCDPPBCPQVV/action/replication_record"}},"created_at":"2026-05-17T23:48:19.554991+00:00","updated_at":"2026-05-17T23:48:19.554991+00:00"}