GNOME Bugzilla – Bug 736756
seahorse leaks private information by using non-encrypted hkp protocol to keyservers
Last modified: 2014-09-17 07:02:52 UTC
Seahorse by default uses the hkp:// protocol, not hkps:// and thus leaks private information (retrieved keys, uploaded keys) and widens the attack surface for man-in-the-middle-attacks. This is a very bad idea.
This is a duplicate of bug #617383. That said, nobody seems to be actively working on that bug. If you would like to contribute towards fixing this, that would be very welcome. *** This bug has been marked as a duplicate of bug 617383 ***