The published examples for exploiting the EFAIL email encryption vulnerability all appear to use HTML to create a backchannel for exfiltrating decrypted data.
However, the homepage of EFAIL, https://efail.de/ , claims:
Short term: Disable HTML rendering. [...]
Note that there are other possible backchannels in email clients which are not related to HTML but these are more difficult to exploit.
As far as I can see, all the published examples rely on loading of remote content (i.e. things linked from an HTML mail, such as images or CSS).
So:
- Why is it recommended to completely disable HTML rendering? Would it not be enough to disable loading of remote content (which is the default in most modern mail programs anyway)?
- What other backchannels are there which are "not related to HTML"? Did the authors elaborate on this somewhere?