This post has been rewritten throughout to make clear that the MAC-bypass vulnerability allows attackers to append pseudorandom data to encrypted attachments. It doesn’t allow attackers to choose the ...