[HN Gopher] A Schism in the OpenPGP World
___________________________________________________________________
 
A Schism in the OpenPGP World
 
Author : todsacerdoti
Score  : 88 points
Date   : 2023-12-07 09:03 UTC (13 hours ago)
 
web link (lwn.net)
w3m dump (lwn.net)
 
| 1letterunixname wrote:
| If they want to jump the shark by crashing GnuPG into a
| compatibility reef, I won't be upgrading. "Don't break shit" is
| the first rule.
| 
| PS: Photon hosting private keys is, to me, a nonstarter. It makes
| their entire platform and investment in GPG pointless.
 
  | dale_glass wrote:
  | > "Don't break shit" is the first rule.
  | 
  | It's not an important rule if security is your primary concern.
  | Because if you "don't break shit", the first thing any
  | adversary will do is to try downgrade things until an old,
  | insecure state.
  | 
  | The way to counteract that is to refuse to downgrade, which
  | obviously breaks shit if one of the sides can't speak the new
  | protocol.
 
| jwr wrote:
| On a somewhat related note: GnuPG gets plenty of hate from the
| crypto crowd for being "obsolete" and insecure.
| 
| I would humbly propose that before you go telling everyone to
| stop using gpg, implement something that works, builds, and that
| doesn't break after 6 months or so. I've been using gpg for what,
| 20 years now? And recently (as in, three or four years ago)
| started using it with private keys stored on YubiKeys (using
| drduh's excellent guide). I also use it for symmetric encryption.
| It works. It doesn't break. It gets things done, and while I'm
| not secure from state-sponsored hackers, all this is infinitely
| better than no encryption.
| 
| Rage for example, is not in that category -- I added it to my
| ansible automation as a test, and it broke after several months.
 
  | OfSanguineFire wrote:
  | When the crypto crowd complains about PGP being obsolete, they
  | don't just knock PGP, they very often mention alternatives. One
  | of the most frequent recommendations is instead of using
  | ordinary email and trying to bolt PGP onto it with individual
  | contacts, use an encrypted messenger. I have been using Signal
  | for four years now with the same install moved from phone to
  | phone, and it has worked just fine. I can chat with my friends
  | and relatives with E2E encryption, while I could have never got
  | them to use PGP at all.
  | 
  | [0] https://moxie.org/2015/02/24/gpg-and-me.html
 
    | dig1 wrote:
    | > When the crypto crowd complains about PGP being obsolete,
    | they don't just knock PGP, they very often mention
    | alternatives
    | 
    | Those alternatives have different use cases compared to
    | (open)PGP. So, Moxie said GPG is too complicated? If Signal
    | goes down, how long will it take you to spin up your instance
    | of server and clients, ready for delivery? How much would
    | cost running reliably that infra? For email and GPG, I can
    | get everything in 15-20 minutes, including registering the
    | DNS name, DKIM, and SPF. I can also sign documents, images,
    | and invoices with GPG; in short, I can do business. What can
    | I do with Signal: chat, send nice emojis, and make calls?
    | 
    | Proper security and encryption isn't a toy, and let's not kid
    | ourselves by skinning apps with shiny buttons and cool claims
    | that everything people have done before sucks.
 
      | OfSanguineFire wrote:
      | If you are concerned about digital document signing, then
      | that is a different use case from the OP who speaks of
      | encryption and being "[not] safe from state-sponsored
      | hackers". For digital signing, business sectors like e.g.
      | banking rely on PDF e-signatures[0], not PGP.
      | 
      | [0] https://www.adobe.com/sign/hub/how-to/how-banks-use-
      | electron...
 
        | dig1 wrote:
        | "digital signing" in banking sector means something
        | completely different than PGP-like "digital signing".
        | PGP-like digital signatures can be applied on any
        | document and file and you can easily validate the author
        | by their public key and can't be easily forged.
 
        | OfSanguineFire wrote:
        | Your post said "documents, images, and invoices" and
        | "business". In the real world, documents and invoices in
        | business are overwhelmingly sent in PDF format. Even
        | images get embedded in PDFs a lot of the time. PDF
        | e-signatures can be validated, the technology is based on
        | very standard crypto with FOSS implementations. Fine if
        | you have a different workflow that requires PGP, but most
        | people clearly don't feel it is impossible to "do
        | business" otherwise.
 
        | dig1 wrote:
        | > In the real world, documents and invoices in business
        | are overwhelmingly sent in PDF format
        | 
        | In your real world, probably. In actual real world,
        | people use MS Word/Excel (or LibreOffice) and images a
        | lot, beside PDF. Good luck using e-signatures with that
        | :)
 
        | BeetleB wrote:
        | > In the real world, documents and invoices in business
        | are overwhelmingly sent in PDF format
        | 
        | This is evasive and dismissive. When your parent is
        | talking about the issue, there's a good chance he is
        | already using it. Telling him what "the real world" does
        | is irrelevant. He has a use case already, and needs a
        | solution for _his_ use case, not for the rest of the
        | world.
 
        | OfSanguineFire wrote:
        | Almost every time on HN that there is a discussion of
        | changes in technology that experts would argue are
        | overall good, there is always someone who says "But that
        | would break my use case!" This even got lampooned at
        | xkcd[0]. OK, I understand that he finds this trend
        | vexing. But no party to this discussion is obliged to
        | spend their time and effort on suggesting a solution,
        | especially when we don't know his specifics and our
        | suggestion might simply be rejected out of hand.
        | 
        | [0] https://xkcd.com/1172/
 
        | BeetleB wrote:
        | Except when it comes to GnuPG, you have to realize:
        | 
        | 1. Many, many people used it, and continue to do so.
        | 
        | 2. The anti GnuPG crowd keeps coming and touting
        | alternatives, and then complain when the people in the
        | prior bullet point out the impracticality of the
        | alternatives for their use case.
        | 
        | We get that GnuPG has issues. We get that sometimes the
        | alternatives are better. We can coexist with them. People
        | simply don't understand that for a number of tasks, GnuPG
        | is totally appropriate, and solves the problem with
        | little pain.
 
      | tptacek wrote:
      | The alternatives are generally far better than email, which
      | is why normal people (and most of us) get so little email
      | these days. My email accounts have more life as a
      | transaction recording system for online shopping than they
      | do for interpersonal communication. Email has largely been
      | superseded. That alarms nerds like us, the way it alarmed
      | people when HTTP superseded purpose-built network
      | protocols, but there is a losing side of this argument, and
      | it's the side that is still using Mutt.
 
    | phone8675309 wrote:
    | Are you aware of any other widely deployed, stable tools that
    | meet the other uses cases from the parent comment?
 
    | denton-scratch wrote:
    | Got it:
    | 
    | "There's a technical issue with email encryption, but we have
    | a solution: don't use email! instead, use this different
    | protocol, that doesn't work with email clients or email
    | addresses, but instead uses a telephone number as an
    | identifier!"
    | 
    | I've never tried Signal, because I don't want my telephone
    | number used as my identifier.
    | 
    | A bug in email encryption can be fixed by fixing the bug;
    | proposing a completely different protocol/application isn't
    | fixing that bug, it's just saying that this other
    | protocol/application doesn't have the same bug. It's not a
    | solution; at least, not for me.
 
      | SAI_Peregrinus wrote:
      | The biggest bug in email encryption is that important
      | message data & metadata can't be encrypted for SMTP to
      | work. It's a bug in email, and there's no backwards
      | compatible fix.
 
      | dale_glass wrote:
      | It's a pity, but email never was designed for security, and
      | you can't graft it on.
      | 
      | GPG doesn't really do much for security, because a lot can
      | be told from simply who communicates with who and when, and
      | GPG does absolutely nothing there.
 
      | jcranmer wrote:
      | This is like asking how to drive across the ocean and
      | getting mad when someone tells you that you need to take a
      | boat.
      | 
      | Email just fundamentally isn't encryptable; the protocol
      | and the way it actually works in practice (hi, antispam!)
      | requires that important parts of the email not be
      | encrypted, and things like asynchronous communication make
      | it difficult to do encryption to the gold standard of
      | quality. Also, turning on encrypted email also disables
      | several email features from the perspective of the user
      | (hope you didn't want to search your emails!). The end
      | result is that email encryption is, as someone else put it,
      | LARPing rather than security.
      | 
      | There are a few very narrow use cases for which encrypted
      | email may make sense (largely in cases where you're not
      | concerned about hiding the existence of communication
      | channels, just message contents, and you can do out-of-band
      | public key communication). But notice that those use cases
      | don't include "I want to message someone else securely,"
      | and it's definitely not someone that would work if you
      | tried to let regular users do it.
 
        | denton-scratch wrote:
        | > things like asynchronous communication make it
        | difficult to do encryption to the gold standard of
        | quality.
        | 
        | I agree. Thing is, asynchronous communication is a killer
        | feature. My primary communications channel is email, but
        | I don't use encrypted email.
        | 
        | I _do_ use GPG, but not for email.
 
        | xoa wrote:
        | Even to the extent that's true (and a lot of it is not),
        | none of that explains why there are absolute zero email
        | replacements, and indeed "security" people seem to
        | promptly display brain damage whenever the idea is
        | brought up. "Email-like" doesn't mean it has to be actual
        | current standard email, there could be an "xmail" that
        | has a UX near exactly like email but is more modern. But
        | instant messengers (let alone centralized ones) are not a
        | replacement for email and never will be, and the stubborn
        | idiotic insistence they are is as surprising as it is
        | infuriating. If you insist it's security or email, the
        | answer is email, and that's how very important
        | information will continue to be sent.
        | 
        | Although that said, and while not disagreeing about its
        | flaws, I still can't let entirely go by:
        | 
        | > _the protocol and the way it actually works in practice
        | (hi, antispam!)_
        | 
        | But anti-spam works fine with encrypted email (putting
        | aside practicalities of no forging making spam harder
        | anyway).
        | 
        | > _asynchronous communication make it difficult to do
        | encryption to the gold standard of quality_
        | 
        | Nobody gives a shit. Asynchronous communication is well
        | worth it.
        | 
        | > _hope you didn 't want to search your emails!_
        | 
        | lol wut? If I go into Mail and searching something it can
        | include encrypted emails the same as whatever else, why
        | wouldn't it?
 
        | tptacek wrote:
        | There are, obviously, replacements for email. Most of us
        | get a tiny fraction of the email we did just 10 years ago
        | because so much has moved out of email and into other
        | messaging systems. The faulty logic being used here is
        | that there is nothing _shaped precisely like email_ to
        | replace email, and, of course, there never will be.
 
        | 38529977thrw wrote:
        | None of this explains why I need to give you my telephone
        | number to get on your boat.
        | 
        |  _Identity_ is the core of the matter and that is
        | invariant of the modes of transport. On top of that comes
        | key management. On top of that you can build your secure
        | application on whatever platform.
        | 
        | Total end to end encryption can only be built on top of
        | _identity_ and never (ever) on a specific channel. And
        | TE2E should be the social goal.
 
      | petre wrote:
      | Wire uses the Signal protocol and your e-mail address or a
      | username as your identifier. But you still depend on
      | somebody else's infrastructure. We probably want XMPP with
      | OTR or OMEMO.
 
    | lucideer wrote:
    | There's plenty of competition in the IM space for E2E
    | realtime chat; none are positioning themselves as an
    | alternative to email.
    | 
    | > _they don't just knock PGP, they very often mention
    | alternatives_
    | 
    | What alternatives do they mention?
 
    | jwr wrote:
    | That solution won't let me encrypt my backups, I think.
    | 
    | Incidentally, Signal is another example of an impractical
    | solution being pushed without consideration for practical
    | requirements. Signal will LOSE ALL YOUR DATA if your phone
    | (iOS) dies. There is no way to backup your chat history and
    | images. It's been like that for years and we get silly
    | features instead of this fundamental thing.
    | 
    | Yes, I know many people like it this way -- you are in the
    | minority, and there should be a configuration switch saying
    | "do not backup my data". Most people do not expect that their
    | entire history will be gone one day. Phones die, phones get
    | stolen, and you expect you'll get your history and photos
    | back when restoring from an (encrypted!) backup. Not so with
    | Signal. So the next time you tell people to use Signal over
    | WhatsApp, don't forget to tell them that Signal will lose
    | everything one day, while WhatsApp will not.
    | 
    | Back to my original point: before anyone knocks "old
    | obsolete" apps, consider carefully if the new shiny thing
    | really does everything that the "old obsolete" app did, is it
    | reliable, maintained, and will it stay around for 10+ years.
 
      | skovati wrote:
      | Signal does have offline backup support though?
      | 
      | https://support.signal.org/hc/en-
      | us/articles/360007059752-Ba...
 
        | jwr wrote:
        | It does not on iOS, and the webpage you linked to
        | specifically states that.
 
      | jraph wrote:
      | > Signal will LOSE ALL YOUR DATA if your phone (iOS) dies
      | 
      | I'm seeing this often on HN.
      | 
      | While it's a pain, it is not impractical. Most people don't
      | care about this. They don't come back in time in the
      | conversations.
      | 
      | If you really care about this. Like, you care that much.
      | Just pair Signal Desktop and make a regular backup of your
      | profile. All your messages and attachments are there. If
      | your Signal ever gets borked, you can always put your
      | machine offline and open Signal-Desktop on this backed-up
      | folder. You can also open the db with sqlcipher and access
      | all you data with it, the scheme is not too complicated to
      | grasp.
      | 
      | Ask me how I know.
      | 
      | And since Signal is open source, you can always read its
      | code in case of doubt. Someone could build a convenient UI
      | to display or export the messages and attachments in a
      | user-friendly format. This can happen after the backup is
      | done and Signal breaks.
      | 
      | All this said, people may expect privacy when using Signal,
      | so make sure your backups are well protected. This is the
      | hard part, actually.
 
        | jwr wrote:
        | I think you are confirming my point. "without
        | consideration for practical requirements"
        | 
        | I can tell you that my daughter cared about this. She
        | cried for a long time when her phone just suddenly died
        | (while charging, no reason, total loss) and her Signal
        | history wasn't restored. I couldn't explain why Signal
        | was the only app that didn't get backed up.
        | 
        | I can tell you that my friend's parents cared about this.
        | The photos of their grandkids were suddenly gone. My
        | fried couldn't explain the reason for this, all the other
        | data did get backed up.
        | 
        | And sure, between us geeks we will keep saying "well
        | ACTUALLY they SHOULD HAVE kept the photos elsewhere", and
        | we'll say "this is good because it makes us more secure"
        | and we'll say "most people don't care about this". We'll
        | all "well actually" ourselves, while patting ourselves on
        | the backs.
        | 
        | And they'll just switch to WhatsApp.
 
        | jraph wrote:
        | > I think you are confirming my point. "without
        | consideration for practical requirements"
        | 
        | I don't think I am. A practical answer is: "Install
        | Signal Desktop".
        | 
        | And I still think we are few who care about chat history.
        | I'm sure there are people who care. I'm such a person.
        | 
        | It's also only a missing feature for iOS user, so that
        | makes it: "of the few people who care about chat history,
        | the minority of people who use iOS are only covered by
        | installing Signal Desktop". A pain for these users, but
        | they have at least two workable solutions. Using Android
        | or installing Signal Desktop somewhere. (yes, caveat, you
        | need to do that before losing your phone)
        | 
        | By yes, I agree that it would be better to have the
        | backup feature.
 
        | dig1 wrote:
        | > I don't think I am. A practical answer is: "Install
        | Signal Desktop".
        | 
        | IMHO this is not always practical. Signal Desktop can
        | easily get out of sync if you change versions and the
        | only proper way to fix it is to clear all the local data,
        | including your chat/contact database. AFAIK, the only
        | source of truth is your phone.
 
    | OhMeadhbh wrote:
    | I'm not sure I want to route all my email through my mobile
    | phone.
    | 
    | Though yes... it's more secure than SMS.
 
  | klooney wrote:
  | Why rage and not the canonical age?
 
  | knorker wrote:
  | I've been using GPG for about as long, and I've had problems
  | with it.
  | 
  | They've used some cipher, was it IDEA, than then got removed.
  | So then I had to hunt down years old versions in order to be
  | able to extract my old backups.
  | 
  | Or was that more of a PGP than GPG problem, and I misremember?
 
  | curiousq wrote:
  | I don't understand cryptography, and I don't understand the
  | particulars of the concerns that people have with GnuPG. I do
  | know I've used it maybe once, and it wasn't straightforward.
  | 
  | You wrote: "I would humbly propose that before you go telling
  | everyone to stop using gpg, implement something that works,
  | builds, and that doesn't break after 6 months or so."
  | 
  | Keybase did some stuff and got tons of users. It even had a
  | command-line client. It was all open source, too. Is there any
  | reason that the crypto old guard hasn't just shamelessly copied
  | Keybase? The most important being: its CLI (the design, not
  | necessarily the implementation) and the overall "shape" of the
  | project organization/structure. Why hasn't gpg been "uplifted"
  | into a Keybase-shaped "shell" for people to interact with? I.e.
  | at both the tool level and at the collaborative project level?
  | 
  | RMS came from the AI lab working on Lisp machines. Despite
  | this, he recognized that a UNIX-shaped project was the correct
  | vehicle for his vision, given its growing popularity. Why
  | haven't the GPG folks given up on trying force people to do
  | things their traditional way and attached their cart to a horse
  | that has legs?
 
| henriquez wrote:
| "Merge and decist" - these are some strong words. Particularly
| when the previous paragraphs called for a de-escalative approach
| and a meeting of minds. I don't see how public admonishment could
| possibly be productive towards the stated goals.
 
  | sleepless wrote:
  | Did you read through the linked issue in total?
 
    | robertlagrant wrote:
    | It's obviously hard to judge from the outside, but the linked
    | issue conversation definitely casts the reviewer in a bad
    | light.
 
      | sumtechguy wrote:
      | From what I can tell there are some new changes that may
      | break backwards compat with stuff. One group wants that
      | resolved the other does not think it is that big of deal.
      | Something like this that goes back to the early 90s and
      | thousands of random unknown number of installed
      | clients/servers. backwards compat is probably something to
      | look into and properly deal with?
 
        | robertlagrant wrote:
        | Sure, but I'm not talking about that. I mean the one
        | sentence responses to carefully thought out messages, the
        | feet-dragging, etc etc, and each response being
        | Brazil[0]-like nothing to do with the previous ones which
        | were responded to.
        | 
        | [0] https://www.imdb.com/title/tt0088846
 
| sleepless wrote:
| Nice writeup.
| 
| It is a serious problem that the ecosystem is held back by
| wasting resources on personal disputes with immediate
| consequences for end users.
| 
| Hate on OpenPGP all you want, it still is an important technology
| with unrealized potential and growth.
 
  | femiagbabiaka wrote:
  | It's not actually clear from reading through this document or
  | others, or the linked email threads, etc. that there is a
  | personal dispute at play, or what that might be. I'm also not
  | sure who the target of this document is, or who wrote it. It's
  | also not clear what the forcing function behind the strong
  | recommendations at the end is -- will the author fork GnuPG in
  | the event a resolution can't be reached?
 
  | freedomben wrote:
  | It doesn't sound like a personal dispute to me, it sounds
  | technical. One camp (Open) wants to move faster and break
  | backward compatibility, the other (Libre) wants to move slower
  | and maintain backwards compatibility
 
    | daveguy wrote:
    | It seems like maintaining backwards compatibility would be
    | important for something that otherwise irreversibly encrypts
    | your data.
 
      | woodruffw wrote:
      | The correct way to maintain backwards compatibility in
      | those contexts is to decrypt and re-encrypt, not support
      | broken ciphers or weak modes of encryption indefinitely.
      | The latter is security theater.
 
        | bbarnett wrote:
        | No.
        | 
        | There is 100% value in being able to decrypt a 20 year
        | old email. It doesn't matter if it is a broken cypher.
        | 
        | A 20 year old email has very little actionable in it, but
        | can have value in other ways.
        | 
        | It is absolutely vital that a project like this, supports
        | some means for a modern machine/stack to access older
        | data.
 
        | tptacek wrote:
        | This is silly. Nothing that happens with the standard or
        | its implementation is going to prevent you from
        | decrypting a 20 year old email. It shouldn't need saying,
        | but one reason for that is that PGP's cryptography is
        | schoolbook cryptography.
 
        | bbarnett wrote:
        | _This is silly_
        | 
        | Upstream spoke of deprecated support for older emails. My
        | response is aimed there.
        | 
        | And there is loads of software that will not compile on
        | modern hardware. End users don't often have that ability
        | to re-write, or even to easily validate a random bit of
        | code on github.
        | 
        | A project like this, needs to maintain backwards
        | operability. For decades.
 
        | tptacek wrote:
        | Once again: this is silly, because whatever conversation
        | we are having about the standard, your ability to decrypt
        | old messages would not have been impacted. Standard
        | revisions don't turn the previous standard into secret
        | forbidden knowledge.
        | 
        | What's really being asked for here is the capability to
        | seamlessly continue sending messages with the previous,
        | weak constructions, into the indefinite future, and have
        | the installed base of the system continue seamlessly
        | reading them. I think that is in fact a goal of PGP, and
        | one of its great weaknesses.
 
        | kazinator wrote:
        | When standards remove the requirements for something
        | after a period of obsolescence, that tends to send a
        | message to the implementors to remove that from the
        | software.
        | 
        | Users who still rely on that have to use the old
        | software, against which there can be barriers:
        | 
        | - old executables don't run on newer OS (particularly in
        | the Unix world).
        | 
        | - old source code won't build.
        | 
        | - old code won't retrieve the old data from the newer
        | server it has been migrated do.
        | 
        | Things like that.
        | 
        | The barriers could be significant that even someone
        | skilled and motivated such as myself would be
        | discouraged.
 
        | Avamander wrote:
        | > Users who still rely on that have to use the old
        | software, against which there can be barriers
        | 
        | Not all reliance is reasonable though.
        | 
        | Some legacy software can only do SSLv3 or lower, does
        | that mean the rest of the internet has to carry that
        | support around? Abso-f-lutely not.
        | 
        | The same applies here. If you really need that ancient
        | stuff that loses support, repackage them in newer
        | encryption or remove the obsolete layer. It's highly
        | probable that information no longer needs to stay
        | encrypted at rest anyways.
 
        | kazinator wrote:
        | In my opinion, the Internet should not be removing
        | support for older SSL. The highest SSL version that is
        | common to server and client should always be used.
 
        | woodruffw wrote:
        | > The highest SSL version that is common to server and
        | client should always be used.
        | 
        | That _is_ how it works. What you 're missing is that
        | everyone, both servers and clients, agrees that
        | supporting old SSL versions is a bad idea. And they're
        | right.
 
        | kazinator wrote:
        | Since I don't agree, it cannot be everyone.
        | 
        | More precisely, I don't agree with web clients not
        | connecting to old servers.
 
        | asveikau wrote:
        | A read-only operation should not cause an insane amount
        | of writes. This is perilous for a great many reasons, one
        | of which is the risk of data corruption should something
        | go wrong.
 
        | woodruffw wrote:
        | You're thinking about this the wrong way: if your data
        | _needs to be secure_ , then it's _already_ perilous to
        | keep it around with with weak or broken encryption.
        | Security models where data is too important to risk
        | encryption upgrades but not important enough to encrypt
        | correctly are internally incoherent.
        | 
        | (This is sidestepping the other parts of the comment that
        | don't make sense, like why a single read implies multiple
        | writes or why performing cryptographic upgrades is
        | somehow uniquely, unacceptably risky from a data
        | corruption perspective.)
 
        | asveikau wrote:
        | No, I think you're thinking about it the the wrong way:
        | write failures are common. The failure mode for a bad
        | disk is often that reads will succeed and writes will
        | lose data. Something that silently writes like this is
        | increasing the risk of data loss.
        | 
        | It probably depends a lot on the application, but I think
        | it's often much better to have something that will warn
        | the user about security risks and let them decide what to
        | do with that risk. If you do design something with these
        | silent writes, you absolutely need to think hard about
        | failure cases and test them, and not handwave them away.
        | Having the most "secure" data be corrupted is ultimately
        | an unacceptable outcome.
        | 
        | That's not even getting into the other problems, such as
        | ... is it ok for the user to take a performance hit of
        | writing X GB when all they want to do is read a file?
 
        | woodruffw wrote:
        | Your cryptosystem is not responsible for the stability of
        | your storage medium, and your storage medium is not
        | responsible for the security of your cryptosystem. They
        | are black boxes to each other; to confound their
        | responsibilities is to ensure doom in your designs.
        | 
        | Put another way: your cryptosystem isn't responsible for
        | saving your ass from not making backups. If your data is
        | valuable, treat it that way.
 
        | asveikau wrote:
        | > Your cryptosystem is not responsible for the stability
        | of your storage medium, and your storage medium is not
        | responsible for the security of your cryptosystem
        | 
        | This is exactly why your crypto system should not rely on
        | spontaneously writing many gigabytes on a read operation,
        | without asking. I couldn't have said it better myself.
        | 
        | What you are advocating is crypto intruding on the
        | storage mechanism inappropriately. It's a layer
        | violation.
        | 
        | I think if it's important to the end user, you could
        | write fairly decent code at the app layer that
        | asynchronously re-encrypts old data in a way that doesn't
        | harm the user. That code would need to have a strategy
        | for write failures. A basic cryptography tool should
        | probably not have this as a built-in feature however, for
        | a few reasons including those I've stated.
 
        | woodruffw wrote:
        | > This is exactly why your crypto system should not rely
        | on spontaneously writing many gigabytes on a read
        | operation, without asking.
        | 
        | Again: nobody has said this.
        | 
        | Whether or not the tool does this in bulk, or
        | asynchronously, or whatever else is not particularly
        | important to me. The only concern I have in this
        | conversation is whether it's contradictory to
        | simultaneously assert the value of some data _and_ refuse
        | to encrypt it correctly. Which it is.
 
      | panarky wrote:
      | I read the article and couldn't find any hint that
      | previously encrypted data would be undecryptable by either
      | branch of the fork.
      | 
      | Is there a real risk of this that I missed, or are you just
      | free-associating off the term "backwards compatibility"?
 
        | daveguy wrote:
        | The article specifically refers to backward compatibility
        | with RFC4880, RFC5581, and RFC6687. These specifications
        | include encryption techniques. So no. I was not just
        | "free associating". Please do not assume the worst,
        | because it could be that you just haven't understood the
        | implications of the article.
 
      | Nextgrid wrote:
      | On the other hand, as long as earlier versions or their
      | sources remain available, it doesn't sound like a major
      | problem to me. The sources would effectively be
      | documentation for the previous format and can be
      | reimplemented if needed.
 
  | nvy wrote:
  | I think the common refrain against PGP is that it _shouldn 't
  | be_ important, because it suffers from a myriad of technical
  | and sociological shortcomings.
  | 
  | The whole situation regarding key servers, key rotation, and
  | the web of trust is a complete dumpster fire.
 
| exabrial wrote:
| The most valuable feature of PGP is establishment of a long term
| online identity bound to a set of keys.
| 
| That is perhaps what all of these replacement schemes fail to
| realize.
| 
| I really wish "Login with PGP" was a thing and use a subkey for
| each website, with optional ability to hide the identity of a
| particular website in my own keychain. You know, sorta like
| passkeys, but I don't have to have Google/Apple/etc involved and
| I can actually inspect the magic behind the scenes.
 
  | tptacek wrote:
  | This is a perfect encapsulation of the gulf between PGP
  | enthusiasts and cryptography engineers, because this "long term
  | online identity" attribute is not only one of PGP's biggest
  | misfeatures just in an implementation and design sense, but
  | also a devastating weakness of the system for its most
  | important intended application (exchanging messages between
  | humans). PGP's key management system is literally the last
  | thing you want in a messaging system.
 
    | rodlette wrote:
    | > also a devastating weakness of the system for its most
    | important intended application (exchanging messages between
    | humans). PGP's key management system is literally the last
    | thing you want in a messaging system.
    | 
    | Strong words, but why?
 
    | exabrial wrote:
    | It's a devastating weakness only if you use it in a very
    | certain manner.
 
  | woodruffw wrote:
  | > The most valuable feature of PGP is establishment of a long
  | term online identity bound to a set of keys.
  | 
  | PGP doesn't do this: PGP key has a _claimant_ identity, but
  | actually verifying that claimant is left to the end user. That
  | 's why the WoT and strong set were important (before they
  | violently collapsed, revealing that they weren't load bearing
  | after all).
  | 
  | Other schemes do realize this, and it's why they make tradeoffs
  | around trusted parties (CAs in the Web PKI performing domain
  | validation, EV for code-signing, etc.).
 
    | jcranmer wrote:
    | > That's why the WoT and strong set were important (before
    | they violently collapsed, revealing that they weren't load
    | bearing after all).
    | 
    | I hadn't heard they violently collapsed; do you have any
    | links where I can learn more about this?
 
      | morelisp wrote:
      | https://inversegravity.net/2019/web-of-trust-dead/
      | 
      | https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d69
      | 5...
      | 
      | Also, as someone who went to a few signing parties: the
      | strong set was probably never as strong as some people
      | thought.
 
  | ElectricalUnion wrote:
  | > "Login with PGP" was a thing and use a subkey for each
  | website
  | 
  | How well would such sites handle PGP subkey revocation? What
  | about PGP key revocation?
  | 
  | Revocation is very important if your key is compromised.
  | 
  | I haven't seen any really maintained pgp keyserver or service
  | in general that didn't directly or indirectly (by user/agent
  | mistake) fail spectacularly since https://evil32.com/ was
  | released and contaminated the 32bit key id space.
 
| ISV_Damocles wrote:
| Is anyone else kinda hoping that GPG/PGP loses enough respect in
| the tech community that something fresh comes along that really
| solves a lot of the UX and security issues they have? (Acquiring
| keys, rotating keys, identifying compromised keys, and most
| importantly either reaches a large enough percentage of emails
| sent that usage of it is not in itself an immediate flag to
| monitor or can be implemented as a side channel not directly
| including the signature in the email payload itself.)
 
  | Avamander wrote:
  | > Acquiring keys, rotating keys, identifying compromised keys,
  | and most importantly either reaches a large enough percentage
  | of emails sent that usage of it is not in itself an immediate
  | flag to monitor or can be implemented as a side channel not
  | directly including the signature in the email payload itself.
  | 
  | You are describing S/MIME?
 
    | ISV_Damocles wrote:
    | Kinda. But S/MIME has its own problems[0], mostly related to
    | you as a recipient being unable to choose who is authorized
    | to send you encrypted email (and so spam and malware filters
    | don't work).
    | 
    | On top of that, GPG and S/MIME's support of encrypted-at-rest
    | email is, imo, a fool's errand. Handing a payload of data to
    | a third party that the recipient can eventually query to
    | retrieve makes it much easier to grab a hold of and try to
    | decrypt in the future. The same is true of SSL to an extent,
    | but SSL traffic is much more voluminous, such that saving all
    | of it to eventually crack and decide if there's anything
    | worthwhile in it is unlikely.
    | 
    | The only real way to transfer private data between two users
    | is to do it live with an ephemeral channel, whether that's
    | in-person or via SSL or etc. The only value I see in GPG and
    | friends is in verifying authenticity of the contents -
    | signing the email - not encrypting those contents. Email has,
    | and always will be, an open protocol, for better or worse.
    | 
    | [0]: https://en.wikipedia.org/wiki/S/MIME#Obstacles_to_deploy
    | ing_...
 
      | Avamander wrote:
      | > mostly related to you as a recipient being unable to
      | choose who is authorized to send you encrypted email (and
      | so spam and malware filters don't work).
      | 
      | That's a problem with all encryption anyways. Inspection
      | has to be done at the end-user's device. So I don't think
      | it's fair to hold that against S/MIME.
      | 
      | > On top of that, GPG and S/MIME's support of encrypted-at-
      | rest email is, imo, a fool's errand.
      | 
      | If it can be done with E2EE messaging apps, sure it can be
      | done with email. Long-term storage is a really difficult
      | problem anyways.
      | 
      | > The only value I see in GPG and friends is in verifying
      | authenticity of the contents - signing the email - not
      | encrypting those contents. Email has, and always will be,
      | an open protocol, for better or worse.
      | 
      | To some extent I agree. An ubiquitous deployment of digital
      | signatures would already solve a bunch of problems and most
      | of the rest are handled by transport encryption.
 
        | ISV_Damocles wrote:
        | > That's a problem with all encryption anyways.
        | Inspection has to be done at the end-user's device. So I
        | don't think it's fair to hold that against S/MIME.
        | 
        | I don't think that has to be the case, though. Protocol
        | negotiation is a thing; SSL negotiating the version of
        | the protocol to use, HTTP 1.1 -> 2.0 negotiation, etc.
        | 
        | You could imagine a mail protocol that _starts_ at an
        | encryption level, then during the negotiation process
        | when the mail-to-be-delivered provides a public key, the
        | recipient server can check that key against a listing of
        | keys accepted by the user, and if not included, attempt
        | to negotiate _down_ to an unencrypted version of the
        | email.
        | 
        | The sender of the email could choose to not allow that
        | downgrade and get an undeliverable mail error, or they
        | could choose to allow the downgrade to plain text/html
        | email. This could then be run through the standard
        | spam/malware filtering as usual and the spam eliminated,
        | while email that came from already trusted email can skip
        | those filters because the user has already judged them
        | worthy of accepting _and_ keeping the communication
        | private.
        | 
        | So I don't think that's an intrinsic difficulty of all
        | encryption schemes for email, but...
        | 
        | > If it can be done with E2EE messaging apps, sure it can
        | be done with email. Long-term storage is a really
        | difficult problem anyways.
        | 
        | So first I'll state that I don't think all E2EE messaging
        | apps reach the following bar, either, but the difference
        | between an ephemeral SSL-encrypted communication channel
        | and an email, fundamentally, is that the ephemeral
        | channel won't be written to a disk somewhere, while the
        | email will.
        | 
        | The window in which it is possible to get a copy, and the
        | difficulty in obtaining it, is much more in favor of
        | secrets staying secret in the ephemeral channel than it
        | is in encrypted email. The data payload persists longer,
        | and is likely encrypted by the same private key across
        | many emails, so getting the emails and getting the keys
        | are much easier than with the ephemeral channel that
        | generates a temporary set of keys on each connection and
        | never persists any of it to disk (so storing the
        | communication with the hope of eventually grabbing the
        | keys from the user's machine by virus or social
        | engineering or just plain ol' physical theft doesn't even
        | make any sense the same way GPG-encrypted email does).
 
  | chimeracoder wrote:
  | > Is anyone else kinda hoping that GPG/PGP loses enough respect
  | in the tech community that something fresh comes along that
  | really solves a lot of the UX and security issues they have?
  | 
  | This already exists. It's just not a single, all-in-one tool -
  | the answer is to use a tool that's fit for the specific purpose
  | you're trying to accomplish (secure messaging, encrypted
  | backups, encrypting application data, etc.)
  | 
  | There is not, and never will be, a modern one-size-fits-all
  | approach because the entire industry has moved on from that
  | model - over the last 30 years, we (collectively) have learned
  | that it's inherently insecure to design a tool to do so many
  | disparate things and expect people to use it correctly each
  | way.
 
    | krageon wrote:
    | All of these use cases are encrypting files, some of them
    | with a few extra steps as sauce. Stuff like whatsapp / signal
    | is the exact UX that GPG has, fixed by instead ignoring
    | everything that's hard (trust). The asymmetric cryptography
    | is not fundamentally novel or interesting, and the end result
    | of it could be applied to literally anything if they allowed
    | you to touch your own things (which they don't). These modern
    | solutions are build on the infantilisation of their own
    | users, nothing else.
 
      | tptacek wrote:
      | That's exactly the wrong way to look at it. Everything is
      | potentially a file, but not all cryptosystems have the same
      | use cases. The needs of message encryption (forward and
      | future secrecy, for instance) are not at all like the needs
      | of backup encryption (deduplication, for instance). This is
      | one of the biggest things wrong with the PGP model of
      | retrofitting cryptography onto problems, and why it has
      | virtually never been successful at any of them.
 
  | nextaccountic wrote:
  | > something fresh
  | 
  | It exists, it's called age..
  | 
  | Some random links
  | 
  | https://github.com/FiloSottile/age
  | 
  | https://www.reddit.com/r/crypto/comments/hr64hr/state_of_age...
  | 
  | https://github.com/FiloSottile/age/discussions/432
  | 
  | > (Acquiring keys, rotating keys, identifying compromised keys,
  | and most importantly either reaches a large enough percentage
  | of emails..
  | 
  | Oh nevermind, age doesn't do any of that. Indeed, it doesn't
  | even do email https://github.com/FiloSottile/age/issues/93
 
    | eterps wrote:
    | 'age' is really impressive, it's helped me get a better grasp
    | on GPG.
    | 
    | I'm not joking, it's genuinely user-friendly, and I certainly
    | prefer it over GPG.
    | 
    | Interestingly, its simplicity makes everything about GPG
    | suddenly make more sense.
 
    | Zizizizz wrote:
    | Age is excellent. Fast and easy for anyone to grasp
 
  | berkes wrote:
  | I think it already has. Maybe not the underlying tech, but
  | certainly for encrypt emails.
  | 
  | But I think the outcome of this is not "something fresh" but
  | rather "giving up on the idea of encrypted emails altogether".
  | We have far superior communication channels that are secure,
  | easy and private today (Signal, Matrix, WhatsApp, iMessage);
  | That problem is solved. Storing emails secure and encrypted is
  | solved too, by providers such as protonmail, fastmail, tutanota
  | and many others.
  | 
  | So what does GPG/PGP really solve still?
  | 
  | The one use-case that I strongly see it shine, is where mail-
  | notifications are signed. I've only ever seen Kraken do this:
  | Upload my GPG/PGP pub key in their web-interface, and have them
  | sign and encrypt mails to me with that. It very much solves
  | phishing and MITM on email-notifications (and password reset
  | mails and such). Comes with two serious problems though: the UX
  | on my client-end still sucks; e.g. I never managed to set-up
  | PGP on my android client, so I cannot read their mails from my
  | phone. "subject: Login attempt from X" body: garbled. And
  | generation and rotation of the keys is as frustrating as ever.
  | It certainly is not a feature for "my mom".
 
    | ISV_Damocles wrote:
    | I think we agree[0] on this. Email encryption isn't ever
    | going to be a thing because of the way email itself works.
    | But email signing would help a lot. I still don't think GPG
    | does this very well, though, because of issues with key
    | rotation/invalidation/etc.
    | 
    | [0]: https://news.ycombinator.com/item?id=38557771
 
      | arp242 wrote:
      | I wish it would just use TOFU ("trust on first use") by
      | default. It's not 100% fool-proof, but actually does cover
      | a large number of use-cases, and is certainly better than
      | nothing.
      | 
      | UI:                 "billing@paypal.com: we never seen this
      | sender before, be careful"            "billing@paypal.com:
      | this is verified to be the same sender"
      | "billing@paypal.com: ACHTUNG! THIS IS SOMEONE ELSE"
      | 
      | You can of course still manually add keys, and you can even
      | do automatic or semi-automatic key rotation with some new
      | header (e.g. "X-New-Key: [...]" that's signed with the
      | old).
 
        | woodruffw wrote:
        | > You can of course still manually add keys, and you can
        | even do automatic or semi-automatic key rotation with
        | some new header (e.g. "X-New-Key: [...]" that's signed
        | with the old).
        | 
        | Headers aren't part of an encrypted or authenticated
        | body, so this is trivial to perform a key replacement
        | attack against.
 
        | arp242 wrote:
        | Or MIME part, or change the spec to include some headers
        | (I thought it did?) - that's not an important detail
        | here.
 
        | mschuster91 wrote:
        | > Headers aren't part of an encrypted or authenticated
        | body, so this is trivial to perform a key replacement
        | attack against.
        | 
        | DKIM can be leveraged for that, although DKIM is one hell
        | of a gun to give someone to shoot themselves.
 
        | morelisp wrote:
        | DNS records aren't part of the encrypted or authenticated
        | channel, so SSH is trivial to perform a key replacement
        | attack against?
 
        | woodruffw wrote:
        | Sorry, is this a rhetorical question? I thought the fact
        | that SSH does TOFU was (somewhat) common knowledge, which
        | is why it spits out all kinds of scary MITM warnings when
        | a host fingerprint changes.
        | 
        | If you're connecting to an SSH server for the first time
        | and don't already have a pre-established host
        | fingerprint, then yes: someone who controls your server's
        | DNS records can redirect you to another SSH host, which
        | you'll then (presumably) enter your password into.
 
    | ekTHEN wrote:
    | I'm using FairEmail [0] as a client on Android which supports
    | PGP and i am quite happy with it.
    | 
    | [0] https://email.faircode.eu/
 
    | d0mine wrote:
    | Is it a coincidence that the tech you mentioned includes CIA
    | honeypots e.g., protonmail?
    | 
    | gnupg looks like something that actually can keep your
    | secrets (at rest, otherwise a less-likely-to-backdoored
    | convenient option is Telegram).
 
      | esafak wrote:
      | Are you sure? Please share your evidence. https://www.reddi
      | t.com/r/ProtonMail/comments/14demhj/debunki...
 
        | uselpa wrote:
        | A random Reddit post is hardly evidence. My personal
        | opinion is that they sell snake oil (a.k.a. secure
        | email).
 
        | d0mine wrote:
        | when you are dealing with the trillion dollar war
        | propaganda machine any link one might provide will be
        | drown out by noise "debunking" it.
        | 
        | Do your own research. I found the initial links on hacker
        | news.
 
        | esafak wrote:
        | What links?
 
      | Valodim wrote:
      | I'm not sure what you were trying to say here about
      | telegram, but they are completely unencrypted, for nearly
      | all intents and purposes messages are stored in plaintext
      | on the server. They just succeeded impressively in twisting
      | that fact away via marketing.
 
    | thayne wrote:
    | > (Signal, Matrix, WhatsApp, iMessage);
    | 
    | None of which are anywhere close to as ubiquitous as email.
    | None of which are well suited to long messages. Only one of
    | those (matrix) is federated. Only one (matrix) wasn't
    | designed specifically for use on mobile devices. Yes, the
    | others can be used on a desktop, but the experience isn't
    | great.
 
      | tptacek wrote:
      | Hold on, there's a sleight of hand here. You're trying to
      | compare _all of email_ against WhatsApp. Now, it 's
      | possible that if you took transactional email out of the
      | picture, and just stuck with interpersonal communication,
      | WhatsApp could beat email. But that doesn't matter, because
      | in this discussion, the figure of merit is _encrypted
      | email_ , and on that metric, every single one of those
      | platforms on their own roflstomps email for daily usage.
 
        | viccuad wrote:
        | Only Matrix is federated, like email. I really enjoy
        | sending emails without opening an account for each
        | recipient or being subservient to 1 stack provider for 50
        | years, with all the inbreeding that entails.
 
  | krageon wrote:
  | There have been many attempts, usually formed by ignoring the
  | inherent difficulty of creating secure communications while
  | fundamentally being the exact same UX as GPG. It's genuinely
  | incredibly tedious to see there is a new "alternative" and find
  | out once again folks are over-promising and under-delivering.
 
  | zlg_codes wrote:
  | I think if there was interest in it there would be multiple
  | OpenPGP implementations.
  | 
  | Most people don't even care about security. You can't protect
  | people who won't care to protect themselves.
 
    | WesolyKubeczek wrote:
    | They exist, albeit not 1:1 compatible in all aspects. That
    | one in Thunderbird, Sequoia.
 
      | zlg_codes wrote:
      | I'm just saying, I've used and tried to get people to
      | practice WoT with OpenPGP on the order of a decade or more.
      | There simply isn't a demand for protected communications
      | because normies haven't started suffering at the hands of
      | government for online shenanigans yet.
      | 
      | After a while, you sort of _want_ bad things to happen so
      | society will move forward... Humans are so reticent to act
      | to protect themselves from a threat they don 't see or
      | understand the capabilities of.
 
        | Ar-Curunir wrote:
        | normies use encrypted communication way more than the
        | cumulative historical usage of GPG or PGP; Signal,
        | WhatsApp, iMessage, and now Facebook messenger all offer
        | better privacy for the average person than GPG or PGP
        | ever did, and are used by orders of magnitude more
        | people.
 
  | brnt wrote:
  | When some muas announced Autocrypt support a few years ago I
  | got excited again, but unfortunately nothing came of it. I
  | havent been able to auto-update my key on my partner's mua, it
  | seemed 'support' meant different things to different projects
  | but none focused on the goal: making PGP encrypted email usable
  | (and more secure).
 
    | Valodim wrote:
    | Yeah we really had a shot there.
    | 
    | There was a year or two where I actually began to receive
    | autocrypt headers from random people and started encrypting
    | with them.
    | 
    | Unfortunately, this momentum was completely killed by
    | thunderbird, who decided to remove support and proceed to
    | reimplement traditional manual email encryption :(
 
  | orthecreedence wrote:
  | > something fresh comes along that really solves a lot of the
  | UX and security issues they have?
  | 
  | I'm working on this! It's called Stamp (https://stamp-
  | protocol.github.io/) and takes a lot of the issues I've had
  | with PGP/GPG and creates a more modern refresh. It's definitely
  | not _simple_ but my hope is that having sane defaults and
  | writing good interfaces will help with this.
  | 
  | Unfortunately it just went through a rearchitecting and the
  | docs are horribly out of date, but the basic concept persists.
  | In the current version instead of having different hardcoded
  | key types (alpha, publish, etc), there's now the concept of
  | "admin keys" and "policies." Policies decide what keys can do
  | what as far as managing the identity, so it's possible for
  | instance to have a policy that gives a key god powers, or a
  | policy that sayd "if three of these four signatures match, the
  | entire key and policy set can be replaced" (aka, multisig
  | recovery machanisms). Also, in the current version, "forwards"
  | have been entirely removed and replaced by claims.
  | 
  | The goal is to use this as a means to act as an identity in p2p
  | systems. My issue with p2p systems is that they always punt on
  | identity, making it a function of your device and some randomly
  | generated keypair. That said, Stamp can definitely be used more
  | generally.
  | 
  | Right now I'm focusing on the underlying network that syncs
  | identities between devices and also stores identities publicly,
  | circumventing the need for keyservers and all that stuff.
 
| Tistron wrote:
| I've been using GPG to symmetrically encrypt most of my secrets,
| like OPT seeds and stuff like that, and then save it in some
| accessible places.
| 
| Just yesterday I was frustrated that gpg didn't work very well in
| my terminal for some reason (the barrier between entering the
| data and the password was weirdly permeable, i.e. sometimes some
| of my password ended up in the data, and more often a lot of what
| I pasted ended up in the password prompt).
| 
| So I found openpgp.js and made a little website where i can
| encrypt and decrypt my secrets.
| 
| I used that particular library because it feels safe that the
| things I have encrypted can be decrypted with a tool that is
| accessible everywhere... as long as I can remember the passwords
| :)
| 
| But I wonder, are the defaults for symmetric encryption in
| openpgp not considered safe anymore, or how should i interpret
| some of the other comments here?
 
  | upofadown wrote:
  | ...are the defaults for symmetric encryption in openpgp not
  | considered safe anymore, ...
  | 
  | That would be AES. The traditional OpenPGP authenticated
  | encryption (OCFB-MDC) is secure. There has been some widespread
  | misunderstanding, I wrote a rambling editorial against the idea
  | of superseding the block cipher mode:
  | 
  | * https://articles.59.ca/doku.php?id=pgpfan:no_new_ae
 
| woodruffw wrote:
| Serious question: does this matter? The PGP key ecosystem is
| microscopic in 2023, and is actively atrophying. Consensus among
| cryptographers is that PGP hasn't reflected _anything close_ to
| acceptable cryptographic design in decades, and its lack of
| adoption in serious tools and products reflects that.
| 
| Without a serious use case hanging in the balance, this is just
| OSS drama.
 
  | computerenjoyer wrote:
  | Yes, it does matter. PGP is by far the most common standard for
  | signatures used in software distribution (Git tags, RPM
  | packages, Yum repos, Deb repos, ad-hoc signature schemes,
  | etc.), and nothing else is particularly close in terms of
  | number of signatures verified per day. While the absolute
  | number of verifications is a lot lower than it could be, there
  | is still substantial inertia behind these current standards,
  | including US government standards.
  | 
  | I am also aware that you are actively involved in moving
  | ecosystems away from PGP and towards solutions in the Sigstore
  | ecosystem, so this is definitely not news to you. I understand
  | you want the situation to change, but for now it's disingenuous
  | to pretend like GPG in particular doesn't have the super
  | majority of "market" share around signatures and that drama
  | like this wouldn't have potential impact to a lot of folks.
 
    | tptacek wrote:
    | How, exactly, would this (waves around at current drama)
    | impact a lot of folks? Can you be specific about it?
 
    | woodruffw wrote:
    | > Yes, it does matter. PGP is by far the most common standard
    | for signatures used in software distribution
    | 
    | No, that would be bespoke PKIs on various proprietary OSes.
    | PGP is _miniscule_ compared to any of these; it 's not even a
    | rounding error. This is true even when you juice the numbers
    | with things like git signing (which is not only ignored by
    | 99.9% of clients but doesn't even sign the relevant software
    | artifact for end users).
    | 
    | > I understand you want the situation to change, but for now
    | it's disingenuous to pretend like GPG in particular doesn't
    | have the super majority of "market" share around signatures
    | and that drama like this wouldn't have potential impact to a
    | lot of folks.
    | 
    | If you know me, then you know I've run the numbers here[1]:
    | even ecosystems that encouraged PGP use for _decades_ have
    | all the hallmarks of the signatures being _completely_
    | unused. End users _do not_ verify PGP signatures, signers _do
    | not_ maintain their keys; PGP 's tooling encourages this
    | behavior.
    | 
    | I won't deny that workflows will be broken by moving away
    | from PGP. But those workflows are (1) a tiny, _tiny_
    | minority, and (2) overwhelmingly security theater, especially
    | now that PGP 's principle feature (the WoT) is dead.
    | 
    | [1]: https://blog.yossarian.net/2023/05/21/PGP-signatures-on-
    | PyPI...
 
      | computerenjoyer wrote:
      | OK, fair point regarding bespoke PKI on Windows/Mac being
      | more common. I do agree with that. I'll amend my statement
      | to: PGP is by far the most common standard for server-side
      | software distribution. I'll also quickly add that I agree
      | that git signing is worthless as currently implemented.
      | 
      | I have read your blogpost and I agree that PyPI had unused
      | and useless PGP support. I also agree that signatures are a
      | waste of time when the client tooling does not verify by
      | default. However, this is not true for the Linux distro
      | packaging ecosystem where approximately _all_ downloads
      | have their signatures verified. Until you convince RedHat
      | and Debian to move their packaging and repository formats
      | to another standard, PGP will remain very relevant for
      | production server software.
      | 
      | Don't mistake me as a defender of PGP-the-standard. I have
      | absolutely no opinion on its cryptography. I would happily
      | use minisign or any other tool that used only modern
      | cryptography to produce signatures. As a distributor of
      | software though, I don't really get to decide how to sign,
      | I am at the mercy of government and ecosystem standards,
      | and as a result no other signature scheme is close to the
      | level of use that PGP has for enterprises that run server-
      | side software.
 
        | Avamander wrote:
        | > PGP is by far the most common standard for server-side
        | software distribution.
        | 
        | I have a strong suspicion AuthentiCode is similarly
        | common, plus a certain winner outside the server space.
 
        | computerenjoyer wrote:
        | My guess is that there are a lot more "signature
        | verification events" on Linux that pull from a deb or yum
        | repository than there are on Windows servers, both
        | because the mean server in terms of global usage seems to
        | be Linux (though not the median, I'd think?) as well as
        | because it seems like Linux folk rely an awful lot more
        | on distribution repositories than Windows server users
        | download things. Happy to be corrected if anyone has real
        | numbers, though. My feelings are informed by my company's
        | download statistics which may not be representative.
 
        | woodruffw wrote:
        | > PGP is by far the most common standard for server-side
        | software distribution.
        | 
        | This is probably true, _for Linux_. Windows does its
        | bespoke PKI thing with Authenticode; OpenBSD uses
        | signify[1].
        | 
        | > Until you convince RedHat and Debian to move their
        | packaging and repository formats to another standard, PGP
        | will remain very relevant for production server software.
        | 
        | This is a fair point! But I'll point something important
        | out: these platforms are essentially using PGP as a dumb
        | key encapsulation format; they benefit (correctly!) from
        | being able to pre-baked rings of trusted distribution
        | keys. The fact that they use PGP for this is an
        | implementation quirk, one that has materially negative
        | consequences[2].
        | 
        | It's not easy for them to switch, but all of these
        | platforms would be well (better) served by switching from
        | PGP to signify, minisign, or similar.
        | 
        | > I am at the mercy of government and ecosystem
        | standards, and as a result no other signature scheme is
        | close to the level of use that PGP has for enterprises
        | that run server-side software.
        | 
        | Out of curiosity: which government standards? I'm not
        | aware of a US Gov't standard that mandates PGP; this
        | would be very valuable to know.
        | 
        | [1]: https://www.openbsd.org/papers/bsdcan-signify.html
        | 
        | [2]: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1
        | 461834
 
        | computerenjoyer wrote:
        | I agree that RedHat and Debian use OpenPGP mostly for its
        | signature only and do not rely on any Web of Trust or
        | other infrastructure for key distribution in the basic
        | case. As a side-note just for fun:
        | 
        | It's interesting to consider third parties who maintain
        | Linux package repos, like Postgres
        | https://ftp.postgresql.org/pub/repos/yum/
        | 
        | They distribute their public keys on their own web
        | infrastructure, so it's effectively TOFU. In your
        | criticism of PyPI, you rightly pointed out that keys are
        | useless unless pushed to a publicly-known key server
        | because they aren't discoverable for users, which leads
        | to ~no one verifying installs. I agree with this for
        | PyPI, but in Postgres' case, if you do not have their key
        | pulled locally, installs will fail by default. This means
        | that users do generally install keys locally (actually
        | they typically install the repo RPMs which configures
        | local repositories as well as installs keys), even if the
        | discovery mechanism isn't enforced by yum. My point here
        | is that ecosystems without the ability to pre-bake rings
        | of trust can still result in ~all downloads being
        | verified as long as the client tooling defaults to the
        | correct thing. pip not doing so is the main reason why
        | OpenPGP signing never caught on in the Python ecosystem.
        | 
        | But yes, I agree: A modern day dpkg and rpm could swap to
        | something with safer cryptography rather easily without
        | changing anything about distribution. OpenPGP is a lot of
        | bloat for their needs.
        | 
        | > Out of curiosity: which government standards? I'm not
        | aware of a US Gov't standard that mandates PGP; this
        | would be very valuable to know.
        | 
        | I don't believe any mandate OpenPGP specifically. I was
        | more trying to get across that many institutions mandate
        | FIPS 140-2/3, and current implementations (like on RHEL)
        | complain if signatures are not present in their expected
        | format. Because OpenPGP is my only choice for signing yum
        | infrastructure and RPMs, it's a de-facto government
        | standard today.
 
  | beeboobaa wrote:
  | > Consensus among cryptographers is that PGP hasn't reflected
  | anything close to acceptable cryptographic design
  | 
  | Because these cryptographers haven't actually delivered
  | anything else that's actually usable by people who just want to
  | encrypt the bodies of their emails?
 
    | woodruffw wrote:
    | Cryptographers and cryptographic experts overwhelmingly agree
    | that encrypting email is a chump's game[1]. If you want
    | secure E2EE transit, Signal is widely recommended.
    | 
    | [1]: https://www.latacora.com/blog/2020/02/19/stop-using-
    | encrypte...
 
      | beeboobaa wrote:
      | Signal is useless for many use cases where email is widely
      | used. For example, it requires a phone number which just
      | makes it useless for anything where people want to use a
      | (possibly short-lived) pseudonym.
      | 
      | And note that I specifically said "people who just want to
      | encrypt the bodies of their emails". That is still
      | incredibly useful, even if the metadata is (obviously) not
      | encrypted.
 
        | woodruffw wrote:
        | My understanding is that Matrix is widely considered to
        | have acceptable design tradeoffs for pseudonymous E2EE.
        | It isn't perfect[1], but it's miles better than the
        | theatre of PGP encrypted emails.
        | 
        | > That is still incredibly useful, even if the metadata
        | is (obviously) not encrypted.
        | 
        | To whom? What is the threat model in which a user who is
        | serious about the security of their messages is _better
        | served_ by PGP-over-email?
 
        | chlorion wrote:
        | PGP over email is used in the real world and used
        | successfully.
        | 
        | Research about online black markets (which serves as a
        | nice "case study") will show that the main form of
        | communication between people there have been pasting a
        | PGP encrypted message into a text box and sending it, and
        | sometimes literally using email.
        | 
        | In a situation like this, where anonymity and privacy are
        | _critical_ , signal is not even remotely an option
        | because it requires a phone number.
        | 
        | Matrix may be possible to use, but it would require that
        | someone run a matrix server that allow people to make
        | accounts with no information required for sign up, and
        | allow signup and use of the server over tor, which are
        | all unlikely.
        | 
        | PGP over email or pasted into a web form is simple, it
        | doesn't require signing up with a phone number or any PI,
        | it can be used over tor, and it can be done with basic
        | utils installed on almost any Linux distro.
        | 
        | I suspect a lot of cryptographers have not done research
        | about what goes on "in the real world" or "in the wild".
        | It would be interesting for them to setup a mock
        | situation where two people attempt to send messages to
        | each other without doing anything that could identify
        | them in any way, completely anonymously, to emulate what
        | using these tools in the real world would be like for a
        | whistleblower or journalist or whatever.
 
        | woodruffw wrote:
        | It's worth reading through the criminal complaints
        | against various Silk Road people[1]. You'll notice two
        | things: (1) the government nails these people _despite_
        | encrypted messages, because their email metadata is more
        | than sufficient, and (2) people whose _literal lives_
        | depend on using PGP correctly fail to do so (e.g. by
        | sending some messages without encryption, or forwarding
        | previously encrypted messages as unencrypted).
        | 
        | PGP is not a serious answer here.
        | 
        | [1]:
        | https://www.justice.gov/sites/default/files/opa/press-
        | releas...
 
        | chlorion wrote:
        | I agree that it's error prone and far from ideal, and
        | that most people should be using signal or matrix or
        | something, but I'm not sure what other practical answers
        | there are for more intense cases where people don't have
        | access to those things.
 
        | woodruffw wrote:
        | That's the thing: Signal and Matrix are _still_ the right
        | answer for those cases!
        | 
        | Consider the ANOM[1] case: the FBI found it _easier_ to
        | FUD criminals into using a backdoored chat app than to
        | break actual chat apps.
        | 
        | [1]: https://slate.com/technology/2021/12/fbi-fake-
        | encrypted-mess...
 
  | chlorion wrote:
  | Many Linux distros rely on PGP.
  | 
  | Most of these distros are using PGP to distribute software,
  | often binaries that are distributed to end users.
  | 
  | Gentoo as an example, requires all commits to the gentoo repo
  | to be signed by a key in the "gentoo-developers" keyring.
  | Gentoo also provides "stage3" images which are signed by the
  | "gentoo-release" key. Since this is a source based distro there
  | are no binary packages, but the main ebuild repo is signed and
  | verified upon syncing.
  | 
  | I know some other distros like Arch also do similar things with
  | PGP.
  | 
  | Maybe you will say that this isn't actually using PGP because
  | it's not using the "web of trust", but I don't think this is
  | relevant, because there is much more to PGP than the WoT and
  | those features are being used.
 
    | jandrese wrote:
    | This is really two different worlds. PGP for signing repos is
    | alive and works well enough. In particular the key management
    | is a lot easier since there's really only a small handful of
    | entities signing things and they also control the platform.
    | If you need to add keys (for third party repos) the process
    | is just one more step in adding the repo in the first place
    | so very little friction.
    | 
    | PGP for signing email however has been a perpetual failure.
    | Decades later they still have not figured out a reasonable
    | key management system, which left the community fractured and
    | unable to scale. As you note, the Web of Trust has been a
    | disaster for everybody except the most exceptionally paranoid
    | who can't accept anything less. And those people talk to so
    | few other people that they don't have the scaling issues that
    | regular people face.
 
| dosman33 wrote:
| This sucks. At the same time, only experts use OpenPGP so I guess
| maby it's not a big deal?
| 
| I've been using PGP for decades at this point and I'm still
| somewhat surprised when I encounter security professionals that
| either can't figure out how to use PGP or just ignore it because
| "its too complicated, and I already have Signal". I have no beef
| with encrypted messenger services but it's not the same use case
| as PGP for email and other needs.
| 
| This also hints at a separate cultural divide. Young people only
| know email as that thing you need in order to setup other
| accounts. They use IM for the bulk of their real communication
| and at best consider email something they only use for work. Only
| old farts think of email as something they use for personal
| correspondence. And frankly, most of the people I interact with
| are younger than me so most of my communication has shifted to
| where the people are that use it, which is IM services.
 
  | tptacek wrote:
  | Experts avoid PGP like the stomach flu. It'd be interesting if
  | you could find a single cryptography engineer of note that has
  | spoken up for it in the last 10 years.
 
| upofadown wrote:
| There is no crisis here. Everybody can just keep using the
| existing standard and everything will work. It turns out that the
| existing stuff is actually cryptographically secure.
| 
| So far the only practical incompatibility I have seen seems to be
| associated with the GnuPG OCB cipher mode. Newer versions of
| GnuPG generate keys that show OCB compatibility. So encrypting
| messages/files to that particular PGP identity will result in the
| use of the non-backwards compatible OCB mode. That will prevent a
| non GPG OCB compatible from decrypting the message/file. The
| GnuPG project should document the issue and make it clear how one
| could disable the GPG OCB mode.
 
  | tptacek wrote:
  | You've been saying for years on Hacker News that (a)
  | authenticated encryption is overrated, and (b) that the PGP MDC
  | is as secure as an authenticated cipher mode.
 
    | upofadown wrote:
    | Specifically, I have been saying that in normal PGP usage,
    | the PGP MDC is not relevant. Since each message is self
    | contained (no ongoing connection), it is better to
    | authenticate the plaintext directly with a signature. For an
    | unsigned message an attacker can replace the whole thing. For
    | the case of symmetrical encryption, the PGP MDC _is_
    | relevant. So it depends...
    | 
    | More: https://articles.59.ca/doku.php?id=pgpfan:authenticated
    | (my article)
    | 
    | >the PGP MDC is as secure as an authenticated cipher mode.
    | 
    | It is. It turns out there is a class of authenticated
    | encryption that involves first hashing the plaintext and then
    | encrypting the plaintext and the hash. OCFB-MDC seems to be
    | an instance of that class. That seems to defy conventional
    | wisdom and as a result is interesting.
    | 
    | More: https://articles.59.ca/doku.php?id=pgpfan:mdc (my
    | article)
 
| upofadown wrote:
| The politics here as I perceived them...
| 
| Way back, there was a rambling and expansive process to update
| the OpenPGP standard. Years. So eventually it was decided to do a
| more focused "crypto refresh" that would be restricted to just
| important cryptography concerns. The GnuPG program was part of
| this. During the process the head of the GnuPG project (Werner
| Koch) spent a lot of time pushing back against what he considered
| pointless or wrongheaded changes. Eventually things seemed to
| stabilize and there seemed to be a consensus and people started
| paying less attention. Koch was one of those people.
| 
| The process then wound up again and a bunch of stuff that Koch
| opposed ended up in the standards draft. Koch eventually noticed
| and ended up taking the position that the GnuPG project would not
| follow the new changes and would instead stay where they were.
| 
| I think the very best outcome here would be if the various
| entities would accept that the process is working to the extent
| of clearly showing that consensus has not been reached and can't
| be reached from this point. The process will have to start yet
| again. The root cause here seems to be that there is no real
| serious issue with the existing standard, so attempts to update
| it lack a focus. As a result there is a tendency to try to change
| everything.
 
  | twiss wrote:
  | The IETF aims for rough consensus [1][2], rather than full
  | consensus. The OpenPGP Working Group chairs have deemed that
  | GnuPG is "in the rough" of the rough consensus [3], and that
  | there is sufficient consensus on the crypto refresh to publish
  | it as an RFC. If GnuPG disagrees with that outcome, they can
  | appeal it. That would be the normal "process" to follow, which
  | - to my knowledge - hasn't happened yet.
  | 
  | As for lacking focus, I'm obviously biased as one of the
  | authors of the document, but the charter of the crypto refresh
  | [4] was rather narrow, and aimed at modernizing the
  | cryptographic primitives in OpenPGP. That's what the crypto
  | refresh focused on; e.g. see [5].
  | 
  | [1]: https://www.rfc-editor.org/rfc/rfc8789.html
  | 
  | [2]: https://www.rfc-editor.org/rfc/rfc7282.html
  | 
  | [3]:
  | https://mailarchive.ietf.org/arch/msg/openpgp/yz6EnZilyk_90j...
  | 
  | [4]: https://datatracker.ietf.org/doc/charter-ietf-openpgp/03/
  | 
  | [5]: https://proton.me/blog/openpgp-crypto-refresh
 
    | beeboobaa wrote:
    | Rough consensus doesn't have to include the people actually
    | running the project? That sounds like a great way to publish
    | standards that will be ignored by everyone...
 
      | twiss wrote:
      | Multiple OpenPGP implementations were involved in the
      | crypto refresh, including Sequoia-PGP, OpenPGP.js,
      | GopenPGP, and - at one point - RNP and even GnuPG itself,
      | though those two stopped being involved at some point.
      | GnuPG is now unhappy with some of the changes that were
      | made after that point, which is their right. However, GnuPG
      | is not the only implementation of OpenPGP, and not the only
      | voice that matters. Various implementations have already
      | implemented the crypto refresh (and personally I still hold
      | out hope that eventually, GnuPG will do so as well, if this
      | drama dies down and everyone can reconciliate).
 
        | beeboobaa wrote:
        | The thing is that I've never even heard of any of those.
        | When people talk about PGP they mean GnuPG. All of those
        | other projects their purpose of existence is to be
        | compatible with GnuPG. If compatibility wasn't a concern
        | you'd just use something new like Age.
 
        | twiss wrote:
        | Even if you don't know them, (and pardon my arrogance,)
        | OpenPGP.js and GopenPGP probably have many more end users
        | than GnuPG, due to them being used by Proton Mail (among
        | other products). However, that shouldn't actually matter,
        | because..
        | 
        | > All of those other projects their purpose of existence
        | is to be compatible with GnuPG.
        | 
        | That's not how the IETF process works. Technical
        | arguments are more important than who has the most users.
        | 
        | > If compatibility wasn't a concern you'd just use
        | something new like Age.
        | 
        | That being said, OpenPGP.js and GopenPGP do actually
        | implement the old version of the draft (now dubbed
        | "LibrePGP") as well (and everybody obviously still
        | supports RFC4880), so there's no real risk of
        | incompatibility. We just also implement the crypto
        | refresh, and hope that GnuPG will do so as well, so that
        | everyone can benefit from the improvements made there.
 
        | beeboobaa wrote:
        | > Even if you don't know them, (and pardon my arrogance,)
        | OpenPGP.js and GopenPGP probably have many more end users
        | than GnuPG, due to them being used by Proton Mail (among
        | other products).
        | 
        | Right, but I assume the point of Proton Mail using
        | OpenPGP is so that mail sent by Proton Mail can actually
        | be verified/decrypted by other systems that aren't Proton
        | Mail? So compatibility with the widely known GnuPG is a
        | goal. Otherwise the question remains, why PGP?
        | 
        | > That's not how the IETF process works
        | 
        | Sure, but it is how the real world works.
        | 
        | > That being said, OpenPGP.js and GopenPGP do actually
        | implement the old version of the draft
        | 
        | So are you doing both? If you implement the crypto
        | refresh and GnuPG doesn't then you lose compatibility,
        | right? If you don't lose compatibility and are somehow
        | doing both, then what's the point?
 
        | twiss wrote:
        | > So are you doing both? If you implement the crypto
        | refresh and GnuPG doesn't then you lose compatibility,
        | right? If you don't lose compatibility and are somehow
        | doing both, then what's the point?
        | 
        | OpenPGP keys can signal support for various features and
        | algorithms - such as AEAD modes. As one example, the
        | crypto refresh specifies GCM (as optional to implement).
        | 
        | This means that, when sending email between Proton users
        | and OpenPGP implementations that support that, we can use
        | GCM - which has certain security and performance
        | benefits.
        | 
        | If we send email between Proton users and GnuPG, we won't
        | use GCM, so we won't lose compatibility, but users also
        | won't benefit from those (and other) security and
        | performance improvements.
 
        | beeboobaa wrote:
        | Thank you for clarifying. I'd still be concerned about
        | not being able to use the same key for proton mail and my
        | desktop application, but that is more reasonable to deal
        | with.
 
        | cesarb wrote:
        | > I'd still be concerned about not being able to use the
        | same key for proton mail and my desktop application
        | 
        | Would it be possible to use different subkeys for each (a
        | good idea in any case, since it would allow revoking them
        | separately in case one of them is leaked)? I don't recall
        | whether the packet with the features and algorithms
        | support information is attached to the key or to the
        | subkey.
 
        | twiss wrote:
        | It's possible to do both, however, the crypto refresh
        | recommends setting the preferences on the entire key, and
        | anything else isn't widely supported, I believe.
        | Theoretically, you could have two versions of the key
        | with different preferences (and different subkeys), but
        | at that point you're probably better off having two
        | entirely separate keys.
 
        | ParetoOptimal wrote:
        | Ah... So the standard/implementation equivalent of
        | Pokemon's "Your trainer level isn't high enough".
 
        | beeboobaa wrote:
        | More like... First there was GnuPG. Then people wanted
        | interoperability with other implementations so OpenPGP
        | happened, and then OpenPGP changes things to be
        | incompatible with GnuPG.
 
        | twiss wrote:
        | Not to be pedantic but that's not how the history went.
        | First there was PGP (the product), then that was turned
        | into a standard (RFC2440, "OpenPGP Message Format"), and
        | GnuPG implemented that.
        | 
        | Then, some (backwards-compatible) changes to the OpenPGP
        | standard were proposed, and every implementation
        | implemented them. (These were specified in RFC4880.)
        | 
        | Then, some (backwards-compatible) changes to the OpenPGP
        | standard were proposed, and many implementations
        | implemented them. (They never ended up in an RFC, but are
        | now dubbed "LibrePGP".)
        | 
        | Then, some more (again backwards-compatible) changes were
        | proposed, and many implementations implemented them, but
        | not GnuPG, for now. (This is the crypto refresh. It
        | should become an RFC soon.)
        | 
        | It's a shame GnuPG doesn't want to implement the crypto
        | refresh at this time, but that shouldn't cause
        | incompatibilities (if all implementations are
        | conservative in what they generate). Messages sent
        | between GnuPG and other implementations can still use
        | RFC4880 (the old OpenPGP standard), they just won't
        | benefit from the improvements in the crypto refresh,
        | unfortunately.
 
        | tptacek wrote:
        | If I added to my litany of problems with PGP the fact
        | that its advocates and user base believe that GnuPG _is_
        | the PGP standard, I 'd get dunked on. But I agree with
        | you completely: GnuPG is the standard.
        | 
        | Further: I don't think this is intrinsically a bad thing.
        | Other, more successful projects work this way, most
        | notably WireGuard. You have to judge these things on the
        | merits.
 
        | lokar wrote:
        | I sort of assume protonmail is a major issue here. A
        | reasonable scale service that offers pgp and wants/needs
        | some improvements.
 
      | Valodim wrote:
      | It is a similar position as with chromium and web
      | standards. Doing stuff without their agreement is kinda
      | pointless in the same way, but if they aren't gonna
      | cooperate what are you gonna do, give up and just do
      | whatever they want?
 
  | RcouF1uZ4gsC wrote:
  | Maybe Koch got paid off by the NSA to do this.
  | 
  | If he succeeds, old, potentially vulnerable cyphers are kept in
  | use, possibly making it easier for the NSA to crack encrypted
  | emails.
 
    | upofadown wrote:
    | >...old, potentially vulnerable cyphers...
    | 
    | Examples? Specifically, old potentially vulnerable ciphers
    | that would actually allow the NSA to crack encrypted emails?
    | IDEA and 3DES for example are perfectly secure for that
    | usage. ... and just having something in the standard is not
    | going to force anyone to use it. These days it is all AES and
    | RSA or Curve25519.
 
  | Valodim wrote:
  | This is actually pretty accurate.
  | 
  | Worth noting is that the choice to move on with the rfc process
  | was made very deliberately: there was a large thread on the
  | mailing list to try and find a compromise. In this discussion,
  | Werner Koch's negotiation standpoint basically required things
  | to go 100% his way. The choices for the working group chairs
  | ultimately boiled down to: 1. Closing down the wg with no
  | result. 2. Moving on as a mostly functioning working group, at
  | the cost of leaving Werner/GnuPG in the rough. 3. Reverting
  | everything to the way Werner preferred.
  | 
  | None of those were great options, obviously.
  | 
  | Note that for option 3, the draft that is now LibrePGP and
  | which was edited by Werner until circa 2020, had spectacularly
  | failed to gather support and achieve consensus back then, and
  | effectively stalled the working group for years. The LibrePGP
  | project now claims that this draft was "the last consensus" of
  | the working group, but at that time the reality was that Werner
  | had gotten pretty used to just committing to master of the spec
  | draft whatever he felt like, instead of seeking group
  | consensus.
  | 
  | At the moment there doesn't seem to be a chance for the parties
  | to come to an agreement. I'm curious to see how this develops.
 
| aborsy wrote:
| It better be quantum safe at this point. Otherwise, another
| update would be needed soon.
 
| OhMeadhbh wrote:
| I have a friend whose observation about many FLOSS projects is
| "Drama == Fork." I'm trying not to be uncharitable about Libre vs
| Open here, but it seems to have the aroma of drama. I chartered
| an IETF WG in the 2000s and there was quite a bit of drama there,
| though it was sort of important to allow people to be dramatic to
| express what they wanted the WG to work on for a while.
| Eventually when they realized there was consensus for something
| other than what they wanted us to work on, the drama started to
| recede.
| 
| It might be useful to wait three months and revisit LibrePGP and
| the OpenPGP WG and see what progress has been made.
 
| threatofrain wrote:
| Related discussion.
| 
| https://news.ycombinator.com/item?id=38554943
 
| jandrese wrote:
| Wake me up when they finally offer a scalable key management
| system. PGP always punted on key management, and as a result has
| been a perpetual market flop. It always seemed to cater to people
| who were very willing to give up all convenience for perfect
| security, like can't trust keys unless they were handwritten on
| paper and you verified their photo ID in person before accepting
| them levels of paranoid. It's really frustrating for people who
| want a system that's good enough to always be there and providing
| passive benefits even if there is a theoretical case where a
| nation state might MITM your communications if they got there
| before you knew the person.
 
  | sillysaurusx wrote:
  | And yet, without it, the Snowden leaks wouldn't have happened.
  | I mostly agree with you, but it's worth pointing out that they
  | achieved their goals; rare for a security product.
 
  | throw0101c wrote:
  | > _Wake me up when they finally offer a scalable key management
  | system. PGP always punted on key management, and as a result
  | has been a perpetual market flop._
  | 
  | What is the alternative KM architecture in a distributed
  | system? Remember that for e-mail there is no central authority
  | to handle assigning keys to individuals, unless perhaps you
  | want Gmail and Outlook.com to handle that.
  | 
  | The other e-mail security system is S/MIME (which uses X.509).
 
    | jandrese wrote:
    | It's not hard to imagine a system where you can contact the
    | server in the MX record for a domain over HTTPS (really just
    | TLS) and query it for a specific email address to get the
    | public key for that user.
    | 
    | Sure if someone knocks over TLS then your email encryption
    | will be in trouble, but you will also have plenty of other
    | problems at that point.
 
      | twiss wrote:
      | > query it for a specific email address to get the public
      | key for that
      | 
      | This is actually possible for OpenPGP, with WKD ("Web Key
      | Directory"): https://datatracker.ietf.org/doc/html/draft-
      | koch-openpgp-web...
      | 
      | It's an expired draft, but is relatively widely supported:
      | https://wiki.gnupg.org/WKD#Implementations
 
        | jandrese wrote:
        | In a draft published in May of _this year_. This should
        | have been a draft in the 90s.
        | 
        | It should have been in mail systems forever. Whenever you
        | create an account the first email should have been the
        | server sending you your private key in some format that
        | every email client understands and would then prompt you
        | to automatically install it in your client for that
        | server.                   Welcome to your new email
        | account!                    Your private key is attached
        | in the standard format.                When your client
        | asks you to install the key say "Yes", and allow it to
        | automatically sign your email using that key for this
        | account.              Don't forget to check the box to
        | automatically encrypt mail when possible.
        | 
        | If email worked like this I bet secure POP and IMAP would
        | have been implemented much faster than they were in real
        | life.
 
        | twiss wrote:
        | The first draft was published in 2016:
        | https://datatracker.ietf.org/doc/html/draft-koch-openpgp-
        | web...
        | 
        | Even before that, there were other mechanisms proposed
        | for this, such as
        | https://datatracker.ietf.org/doc/html/draft-shaw-openpgp-
        | hkp... (from 2003). Unfortunately it didn't catch on; I
        | agree it would've been nice to have such a mechanism
        | earlier.
 
      | jcranmer wrote:
      | What if your mail server decides to advertise their public
      | key instead of your public key, allowing them to read all
      | of your email with you being none the wiser?
 
        | twiss wrote:
        | One way to solve this problem is Key Transparency, which
        | aims to provides a mechanism to verify that you're
        | receiving a legitimate key, somewhat analogous to
        | Certificate Transparency.
        | 
        | We've implemented this at Proton:
        | https://proton.me/support/key-transparency (although it's
        | still in beta, and opt-in for now - but obviously the aim
        | is to enable it by default).
        | 
        | There's also a (relatively new) working group at the
        | IETF, to work on standardizing (a version of) this:
        | https://datatracker.ietf.org/wg/keytrans/about/.
 
        | jandrese wrote:
        | Then you might want to change email providers.
        | 
        | Really paranoid folks could set up services online that
        | check for this, but I kind of doubt it would happen very
        | often because it would be a major stink for that email
        | service if they were caught, and catching them isn't that
        | hard.
 
| fl0ki wrote:
| Really, we're still only hearing two sides of the story. I for
| one will wait for the Critique Critique Critique. Though really,
| ...
 
| exabrial wrote:
| I really appreciate the ending. I think that is good leadership.
 
| dang wrote:
| Related: https://blog.pgpkeys.eu/critique-critique.html
| 
| (via https://news.ycombinator.com/item?id=38554943, but we merged
| most of those comments hither)
 
___________________________________________________________________
(page generated 2023-12-07 23:00 UTC)