Poor Johnny still won't encrypt

46 pointsposted 5 hours ago
by zdw

43 Comments

laserbeam

4 hours ago

Someone needs to design a super dumb and robust system where I can safely store all my keys on all devices I use an account. The fact that whatsapp, signal and other platforms tend to have a primary device for keys is bonkers to me. A primary device that can randomly die, get stolen or fall in a lake.

I have lost chat histories more times than I can remember, and I have to be extra diligent about this these days.

I don’t even want to think about pgp when I have to manually take care of this problem. Not because of my own skills, but because I could never make it reliable for my family and friends on their side.

AnonC

4 hours ago

> I have lost chat histories more times than I can remember, and I have to be extra diligent about this these days.

As per Signal’s diehard proponents, losing chat history is a feature, not a bug (I’m not being facetious when saying this, and you can see comments of this kind in Signal related threads here).

Edited to add: I don’t agree with that premise and have long disliked losing chat history.

laserbeam

3 hours ago

I know you are not being facetious. My problem is random Joe on the street sees it as a bug. He really does care more about actually being able to talk with his wife than Signal’s mathematically correct principles. He needs it to be reliable first, secure second.

AnonC

3 hours ago

GP here. I agree. I should’ve stated that I don’t like losing chat history and have seen that as a problem with Signal.

I have edited my previous comment to reflect that I don’t like losing chat history.

IlikeKitties

3 hours ago

> He needs it to be reliable first, secure second.

Than he should use something else. I need signal to be secure first, second and third and reliable in edge cases like this a distant number.

golem14

3 hours ago

Yeah, but if use proton for everything else and signal only for my secret world domination plans, traffic analysis will be so much easier…

wood_spirit

3 hours ago

My company recently really cut back on slack retention. At first I was frustrated, but we all quickly got over it and work carried on getting done at the same pace as before and nothing really got impacted like many of us imagined it might.

wavemode

2 hours ago

That bears little resemblance to the Signal concerns. The reason people are worried about losing their personal messages is not lost productivity.

It's also not even really the same situation. A more apt analogy would be, if switching work laptops sometimes meant you could no longer read any Slack history.

Sevii

2 hours ago

It's fine until you need evidence someone agreed to something months ago but all records have been deleted.

brendoelfrendo

an hour ago

Methinks the better solution here is to get better friends?

lazide

an hour ago

A certain type of person sees this as a feature, not a bug.

nine_k

2 hours ago

This is a difference in the threat model.

Signal's threat model is that everything around you is hostile to you, except the parties you interact with. You are an undercover rebel in a totalitarian sect which would sacrifice you to Cthulhu if they see your chat history. Losing it is much better than disclosing it.

Your threat model is likely random black hat hackers who would try to get into your communication channels and dig some dirt to blackmail you, or to impersonate you to scam your grandmother out of several thousand dollars. Signal protects quite well against it. But the chance of this happening even in an unencrypted channel is low enough. You don't mind making the security posture somehow weaker, but preserve the possibility to restore your chat history if your secure device is lost or destroyed.

I suppose the problem could be solved by an encrypted backup with a long key which you keep on a piece of paper in your wallet, and / or in a bank in a safe deposit box. Ideally it would be in the format that the `age` utility supports.

But there is no way around that paper with the long code. If this code is stored on your device, and can be copied, it will be copied by some exploit. No matter how inconspicuous a backdoor you are making, somebody will find it and sneak into it. Should it happen in a publicized case, the public opinion will be "XYZ is insecure, run away from it!".

Helmut10001

3 hours ago

I set up automatic backups of WhatsApp to my self-hosted Nextcloud once. Since you need 'tested backups', I tried to decrypt these WhatsApp backups independent of my phone, but this was not possible. You need the original device. There are some hacks online, but they are always out of date.

I am tending now to running Mautrix Whatsapp bridge and backing up my data through this.

laserbeam

2 hours ago

Ask yourself. If you want things to be encrypted by default in the world, would a florist be able to self host nextcloud?

wmf

4 hours ago

Apple/Google passkeys.

throwaway82931

3 hours ago

Indeed, passkeys would seem to represent a step forward from single-device to single-account.

lazide

an hour ago

Passkeys are often stored/locked per device?

tonyhart7

2 hours ago

my proposal devices is like yubikey but instead of yubikey hardware in place like USB devices form

its in the form of ring or bracelet, its small enough and can be carried everywhere with you all the time

its use NFC like technology, it works without battery, fast and "secure enough" for 99% of people

what if the device is stolen???? we can add authorization like biometric (fingerprint etc) while touching devices so it can be sure the real owner is "giving" auth

tptacek

3 hours ago

Yeah, at some point people are going to work out that the problem isn't Johnny, it's email. Email is distinctively hostile to secure messaging. No matter what software Johnny uses, "secure" email will always be inferior to alternative options.

https://www.latacora.com/blog/2020/02/19/stop-using-encrypte...

bgwalter

29 minutes ago

"The most popular modern secure messaging tool is Signal"

As Mike Waltz had found out. And Snowden used gpg and I haven't heard of a single message of his having been decrypted.

yardstick

3 hours ago

I’ve got hundreds of emails from the early 2010s between a couple of coworkers and myself that I can no longer read because they were S/MIME encrypted and I’ve got no idea what happened to my keys or even if my current client supports it anymore.

I wish the client stored it decrypted once received.

pcthrowaway

3 hours ago

> Proton is a notable exception.

Proton doesn't provide public APIs for retrieving the public GPG keys associated with their users' accounts, nor do they provide a way to send encrypted mail to their users' accounts without using their official apps.

Ergo, Proton is not really working to further the state of cryptography for email, they're only working to compel users to use their proprietary software (and ultimately their paid services).

If services which do automated sending of emails to their subscribers/users have no way to encrypt those emails for its users who are on proton mail, I don't understand how Proton can claim to care about encryption.

burnt-resistor

3 hours ago

Proton still appears to suffer from Lavabit's pathologies in several ways because it ultimately stores GPG private keys, hasn't had their "zero-access encryption" audited by an independent third-party, it hosts servers in privacy-hostile jurisdictions that can be seized, and they've already handed user data to authorities over 30k times. [0] Proton Mail is a simulacra of privacy as a service that lies to its customers.

At present time, the best way to assure privacy is to lease (using cryptocurrency) VPS instances in a neutral, privacy-respecting country and self-host a web-mail stack oneself. There isn't really a practical way around this because powerful nation states are able to demand access to customer data from almost every cloud/VPS provider in their jurisdiction.

0. https://proton.me/legal/transparency

bradley13

4 hours ago

It's weird. Almost all web traffic is now https - even though very little of it is sensitive. Email, on the other hand, is quite often sensitive, and yet...no one cares.

Why?

mmh0000

3 hours ago

Nearly all email is encrypted in transit. All major MTA systems send encrypted and accept encrypted as the default.

This article is about encrypting the body of the email which is easy* but no widely implemented standard exists.

* Stupid easy for two nerds to email securely.

* Stupid hard to work with multiple people and non-nerds.

mwwaters

2 hours ago

It seems like the bigger day to day issue is the possibility of downgrades from STARTTLS or a server that doesn’t support TLS. Encryption in the GPG isn’t necessary or even would be unwanted (for a company to have records of all the emails).

So there are mechanisms to put encrypted things in workplace emails and then have some mechanism for receiver in a different organization to unencrypt. I have seen a mechanism that comes down to magic links, which I found ironic (though yes, intercepting is less of a threat than sending the data unencrypted).

I feel like supporting an option to not send an email unless STARTTLS happens is the way to go. There’s probably a lot of practical problems for, say, online Outlook or Gmail supporting that option when sending an email. But I feel like that’s the easiest solution.

xeonmc

3 hours ago

might age fit the bill?

laserbeam

4 hours ago

Unfortunately, those are 2 different problems. It’s easy to have servers store encryption keys to make https work. You only need to encrypt trafic between you and a server for 5 seconds at a time.

It’s hard for personal communications. The server shouldn’t know the keys, and they need to survive for decades.

wmf

4 hours ago

HTTPS is pervasive because Google encouraged it. Gmail could force S/MIME but they don't care.

hugo1789

3 hours ago

I think mandatory S/MIME without user-friendly key management would either be reverted pretty soon or it would kill Gmail.

wmf

3 hours ago

Google would have to build some kind of Let's Encrypt for S/MIME before they turned on the encouragement.

ghssds

3 hours ago

why did google wanted it?

ChadNauseam

an hour ago

Google makes money off search, which requires that users want to visit websites. All websites using HTTP are not secure. Unsecure websites are uninteresting to most users, but most users don't have the know-how to distinguish what sites are using HTTPS and which aren't. So the simplest solution is to get all websits to switch to HTTPS before it becomes a problem

xeonmc

4 hours ago

If you want encrypted communication over email, there's DeltaChat.

erelong

4 hours ago

Issue 1: Establishing lots of reasons why people should encrypt

Issue 2: Making it easy to encrypt

Issue 3: Popularizing encryption or getting more people to do it

FerretFred

3 hours ago

Issue 3.. most/many governments are taking active steps to discourage this practice or better still (for them), stamp it out completely.

sorbusherra

3 hours ago

I consider e-mails to be digital versions of postcards. Both are obsolete but have some usage scenarios. There is no need to use private communication in obsolete postcard type messaging, so there is no need for encryption. For private communications there are other better(easier) means which people use.

zkmon

3 hours ago

Maybe Johnny doesn't have a need to encrypt. The post card in India was just a card with message written on both sides, fully visible in plain text. It's very common that a postman would read out the letter to recipients sometimes, when they deliver it. Privacy is not an universal need.

Poor are those people who are forced to hide their message in encrypted formats,

dghlsakjg

3 hours ago

Nobody expects privacy when they send a postcard.

Most people keep their emails behind a password for a reason...

zkmon

3 hours ago

The point is, why not let people to have freedom of not having to encrypt? And why such freedom is considered as poor? This is like forcing everyone to have a smart phone, car, passport, zillions of IDs, internet profiles and calling their shackled life as rich.

The other day someone was shocked to see that I don't have FB and instagram accounts. When did people lose their freedom not have social media accounts?

viraptor

2 hours ago

Because if the default is unencrypted, you'll accidentally send secrets in plaintext one day. And if the default is encrypted and works well - why would you ever take time to explicitly disable that? What's the situation where you want to say "just in case someone intercepts this message, I want them to be able to read it"?

sam_lowry_

2 hours ago

Encrypted communication has lots of practical drawbacks.

For me email is just fine the way it is. Deliverability could be better and Google/Microsoft duopoly is a problem but that's it.

Stop reinventing the wheel.