Google To Enable End-To-End Email Encryption, Highlight Good Email Security Practices
from the good-to-see dept
Back in December of 2012, we wrote about (and agreed with) Julian Sanchez's suggestion that Google should do end-to-end encryption of emails, even if it (only slightly) mucked with its advertising business model. The impact on overall security would be great (and this was before the Snowden revelations had even come out). As Sanchez pointed out, not only would this (finally) drive more widespread adoption for email encryption, it would create enormous goodwill among privacy advocates. About six weeks ago, we mentioned this again, when it was rumored that Google was trying to make encrypted email easier, though it was said that it wouldn't go "site-wide" on end-to-end encryption.A new blog post on the Google blog* has now detailed at least some of Google's plans, including offering a new End-to-End Chrome extension that will make it much easier for anyone to send and receive encrypted email messages. This is a big step forward, and hopefully shows how serious Google is about actually encrypting messages, rather than leaving them open for snooping.
This announcement came along with adding a new section to Google's famed transparency report, entirely focused on email encryption in transit, which will hopefully increase the use of Transport Layer Security (TLS) from other email providers out there. In the initial report, Google notes that 65% of outbound messages on Gmail to other providers use TLS, while 50% of inbound messages use TLS (over the last 30 days). And, more importantly, it highlights who supports TLS... and who doesn't (Comcast seems to be a shameful leader on that front). With some transparency, hopefully it will lead more email providers to adopting TLS.
* For the sake of full disclosure, the author of the blog post on Google's site is an old friend of mine, whom I've known for nearly 20 years (I feel old), since long before he worked at Google. I had no idea he was working on this and actually haven't spoken to him in probably a year or two (because life happens). I didn't find out about it from him, but from people talking about it on Twitter.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: chrome extension, email, encryption, end-to-end encryption, gmail, pgp, privacy, security, tls
Companies: google
Reader Comments
Subscribe: RSS
View by: Time | Thread
How many other companies:
1) Have a 'don't be evil' sign in their lobby
and
2) Have publicly said 'fuck the NSA'
[ link to this | view in thread ]
Re:
As to Gmail, it's the least-worst of the freemail providers, but it's still very low quality and I emphatically recommend against it for anyone who's serious about email privacy, security and reliability. Get a real mail account with a real provider and use a real mail client (that is: NOT a web browser).
[ link to this | view in thread ]
Then too there is the spying done by themselves to aid in advertisement. Not for one second do I believe Google doesn't have the back door key to look at anyone's email that uses their services. If it's there for Google it's there for the NSA with a court order.
As long as the NSA is rampant on it's mission of collect it all with no oversight and no one interested in pulling them back in the Administration, I have no belief in this effort as meaningful.
[ link to this | view in thread ]
Re:
Fair enough -- though if the encryption is truly end to end, with people doing a full vulnerability review, it should be that Google *cannot* reveal the contents, because Google never actually sees the content.
Then too there is the spying done by themselves to aid in advertisement. Not for one second do I believe Google doesn't have the back door key to look at anyone's email that uses their services. If it's there for Google it's there for the NSA with a court order.
Right. But the point w/ end to end encryption is it's NOT there for Google. They never see it.
[ link to this | view in thread ]
It'll be a different name though, with a different team. But TrueCrypt itself isn't coming back. It done bought the farm. I wonder if we'll ever know whether the original team were heroes or cowards, or what the story was. It seems they left that to our imaginations.
Getting back to Google, I do applaud their efforts but there's only so much they can do. When asked, will they hand over the keys to the kingdom? Have they already? How would we know? We can be pretty sure they won't shut down the whole thing ala Lavabit. As far as I'm concerned:
"99 ways to have privacy, and a large corporation aint one."
[ link to this | view in thread ]
Yes or no?
That's the only thing that matters. If the answer is yes, then screw them.
[ link to this | view in thread ]
Is that's what's happening here?
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re:
In that light, this is a good move by Google, because when (not if) they get hacked, they'll have less data to disclose. But...even if the messages are encrypted, they'll still have the metadata[1], and that facilitates traffic analysis which in turn facilitates tracking and association.
[1] They have to, otherwise they can't deliver messages. They can certainly scrub the logs often, but if someone taps them in real time, scrubbing them won't accomplish much.
[ link to this | view in thread ]
Re:
Is that's what's happening here?
Yes. From what's being said about the extension, that's exactly what happens. Google never has the private keys.
[ link to this | view in thread ]
Re:
Yes or no?
They can't. Because they have no access to your private key, so the content of your emails is hidden from Google.
[ link to this | view in thread ]
goodwill indeed!
[ link to this | view in thread ]
Re:
1. The code hasn't been independently reviewed or audited. They've released it -- so now it can be, and probably will be. But it hasn't yet.
2. It's written in Javascript. Ugh.
3. It thus still relies on using a web browser to access email, which is a perfectly horrible idea.
4. It still exposes metadata. (In Google's defense, this isn't solvable in this context because mail has to be addressed to someone.)
5. Based on their FAQ, it's not clear to me how they expect correspondents to exchange keys.
6. I'm not entirely sanguine about the way they've chosen to manage the key ring. It might be fine. It might not be. Need to think about it.
7. Their answer to the question of whether or not attachments are also encrypted is ambiguous. I suspect this is just the result of poor wording choice and not an attempt to be evasive.
8. They're trying to comply with relevant IETF standards. That's a good thing. But they do note, and probably correctly, that there will likely be interoperability issues, e.g. user@gmail.com, who is using this Chrome extension with Chrome on Windows, sends encrypted email to user@example.com, who is using GNUPG and FreeBSD. Will it work? Don't know.
The killer with this is #4, because -- by definition -- it can't be fixed. "Capturing traffic metadata from gmail" is no doubt a primary objective of many intelligence agencies and it's too much to hope for that they've ALL failed.
[ link to this | view in thread ]
Eliptic Curve's ugly head surfaces again
But isn't it also compromised to the NSA?
[ link to this | view in thread ]
Re: Eliptic Curve's ugly head surfaces again
http://soylentnews.org/article.pl?sid=14/05/31/0329201
[ link to this | view in thread ]
Re: Re: Eliptic Curve's ugly head surfaces again
[ link to this | view in thread ]
Re: TrueCrypt not open source
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re:
After Lavabit, trusting the security of someone else's keys makes perfect sense. The web pages and Javascript code could be compromised by NSA in the middle, and all security and privacy flies out the window.
[ link to this | view in thread ]
Re: Re: TrueCrypt not open source
In addition, on a practical level, the developers are unlikely to be able to prevent anyone from doing so. They'd have to out themselves (unlikely) and they'd have to show standing (in court) to take action, which they would have great difficulty doing.
At this point, Truecrypt has essentially been abandoned and anyone is free to pick it up. Early indications are that the truecrypt.ch people are clueless ignorant self-promoting newbies who want to do stupid things like put in auto-update, while the geekcrypt.net people are much more savvy and understand the need for stability.
Personally, I'd like to see all support for Windows ripped out, because it's pointless: anyone using Windows isn't serious about security and privacy anyway, so screw them. It's not worth the effort it takes to support such a markedly inferior operating system, since that takes away from the time available to support better ones. But I doubt either project will do that, sadly.
[ link to this | view in thread ]
Re: Re:
As for e-mail, my ISP recently implemented OpenPGP via their webmail service. A step in the right direction, but I can never get TLS nor AES to work using regular e-mail apps installed on my PC.
I did finally stop procrastinating about getting a VPN and adopting OpenPGP (Gpg4win) though, especially when I saw which way the wind was blowing here in Canada with Bill C-13.
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re: Re:
Yes. For details, please see these:
http://www.theguardian.com/technology/2014/may/30/encryption-software-truecrypt-closes-doors
ht tps://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html
http://meta.ath0.com/2014/05/30/truec rypt-warrant-canary-confirmed/
https://gist.github.com/ValdikSS/c13a82ca4a2d8b7e87ff
and what looks to be the most promising project:
http://geekcrypt.net/
[ link to this | view in thread ]
Terrific, we're gonna need it in Thailand
You get dragged into a taxi, detained and released only when you sign a pledge not to protest or critize the military junta on penalty of a year in prison.
The internet is heavily censored, and their latest thing is they want all the connected routed through TOT, so they can monitor all internet traffic and censor social sites heavily forcing only approved speech on an approved social network site:
http://asiancorrespondent.com/author/siamvoices/
Latest proposal is to make 'Les Majeste' apply to General Prayut too (the coup General), raising him above the level of the King.
Well at least Tor still works for now.
[ link to this | view in thread ]
The drawback to using PGP encryption are the keys. Misplace one and no longer can those emails be retrieved. Anyone who has ever had to reformat a system because of a fault or bought new computers will attest to this.
This means Google has to be storing the user keys somewhere, and call me cynical to believe these aren't accessible to anyone but me.
This article presents a fundamental problem with people's understanding of encryption: they simply don't know how to use it or they don't care to take the risk to lose their emails should the key be lost.
If Google really wants to make a difference, encrypt the internet as a whole, so everything is encrypted.
They can start by giving away free certs and maintain the encryption keys on a server that no one has access to.
Let's see if they're willing to step up their game, instead of taking credit for something they didn't really do.
[ link to this | view in thread ]
Re: Terrific, we're gonna need it in Thailand
Really? I've done my best to insult and degrade the King for years, because I think the concept of "Les Majeste" is bullshit. Now I'm going to have to expend all that effort again on Prayut?
Sigh. Alright. I suppose I can spare the time.
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
1) If you select "Americas" in the Select Region drop down menu, you will see that Verizon is also sitting pretty at 0% TLS support.
2) There might be a bit of marketing going on here. Google seems to be talking specifically about TLS, and it's possible Comcast and Verizon support SSL. The Google report implies that Comcast and Verizon use no encryption, but it's possible that they just use outdated encryption. Does anyone know whether or not Verizon or Comcast support SSL between mail servers?
[ link to this | view in thread ]
Already here..
https://www.mailvelope.com/
(although the firefox version doesn't seem to work with the current release of firefox, the chrome version works just fine)
[ link to this | view in thread ]
Re:
I have opportunistic encryption turned on in my mail servers: that is, if the other side supports it, my side will try to use it and both sides will attempt to negotiate a common cipher.
Looking at my mail logs from yesterday, I don't see any support from Comcast or Verizon. Caveat: that's just my observation and it may be something idiosyncratic to my site. But other large providers don't support it either, e.g. mail.com actually refuses email using transport encryption.
[ link to this | view in thread ]
Will they ignore US export laws ?
[ link to this | view in thread ]
Re: Re: Re: TrueCrypt not open source
The encryption code is not included, and probably needs a clean room implementation to be free of potential encumbrances.
"I'd like to see all support for Windows ripped out, because it's pointless: anyone using Windows isn't serious about security and privacy anyway, so screw them."
I disagree with this. Those clueless users need encryption too if only to reduce the risks of compromise for others. If you use truecrypt to protect data that you ever share with anyone else then I would think you'd want to encourage them to protect it too, even if they're on Windows (and even Bruce Schneier uses Windows for day-today use). Also truecrypt's gentle user interface can be taught to less-techie Win users (ever tried to explain command-line gnupg to people who have never seen a command line?) First educate the Win user and give them an easy interface, then transition them to another platform where they can see the same truecrypt functionality and feel warm fuzzy glows of familiarity. We were all clueless once.
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re: Re: Re: TrueCrypt not open source
If only that were actually true: that is really DID reduce the risk to others. But sadly, it's not.
1. Windows is probably backdoored. Microsoft's top brass may or may not know about it; some of Microsoft's people may or may not know about it; but I in light of what we've learned in the last year I can't imagine that there haven't been multiple attempts by extremely clueful well-funded adversaries to backdoor it.
2. A Windows system running Truecrypt BUT with a keystroke logger or other capable malware installed provides no security at all, since of course the system's real owner has access to any Truecrypt passwords.
3. Windows systems are infected with malware on a chronic and systemic basis: the botnet plague is over a decade old and sensible estimates of its scope as in the hundreds of millions. (See for example http://arstechnica.com/news.ars/post/20070125-8707.html which is likely by now a serious UNDERestimate.
4. Schneier might be able to run a Windows securely because he's smart, clueful and careful. How many Windows users have even a fraction of those qualities? As Ranum astutely observed, "There have been numerous interesting studies that indicate that a significant percentage of users will trade their password for a candy bar, and the Anna Kournikova worm showed us that nearly 1/2 of humanity will click on anything purporting to contain nude pictures of semi-famous females."
(There are people who can freeclimb El Capitan. That doesn't mean it's a good idea for ordinary mortals.)
5. Running Truecrypt on Windows is like bolting armor plate onto a Yugo and pretending it's a tank. It's bullshit. It's a half-ass happytalk feelgood useless gesture that not only provides no real security or privacy, but actually makes things worse because it presents the illusion of security and privacy but not the substance.
If you (rhetorical you) want security and privacy, even a modicum of both, then STEP UP. Run Linux or BSD, both of which of course have their faults, but both of which are enormous steps up from the shitpile of Windows. LEARN. Take some responsibility for your own computing environment instead of wallowing in the pigsty.
[ link to this | view in thread ]
Re: Re:
I suspect they might be supporting the (obsolescent) inline PGP format rather than PGP MIME (both are standardized). It's simple (for working with Web text boxes), and a decent start, but I think they'll need to do better.
[ link to this | view in thread ]
Re: Re: Re:
I'm aware. This is not my first day on the Internet. For example, Usenet provides a viable model for widespread/broadcast distribution of messages that aren't addressed to anyone. However, those still carry source metadata, and some of that is actually necessary in order for Usenet to work properly. (For example, article propagation, including avoidance of duplicates, relies on it.)
But Usenet is not email. Neither are some of the other things that are proposed. That isn't to say that they're bad: some of them are quite good. But it is to say that billing them as email is a misnomer.
And the problem with that is that email is still THE application on the Internet. Yes, it would be nice if we could declare a flag day, replace it entirely and move on, but that will never ever happen. So we need to work with what we've got, and one of the ways to mitigate the mass collection of metadata by adversaries is to stop making it easy for them. ("easy", as in 15,373 organizations all outsource their email to Google, making it much easier for an adversary than if they were all separate.) If I were to tap into Google, Yahoo, Hotmail, AOL, and a few other services, I'd have my dirty fingers on a substantial percentage of the Internet's mail volume. That's bad.
So yes we should use strong encryption. Yes we should audit the software. Yes we should have cryptographers vet the algorithms and the code. Yes we should encourage everyone to use this. But we also need to get people to stop handing their operations over to third parties like Google and cloud vendors, because those third parties have targets painted on them that are large enough to see from space. (e.g., there is NO WAY that Rackspace's cloud and Amazon's cloud aren't tapped. Of course they are.)
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
Re:
The main reason PGP isn't ubiquitous is because it's inconvenient. Automatic end-to-end encryption resolves both of those problems for people using gmail (personally, the cast majority of people I know don't use gmail, so none of this impacts them at all). All in all, it's a good, but imperfect, thing.
"If Google really wants to make a difference, encrypt the internet as a whole, so everything is encrypted."
How would Google do this? They don't run the internet, and don't have anything close to the power to do something like that.
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re:
An encryption system is only as strong as its weakest/easiest to attack link, which in this cases is the Javascript implementation, and its dependency of Google keys for security. The one lesson from Lavabit is that third party keys cannot be trusted, and as Ed Snowden has shown, NSA is prepared to run man in the middle attacks, and demand the certificates and keys necessary to do this from US companies.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
I would argue that even if Google & the NSA can read the email encrypted in this manner, it's still more secure than no crypto at all -- which is what the target audience would be using.
People who are very concerned about their privacy are already encrypting their emails, and Google's crypto doesn't prevent that from happening.
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
I am not arguing against encryption in general, just this implementation. Its problems are:-
1) Crypto code loaded from an external site when the email page is opened.
2) NSLs and NSA's willingness to run man in the middle attacks.
It encryption algorithm may be strong enough to defeat government snooping, but an external party has control over the actual version used, and it is running in a complex code environment of a web page. Without going to much more trouble that using PGP stand alone, and managing your own key exchange, this system cannot be relied on not to be compromised when used. That is at run time it is difficult to prove that an audited version of the code is being run, and that their is no other code associated with the web pages is exporting the plain text or private key.
NSLs mean that there is no guarantee that you are actually connected to Google servers.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
You miss my point. People who are really worried about this won't be relying on Google to do it (especially since they won't be using gmail!). They'll be using their own crypto anyway. Google's effort is an attempt to protect people who aren't concerned enough to implement a real solution. I fail to see how this can be anything but an improvement, even if the security isn't ironclad.
[ link to this | view in thread ]
googles modus operandi is antithetical to privacy.
techdirt has some serious cognitive dissonance when comes to reporting anything related to google.
this is no more then a worthless PR gimmick and you've done some fine marketing for them here, as always.
it's hard to understand how TD can do such outstanding work covering tech/IP/NS related legal/moral issues, but utterly fail when it comes to explaining how those same issues affect the current climate which the tech mega-corps must operate.
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re:
Actually if they are not using PGP you cannot send them an encrypted email, and the cannot verify any signature you place on an email. That way, so long as private keys are kept private, only the recipient can decrypt the email contents, and only the sender could have signed it. (It is a bit pointless using a private key to encrypt contents when the public key can decrypt it.)
[ link to this | view in thread ]
[ link to this | view in thread ]
Both OTR and ZRTP support soft lived ephemeral keys, which enable Perfect Forward Secrecy, meaning even if an attacker gets ahold of your private key, they can't go back and decrypt years worth of your messages.
OpenPGP doesn't support Perfect Forward Secrecy. OpenPGP keys are long lived. The best email project I know of that's trying to address these issues, is leap.se .
Either way, email should be avoided as much as possible. There's just too many legacy issues with email. It's best to go with easier, more secure options than try to fix legacy email. In my opinion.
[ link to this | view in thread ]
Re: Re: Re:
Huh? Of course you can. They just won't be able to read it -- it will look like gibberish.
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re:
The point isn't to make your stuff perfectly secure. The point is to make it take effort. A "bulk collection" system can't dragnet everything if it has to take the time to break the encryption on all of it. It's sort of like locking your front door; a determined invader will get into your house. They just can't do it easily, and without taking time and/or making some noise. By making encryption standard practice, we force the government and law enforcement to choose their targets based on evidence...which is the whole point.
Disclaimer: My explanation of encryption is extremely simplified and not perfectly accurate. I couldn't think of another way to put it without writing a small novel. My apologies for any confusion.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: TrueCrypt not open source
My first week using Linux Mint I ran into the following issues:
1. The login screen at operating system start would not take input. Every time I booted up I would have to use hotkeys to log back out, then log back in. The second time it would work.
2. The mouse sensitivity was through the roof, making the system almost unusable. The system options had no sensitivity adjustment, and no mouse drivers were available anywhere to adjust it. Instead I had to create a set of console commands that auto-ran every time I booted into the system to manually set the mouse sensitivity.
3. My Soundblaster card played all system and program sounds...except any sound played through the Linux version of Google Chrome. Nothing I could find online would fix the issue. If I wanted sound to play through Chrome, I would have to plug my speakers into my onboard sound. Disabling onboard sound in bios only disabled sound from Chrome completely.
4. Only five out of the two hundred games I own on Steam play natively on Linux, and of those only two would actually run. WINE fixed some of the programs, which ran slower and required a minimum of an hour to research and set up, sometimes much longer, and sometimes they would never work.
5. None of the free or paid Linux "Office" style programs are superior to Microsoft's offerings. They aren't bad, but they lack a lot of powerful features.
I love the idea of Linux. But at some point I want to actually use my computer rather than search message boards for how to do basic stuff, like control sound output or adjust mouse sensitivity.
My computer is custom built (by me) and I've been a heavy computer user since before Windows existed (mostly MSDOS). I remember having to create custom startup scripts for individual programs and fighting just to have basic functionality (ironically, things like the mouse and sound). I don't feel like going to back to those days.
If I wanted absolute computer security, I could just not use a computer. At some point you have to give up some level of security for functionality, and right now (for me at least) Linux sacrifices WAY more functionality than I'm willing to give up.
This is coming from someone familiar with programming, hardware, and advanced system tools. There is simply no way someone with less knowledge is going to be willing to put up with that poor of service for more than a week, not even for free. For all it's flaws (and it has many), Windows works. And it works without requiring a technical background.
I realize my issues are not ones that everyone has or will experience. It could have been my version of Linux, it could have been my mishmash of hardware, it could have been a lot of things. The point is that the system was difficult to install and made a terrible first impression, and I really wanted to like it.
I lasted about a month, then reformatted and reinstalled Windows, got SRT working to use my SSD as a cache, and ended up with a system that worked way faster than Linux without the hassle of a SSD system drive with a separate "install" drive, and all my hardware and software works pretty much out of the box.
Linux just isn't there yet. Maybe it will be one day...but that day is not today.
[ link to this | view in thread ]