I am merely a user of corporate email and not an admin, so take that for what it's worth. But our current process is "Use regular email by default, and if the customer requests a secure provision, then refer them to our IT Help Desk to get set up with a per-user MoveIt account." The former option is not secure, and the latter option is massively customer-hostile.
I'm not saying that my company would ever unilaterally decide to use the Gmail service described in the article, but I wouldn't complain if any of our customers requested/demanded it.
(It's also a hell of a lot better than those "secure email" services offered by Cisco, etc., which are just password-protected logins to a third-party site, and which also require per-user accounts that never seem to work when you need to retrieve an email.)
Proton is wonderful. I recently switched to them because I don’t want all of my most important accounts tied to a US email provider in a country whose administration increasingly hostile to the rule of law and non citizens living in the US. Sadly, I wouldn’t put it past this administration to just cut people’s account access using arbitrary criteria or for speaking out against them. Nevermind the risk of plain text emails being swept up in a dragnet by powerful agencies that are losing their trustworthiness.I assume there is zero chance this ever comes to non-business/non-Workspace users?
I recently finally migrated over to Proton for personal use and I don't know what took me so long. Inertia, I guess. Loving it and not looking back.
It has been rethought at least twice. It was rethought as OPENPGPKEY records in DNS. The domain of the email address and a hash of the local part become a domain name that you look up to get the public key for that address. The owner of the domain is in control of the DNS records, and DNSsec guarantees that the response is genuine, so fake keys can't be uploaded by just anybody.The PGP web-of-trust model doesn’t scale well to public use. It’s still the standard for closed networks, but isn’t ever going to be a general-public solution unless the key handling is completely rethought.
With one important difference: SMTP over TLS is usually only opportunistic encryption. If Mallory intercepts your SMTP session, he can make it look like the server doesn't offer TLS, and the client will happily send the message unencrypted. A web browser given an HTTPS URL won't silently switch to plain HTTP if Mallory blocks the HTTPS port.it looks like the shift to TLS as a default rather than a special occasion has been as broad in email as it has with websites.
Proper use of IDPs mean that when the IDP is intercepted, it's used and dead.Uh, if Mallory is intercepting the encrypted email, what's to stop Mallory from also intercepting the IDP's verification email???
TLS has nothing to do with message encryption... It's transport levelWith one important difference: SMTP over TLS is usually only opportunistic encryption. If Mallory intercepts your SMTP session, he can make it look like the server doesn't offer TLS, and the client will happily send the message unencrypted. A web browser given an HTTPS URL won't silently switch to plain HTTP if Mallory blocks the HTTPS port.
Thanks - that really shows how long ago I stopped paying attention to PGP.It has been rethought at least twice. It was rethought as OPENPGPKEY records in DNS. The domain of the email address and a hash of the local part become a domain name that you look up to get the public key for that address. The owner of the domain is in control of the DNS records, and DNSsec guarantees that the response is genuine, so fake keys can't be uploaded by just anybody.
But most DNS providers expect customers to manage DNS records through their proprietary limited web interface. They aren't interested in adding support for some obscure new record type that only one odd customer asks for, and if they did, client programs would have to implement support for each proprietary web interface to be able to upload keys. And nobody bothers to verify DNSsec signatures anyway.
So to get around the DNS roadblock, the key handling was rethought as Web Key Directory. The domain of the email address and a hash of the local part become a URL that you look up to get the public key for that address. The owner of the domain is in control of the web server, and HTTPS guarantees that the response is genuine. Client programs upload keys by sending them to a designated email address. A challenge-response protocol over email, based on the assumption that an email provider can securely deliver mail to their own user's inbox, ensures that fake keys can't be uploaded by just anybody.
But email providers aren't interested in implementing and managing some obscure new service that only one odd customer asks for.
It's the same problem as with IPv6, IDNA, IPsec, SCTP and every other attempt to improve the Internet: Nobody can use it because vendors don't support it because customers don't demand it because nobody else uses it because their vendors don't support it because ...
With one important difference: SMTP over TLS is usually only opportunistic encryption. If Mallory intercepts your SMTP session, he can make it look like the server doesn't offer TLS, and the client will happily send the message unencrypted. A web browser given an HTTPS URL won't silently switch to plain HTTP if Mallory blocks the HTTPS port.
Feels a bit late for this, when FastMail and ProtonMail exist. Partnering with one (or both) of those options seems like it might've been a better use of Mozilla's remaining cash. I still wish them success.Tangentially related, I just read yesterday that Thunderbird is launching their own email service that they envision as a privacy focused competitor to Gmail. It'll have both free and paid tiers and I didn't find any information on the differences on those or how much the paid tier might cost, but still, a free tier with actual respect for privacy sounds appealing to me. I did sign up for the beta, so we'll see.
Anyone interested, read e.g. https://www.theverge.com/news/642228/thunderbird-pro-thundermail-email-service
I love PGP, but the little amount of extra steps you have to go through and the extra brainpower you need to understand what it is puts a lot of people off.What's wrong with PGP? Just post your public key for all the world to see. Anybody who wants to send me a message, encrypt it with that public key and only I can decrypt it with my private key that nobody sees. Problem solved, right? Am I missing something? You'd need some secret store on your browser for the private key, but OS's all do that these days, right?
This is the problem they are solving. People aren't wrong that this isn't making email truly secure but this isn't trying to sell that.I am merely a user of corporate email and not an admin, so take that for what it's worth. But our current process is "Use regular email by default, and if the customer requests a secure provision, then refer them to our IT Help Desk to get set up with a per-user MoveIt account." The former option is not secure, and the latter option is massively customer-hostile.
I'm not saying that my company would ever unilaterally decide to use the Gmail service described in the article, but I wouldn't complain if any of our customers requested/demanded it.
(It's also a hell of a lot better than those "secure email" services offered by Cisco, etc., which are just password-protected logins to a third-party site, and which also require per-user accounts that never seem to work when you need to retrieve an email.)
The biggest pains with actually using PGP everyday is client support, the minimal (virtually nonexistent) validation done by the free key servers, and the lack of a standard way to auto-discover key servers other than the big public ones. Once you’ve got a client that can do it, setting up a key is straightforward, and using it can be set to be transparent, automatically encrypting where possible and/or signing everything.The challenge with almost all IT security systems is making them usable, so that people don't do end-runs around them. This sounds a whole lot simpler than most of the current systems (S/MIME, PGP). It may not be perfect, but it's also not terrible either.
I'm doing the same. I'll take the subscription that includes a VPN and 500 GB storage, far away from Google prying eyes. They did drop their initial "don't do evil" motto for a reason.I recently finally migrated over to Proton for personal use and I don't know what took me so long. Inertia, I guess. Loving it and not looking back.
...passkeys and tokens...Seems to me that such a system could work just as well with passkeys and tokens, couldn't it? Infrastructure that's already in place?
Or is the long-term goal here to allow people to have their own KACL or use a public one they trust?
"They that can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety." -B.F.
Mary can easily show the correspondence she received. It might even be signed with John's key!The main issue with PGP — and I think even this solution, I'm not sure — is a compromised key results in a total compromise of all email ever encrypted with that key. That's... not great. You have to keep your PGP key secret, forever, since rekeying isn't possible. A feature of iMessage PQ3 and PQXDH (what Signal and WhatsApp use) is frequent re-keying. In PQ3 that's every message gets a new DH key, and every 50-ish messages a new Kyber key. PGP also suffers from having only have one key that every device shares, whereas iMessage supports multiple keys so each device has a unique key. (I think Signal only supports one target device, last I checked Signal and WhatsApp both perform decryption on the smartphone and then sync that via other means to an Electron app running on a desktop.)
From digging into the FAQs, Google's CSE lets you bulk re-encrypt by changing key providers in the backend system. I would surmise that you could do this every so often as a means of protecting against an attacker leveraging a compromised key in perpetuity like PGP, although being a manual process in CSE that means in practice it'll never happen.
Back on topic, about why CSE and not PGP. Having an administratively-controlled key server lets you handle situations that arise in the workforce, like "Alice quit and we need to give Bob access to that project" or "Mary told HR that John sent her a dick pic, we need to verify that". PGP doesn't allow for those cases by design, and that's okay. It's only pretty good privacy, not the be-all end-all.
Because it is the exact same "end-to-end" encryption as in messaging apps. So they use the term the customers are most used to, since almost nobody has complained about the term in messaging apps.They already had a perfectly good name for this in "client-side encryption" -- why misuse an established term (E2EE) to market this?
I miss Old Google.
Edit: If CSE wasn't good enough, they could've just made it CSED for "Client Side Encryption and Decryption" and still not needed to misuse E2EE.
True, but key escrow accessible my administrators is useful (although the non repudiation aspects are good for Mary if John is extra-stupid) for other situations. Lawsuits and evidence retention, for example.Mary can easily show the correspondence she received. It might even be signed with John's key!
Agreed on the Bob case.
Then don’t call it E2EE.Just more Google-bashing! Where's Ron??
This is EXACTLY what corporations have wanted -- private email correspondence in the organization for BUSINESS purposes!
This solution keep the company's email private to the company, and that's a good thing ... in case there's any doubt.
Corporations do not want E2EE! The company's business always belongs to the company!
And yes, this rollout is not for consumer Gmail user.
The issue is this is not good but ok, and it provides a false sense of security (which is kind of the point as they implemented it so that organizations that have to be compliant with whatever standard can use their services or use them without additional software/setup like s/mime).Yeah "better than the current standard" is the main point that people seem to miss - let's not let perfection get in the way of the 'good'