Do you use secure email

Interesting conversation & I thought I’d add my two-cents to the topic:

I use Claws-email with the GPG plugins enabled. I avoid using ANY “free” email providor, especially if their company makes $10.74 billion in selling OUR information to whomever it wants; I had used Lavabit.com until the owners closed it due to NSA pressure. Sadly, it is now necessary to find an offshore (for those living in the U.S., that is) company that supports privacy & encrypted communication. After evaluating several, I ended up on Countermail.com.

Sadly, I do not encrypt hardly any of my email as most people I know do not use encryption. I have used One-Time-Encryption keys for emails as well as GPG/PGP for those users who employ that security.

Another sad, pathetic development for the Internet: http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

The lessons I would take away from the conversation above and my post:

  1. Do NOT rely on any encryption technology to store extremely sensitive data; do not store that data on any computer at any time, somebody somewhere will be able to get it;
  2. Do NOT use “free” services without checking them out, first:
    2a. I remember being a young lad when I was told that nothing in this life is free; everything comes with a cost; what’s the cost for a free email provider? Loss of privacy? Ads?
    2b. Do you trust the Linux developers up & downline of your distro? How many of us check the kernel anymore? I know I have not; has the NSA worked with Torvalds or any other major developers?
    2c. For SUSE, from what repositories are you installing? Has Novell opted to put in a backdoor? Who develops that driver you just installed? etc.
  3. If you do store data on your system, encrypt your hard drive with whole-disk-encryption; or, lacking that, encrypt your swap file & home directory.
  4. Choose a good email program that supports encryption and privacy; many of them do; however, some are less effective than others.

It may all be a moot point, given that the NSA has a quantum computer available to them, even if it is “just” using their tech subsidiary, Google, Inc. :stuck_out_tongue: And, the CIA program, Facebook, makes it easy to keep track of most people on the planet: Although this is tongue-in-cheek, PRISM proved it to be probably true: https://www.youtube.com/watch?v=cqggW08BWO0

On 16/09/2013 15:27, susecmail wrote:[color=blue]

Interesting conversation & I thought I’d add my two-cents to the topic:

I use Claws-email with the GPG plugins enabled. I avoid using ANY
“free” email providor, especially if their company makes $10.74 billion
in selling OUR information to whomever it wants; I had used Lavabit.com
until the owners closed it due to NSA pressure. Sadly, it is now
necessary to find an offshore (for those living in the U.S., that is)
company that supports privacy & encrypted communication. After
evaluating several, I ended up on Countermail.com.[/color]
I tend to use enigmail - not because there is anything wrong with claws
(I even have it, it came with one of the pgp4win installs) but because I
find the feature-rich plugin community fills a lot of my other needs
(plus of course gpg users are the exception)

I also have a copy of https://www.quicksilvermail.net/ but of course I
don’t use that for anything, honest :slight_smile:

[color=blue]

Sadly, I do not encrypt hardly any of my email as most people I know do
not use encryption. I have used One-Time-Encryption keys for emails as
well as GPG/PGP for those users who employ that security.[/color]

That is a problem for me too. I can count on, ok, more than one hand,
but less than two, the number of people I know who have a secure key,
and of that, less than half would routinely encrypt their mails to me
(even in reply to a secure mail) unless I set up their enigmail for them
for secure-reply as a default :slight_smile:
[color=blue]

Another sad, pathetic development for the Internet:
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

The lessons I would take away from the conversation above and my post:

  1. Do NOT rely on any encryption technology to store extremely sensitive
    data; do not store that data on any computer at any time, somebody
    somewhere will be able to get it;[/color]

Some data really cries out for computer storage. One takeaway from the
snowden affair was that a physical airgap and encrypted exchange
(physical) media was acceptable to Snowden; I believe truecrypt was used
for the latter, but don’t have a reliable source on that.

[color=blue]

  1. Do NOT use “free” services without checking them out, first:
    2a. I remember being a young lad when I was told that nothing in
    this life is free; everything comes with a cost; what’s the cost for a
    free email provider? Loss of privacy? Ads?[/color]

If you aren’t paying, you are the product. Who are you being sold to.
Sadly, if you are paying, maybe they are getting paid twice.
[color=blue]

2b. Do you trust the Linux developers up & downline of your distro?
How many of us check the kernel anymore? I know I have not; has the NSA
worked with Torvalds or any other major developers?[/color]

I would be surprised if they had, but you have to recall that the NSA’s
own patches to the kernel are mainstream, so worth checking. That said
though, it would appear the NSA are more interested in compromising
binary installs of browsers and servers, mostly on the windows platform,
and can substitute downloaded installers “on the fly” for targets of
interest. And who is to say everyone isn’t a target of interest?
[color=blue]

2c. For SUSE, from what repositories are you installing? Has Novell
opted to put in a backdoor? Who develops that driver you just
installed? etc.[/color]

At some point, the paranoia has to get too much. It is worthwhile noting
that, even in the very earliest days of the unix project, a way was
found to booby trap compilers so that they would always compile in a
backdoor in certain executables (such as openssh) not present in the
source. They would also always compile in the above code if the
compiler is recompiled, and also the code to compromise the compiler (so
compiling the compiler multiple times would not remove it)

Usually, a compiler is compiled using a hand-coded and very inefficient
compiler. The resulting binary doesn’t work fast, but does produce
efficient code (much better than the hand-coded compiler). The efficient
compiler is then recompiled with its inefficiently compiled self, to
produce an efficient compiler that runs efficiently. If that first
bootstrapping compiler, hand-coded in assembler for which no source code
is usually supplied, had the backdoor, no copy of the binaries for the
efficient compiler would ever exist without the backdoor, despite that
backdoor never, ever appearing in the source of the compiler.

obviously, what keeps me awake nights is a bit more complex than what
you worry at :slight_smile:
[color=blue]

  1. If you do store data on your system, encrypt your hard drive with
    whole-disk-encryption; or, lacking that, encrypt your swap file & home
    directory.[/color]

Actually, the opposite.

If you store data, then ideally you want a read-only operating system
such as a boot cd, that has no networking support. You can then boot to
that os, mount the encrypted partition, decrypt (from the unencrypted
windows drive) encrypted inbound data, work on it within your secured
environment, then store encrypted outbound data on the windows partition
and reboot back into your untrusted os.

Now all you have to worry about is that the tpm/uefi bootstrap has some
code in it to compromise stored in memory keys after your secure
partition is mounted.

[color=blue]

  1. Choose a good email program that supports encryption and privacy;
    many of them do; however, some are less effective than others.[/color]

A good choice of key is crucial, but from statements made so far I am
reluctant to believe that the MS cryptographic core remains untainted,
and it is possible the openssl core is compromised too. Not sure WHAT
that leaves, given 95% of the crypto code out there is rooted in one or
the other of those.
[color=blue]

It may all be a moot point, given that the NSA has a quantum computer
available to them, even if it is “just” using their tech subsidiary,
Google, Inc. :stuck_out_tongue: And, the CIA program, Facebook, makes it easy to keep
track of most people on the planet: Although this is tongue-in-cheek,
PRISM proved it to be probably true:
https://www.youtube.com/watch?v=cqggW08BWO0[/color]

Quantum Cryptanalysis is overrated. Just as in theory you can break
symmetric keys by running “enough” processors in parallel, a QC has to
have sufficient qbits, in sufficient parallel probability fluxes, to
hold all possible states simultaneously - as I understand it, each of
those possible states must be powered, so at some point you are forcing
enough power into the solution that it will fuse atoms below iron. That
practical limit is thought to lie far below what we can already achieve
by brute force (although, it would be cool to have a RSA key broken
near-instantaneously rather than over months by a server farm the size
of a small town)

The new DWave approach, should it prove viable, may give a significant
improvement to the limit - DWave qbits are, as I understand it, much
less stable than classical QC qbits, so may (or may not) yield a correct
answer. However, it may be the case that sufficient runs of the QC,
tested using a conventional computer, might still find results for
larger keys in the EC/DSA space in a realistic timespan (days or weeks)
where conventional computing is likely to take centuries. Scientists are
alternatively enthusiastic and skeptical about DWave’s claims though. So
it would be wise to remain on the fence. I have not seen any suggestion
that the factorization hard problem underlying RSA is likely to be
suitable for the DWave though, so as long as that is true, I am going to
use Schneier’s own actions (of issuing a new gpg 4K key using trusted
code) as a guide for mine :slight_smile:

@David Howe

Yeah, I’m fairly paranoid, in general; I’m not afraid to admit that; however, my life experience has shown me to always consider the circumstances from every conceivable angle available to me at the time. I’ve been in some crazy life or death situations that have given me grey hairs ahead of my time :P.

I know that in actual practice, average users should fall somewhere between my take on life & the current laissez-faire attitude. Using a computer for data storage and computation (etc.), is a compromise. Also, I’m not sure I’ve ever heard of Shneier or what he (or she) advocates, I’ll have to look that up, thank you.

Without getting into a lot of detail, I know for a fact that the technology the public sees today is 50 years or more behind where it actually is in development, generally speaking, of course. There are some amazing projects being developed that I wish I were able to take part in (well, at least when I was more aware of them…); there are other projects that would scare the heck out of any sane, rational human being.

From what I’ve seen, the OpenSSL core might very well be tainted; I hope it is not, but evidence seems to indicate otherwise.

If I remember correctly (and I may not, being a victim of an aneurysm rupture), the problem of compiling a “backdoor” into NIX base functionality crept back in to the Linux kernel around 2.6.14-ish; I cannot remember the two people who provided a white paper on how the ‘ls’ function could be compromised, both quickly and simply, due to security issues in that specific kernel release as a proof-of-concept report. Of course, the problem was quickly fixed; however, it demonstrated that continuous oversight and untiring vigilance should be SOP.

I used to meticulously track down and read through almost every package I installed on my systems back when there were not too many around; however, today, I blissfully trust Novell and other repository maintainers to update my machine without checking the code. I’ve observed all my friends doing the same, even those who were more meticulous than I was in the mid-1990’s. I’ve come to the point where I do not trust my ability to maintain a level of system security to such a degree that somebody else could not get it. As a consequence, my taxes are hand prepared by an accountant and other extremely important documents are paper-based stored in fireproof, locked containers. While somebody may be able to access them, they would have to be physically at my location to do so.

As far as using a read-only OS not connected to the network & using a virtual environment, excellent recommendations! I have worked in one situation where that was necessary and several others where it ought to have been employed.

BTW, your name is not too common and I have a cousin who shares it with you :).

On 16/09/2013 23:34, susecmail wrote:[color=blue]

@David Howe

Yeah, I’m fairly paranoid, in general; I’m not afraid to admit that;
however, my life experience has shown me to always consider the
circumstances from every conceivable angle available to me at the time.
I’ve been in some crazy life or death situations that have given me grey
hairs ahead of my time :P.[/color]

There is always an appropriate level of security awareness. If it is
paranoia is something that can only really be judged in the failure
(i.e. you were insufficiently careful) while a bit of overkill,
particularly in the crypto field, is usually little harder than a
just-good-enough solution.
[color=blue]

I know that in actual practice, average users should fall somewhere
between my take on life & the current laissez-faire attitude. Using a
computer for data storage and computation (etc.), is a compromise.[/color]

Indeed. Good tradecraft is to have different levels of protection for
different types of data. There is data that it is safe to use commercial
solutions (such as skype, decidedly porous to the NSA and MS themselves,
and stuff like cisco CRES) for, data that end to end crypto (such as pgp
or s/mime) for, though on an otherwise only normally secured computer,
data that a certain amount of paranoia is indicated for (see the prior
pseudo-airgap solution), and then data where the machine itself should
never, ever see a network of any type, stock live media be in use, and
removable media used as the interchange medium by trusted courier only.

Most people will never, ever get to the last step, journalists should
consider (at least these days) anything from confidential sources to
require the latter, if they ever want them to remain confidential.
[color=blue]

Also, I’m not sure I’ve ever heard of Shneier or what he (or she)
advocates, I’ll have to look that up, thank you.[/color]

https://www.schneier.com/crypto-gram.html

fairly well known :slight_smile:

[color=blue]

Without getting into a lot of detail, I know for a fact that the
technology the public sees today is 50 years or more behind where it
actually is in development, generally speaking, of course. There are
some amazing projects being developed that I wish I were able to take
part in (well, at least when I was more aware of them…); there are
other projects that would scare the heck out of any sane, rational human
being.

From what I’ve seen, the OpenSSL core might very well be tainted; I hope
it is not, but evidence seems to indicate otherwise.[/color]

Yup. if it is though, its subtle. Of course, much of openssl implements
standards, and a clean implementation of a tainted standard is still
tainted.
[color=blue]

If I remember correctly (and I may not, being a victim of an aneurysm
rupture), the problem of compiling a “backdoor” into NIX base
functionality crept back in to the Linux kernel around 2.6.14-ish; I
cannot remember the two people who provided a white paper on how the
‘ls’ function could be compromised, both quickly and simply, due to
security issues in that specific kernel release as a proof-of-concept
report. Of course, the problem was quickly fixed; however, it
demonstrated that continuous oversight and untiring vigilance should be
SOP.[/color]

http://cm.bell-labs.com/who/ken/trust.html
[color=blue]

BTW, your name is not too common and I have a cousin who shares it with
you :).[/color]

Yeah. Luckily, the head honcho over at the syfy channel also shares it,
which has pushed most of my online presence off the first few pages of
google… except, oddly, for my linkedin account.

On 17/09/2013 09:47, Dave Howe wrote:[color=blue]

Yeah. Luckily, the head honcho over at the syfy channel also shares it,
which has pushed most of my online presence off the first few pages of
google… except, oddly, for my linkedin account.[/color]

Urk. I really, really need to either adopt a pseudonym or stop
pontificating so much on crypto. Now, how to reduce my google footprint?