sudneo

joined 8 months ago
[–] [email protected] 1 points 2 months ago (4 children)

I can't comment on this, since I don't use the bridge for a while. But it's just an IMAP/SMTP server, so not sure why certain features wouldn't work. What service did you end up using which has gpg integration?

[–] [email protected] 5 points 2 months ago* (last edited 2 months ago) (4 children)

One of the biggest risks is when someone knows your password.

Just a curiosity. How do you think every password for every online service works? The service "has" your password. It is hashed, but if this doesn't matter (similarly for encryption) to you, then you should be panicking about basically everything.

In the case of Proton an attacker has basically these options:

  • Option 1: Attack you, try to compromise your device. If this is the case, your local keys are going to be taken, one way or another, even if you have them locally and encrypted. The only way you might save yourself in this scenario is if you store them on an hardware device (like a yubikey).
  • Option 2: Attack proton. Once the infrastructure is compromised, the JS code that does the crypto operation needs to be backdoored, you need to use the service while the JS is compromised, and the attacker will obtain the keys and the messages.
  • Option 3: Compromise the sender/recipient for the emails (this is in cleartext in any case).

In the case of a manual solution:

  • Option 1 is identical.
  • Option 2: Attack the software you use (let's say, mutt). Once you gain access to the repository, push a backdoored update and wait for you to install the new version. Incidentally, compromising this tool also allows the attacker to compromise your whole machine (unlike what happens with JS code, which runs at least in the browser sandbox).
  • Option 3 is identical.

So the tradeoff is really that:

  • With Proton an update is going to be pushed quicker and without your explicit interaction, but
  • compromising Proton is going to be much, much harder than compromising the laptop/repository for the handful of maintainers that generally have the keys to push updates for the software you are most likely going to use. We are talking company with security department + SOC vs maintainers with whatever security practice and no funding.

It’s not even hard to manually encrypt emails.

Yeah, and this is why 99.9% of the people have never and will never touch GPG with a 10-foot pole. The tradeoff is a complete no-brainer for the vast majority of people, because the reality is that for most, either someone else does the key discovery, management, signing, encryption, decryption, or nobody does. We can sit here and pretend that it's easy, but it's not. Managing keys is hard, it is painful, especially on multiple devices, etc..

EDIT:

The entire threat model for proton is also documented BTW: https://proton.me/blog/protonmail-threat-model

[–] [email protected] 4 points 2 months ago (6 children)

Introduces some risks in terms of security. Privacy concerns are extremely minimal, because in any case you don't control the setup of your other interlocutor(s).

Considering that the realistic alternative is not using anything at all and the fact that you have both options with Proton, it's a win-win scenario.

[–] [email protected] 3 points 2 months ago (8 children)

There is a reason: simplicity. Either you do all the key management yourself, which in practice means 98% of the people won't do it at all, or you implement a solution like they did and increase the risk of a small % (see my other comment) but you cover every customer.

[–] [email protected] 4 points 2 months ago (6 children)

It's not "insecure", it's simply a supply chain risk. You have the same exact problem with any client software that you might use. There are still jurisdictions, there are still supply chain attacks. The posture is different simply by a small tradeoff: business incentive and size for proton as pluses vs quicker updates (via JS code) and slower updates vs worse security and dependency on a handful of individuals in case of other tools.

Any software that makes the crypto operations can do stuff with the keys if compromised or coerced by law enforcement to do so.

In any case, if this tradeoff doesn't suit you, the bridge allows you to use your preferred tool, so this is kinda of a moot point.

The main argument for me is that if you rely on mail and gpg not to get caught by those who can coerce proton, you are already failing.

[–] [email protected] 16 points 2 months ago (3 children)

The Bitwarden client has all the data cached, so the server can be down and you still get access to the passwords (same for internet connection).

[–] [email protected] 8 points 2 months ago (20 children)

You upload your private key to the cloud. Encrypted or not, this is a bad idea.

An encrypted key is a useless blob. What matters is the decryption key for that key, which is your password (or a key derived from it, I assume), which is client side.

They can do the signing and encryption with my public key

They can't sign with your public key. Signing is done using your private one, otherwise nobody can verify the signature.

Either way:

and then I’ll do the decryption with my own private key locally without them storing it.

You can do it using the bridge, exactly like you would with any client-side tooling.

[–] [email protected] 2 points 2 months ago

It depends on location. Getting a disc shipped from the other side of the world, paying 20 bucks + shipping for each movie in not sustainable.

[–] [email protected] 3 points 2 months ago

Shouldn't we worry of enshittification when we are on the verge of, or on the descending side of trajectory?

So far they added features in a way that keeps respecting users rights, without changing their business model (which is 90% of the reason why companies enshittify BTW). Just because these products have something in common with products of companies who enshittified doesn't mean the same applies here.

[–] [email protected] 13 points 2 months ago (22 children)

You can use your own GPG key (https://proton.me/support/importing-openpgp-private-key or using the bridge), whatever tool does the signing needs the key (duh) so I am not sure what you mean by "they store your private key" (they stored it encrypted as per documentation https://proton.me/support/how-is-the-private-key-stored), their AI was specifically designed as local, exactly to be privacy friendly, plus is a feature that can be disabled (when it will reach general subscriptions).

I don't care about cyptocurrencies, but I suppose they started with the most popular, nothing to do with privacy as they just let you store your currencies.

Anyway, use what you like the most, of course, but yours don't look very solid motivations, quite a lot of incorrect information, I hope you didn't take your decision based on it.

[–] [email protected] 3 points 2 months ago (2 children)

I wish there were. I have a huge DVD collection (2000+), and yet now it's borderline impossible for me to find a DVD/Blueray for the stuff I want. Shops have shelves with maybe 100 blockbusters at most. It's also impossible to buy the single product online, you can "rent" it, but you can't buy it in a way that you can watch it with whatever device I want, with whatever tool I choose and without an internet connection.

This is my main beef with streaming services, you are permanently renting and therefore depending on the whim of the distributor (which in 90% of the cases now is also the maker).

[–] [email protected] 28 points 3 months ago (2 children)

I guess the answer would be "but I have a job already"...

view more: ‹ prev next ›