Some clarification on this topic from my side.

Because Thomas (the original developer of Mailvelope) wanted to let
> the extension work as it was, with the unsecure encryption inside DOM,


This is not my position. I commented on this topic as follows:

But of course best is to have the choice. Therefore I would like to see two
> different modes in Mailvelope:
> the current one (as default) that is integrated in webmail with all the
> risk and all the comfort.
> And a second one that offers strong isolation but maybe less usability.
> The mode is then configurable in the settings.

see: https://github.com/toberndo/mailvelope/issues/14

I agree that the security limitations of Mailvelope have not been
communicated properly from the start.
It's a young project, I didn't see all implications from the beginning and
there has been also no security audit yet.
Meanwhile I put a section in the documentation that describe the
limitations to my best knowledge:
http://www.mailvelope.com/help#security

Mailvelope has a strong focus on usability. It wants to lower the barriers
of entry to email encryption for people
with previously no experience in this field.
The question I want to ask with this project is: let's assume there is a
correlation between the usability of a security solution
and the number of people who are willing to use it. There should be a big
target group who either use a convenient solution
or stay away from e.g. email encryption at all. A copy&paste solution from
Karel (and optional with Mailvelope in the future)
could be already above the pain barrier of this group.
Now given this target group and the two alternatives: either no encryption
or Mailvelope (with its limitations). Does the whole situation
regarding mass surveillance of email traffic improve, zero effect, gets
worse?

I am thankful for all insights about this question.

Thomas

P.S. Could somebody please forward this mail to the liberationtech mailing
list in the relevant thread? I just subscribed...





On Mon, Dec 17, 2012 at 2:02 PM, Fabio Pietrosanti (naif) <
[email protected]> wrote:

>  FYI
>
> -------- Original Message --------
> Subject:     Re: [liberationtech] Mailvelope: OpenPGP Encryption for
> Webmail
> Date:     Mon, 17 Dec 2012 11:27:26 +0100
> From:     Karel Bílek <[email protected]> <[email protected]>
> Reply-To:     liberationtech 
> <[email protected]><[email protected]>
> To:     Eugen Leitl <[email protected]> <[email protected]>,
> [email protected]
> CC:     Cypherpunks list <[email protected]><[email protected]>
>
>
>
> Because Thomas (the original developer of Mailvelope) wanted to let
> the extension work as it was, with the unsecure encryption inside DOM,
> I decided to fork his project and make a new one, which both encrypts
> and decrypts in a secure chrome pop-up.
>
> It's here, it's called ChromeGP.
> https://cryptoparty.cz/ChromeGP/
>
> Available on chrome web store here
>
> https://chrome.google.com/webstore/detail/chromegp/pebhdbojdpjfidjbneklefmpojncdpmf
>
> and on github here
> https://github.com/runn1ng/ChromeGP
>
> There are two big issues with it - first is missing signing/signature
> control (which should be easy to implement, but we will see) and the
> second is OpenPGP's trouble with zip compression inside PGP (which,
> unfortunately, causes the default Thunderbird/Enigmail encryption fail
> to decrypt, I think).
>
> Feel free to share and/or criticize :)
>
> K
>
> On Thu, Dec 13, 2012 at 1:24 PM, Eugen Leitl 
> <[email protected]><[email protected]>wrote:
> > ----- Forwarded message from StealthMonger
> <[email protected]> <[email protected]> -----
> >
> > From: StealthMonger 
> > <[email protected]><[email protected]>
> > Date: Wed, 12 Dec 2012 23:22:28 +0000 (GMT)
> > To: liberationtech 
> > <[email protected]><[email protected]>
> > Subject: Re: [liberationtech] Mailvelope: OpenPGP Encryption for Webmail
> > Reply-To: liberationtech 
> > <[email protected]><[email protected]>
> >
>
> Uncle Zzzen <[email protected]> <[email protected]> writes:
>
> > [Weighty argument compelling closer study.]
>
> So unless and until the Mailvelope author(s) remedy this, support for
> Mailvelope has to be muted.
>
> However, comparison with Cryptocat is still unfitting because
> Cryptocat does not even pretend to do store-and-forward authenticated
> email using public key cryptography.  In fact, its author asserts [1]
>
>    2. Cryptocat does not mean to compete with GPG, it means to replace *
>    plaintext.*
>
> [1] Date: Mon, 6 Aug 2012 18:14:33 -0700 Message-ID:
> <caoz60qdzfadz35xjbwkad1vjtt3zzkbp-tw2ipq+sueuzsk...@mail.gmail.com><caoz60qdzfadz35xjbwkad1vjtt3zzkbp-tw2ipq+sueuzsk...@mail.gmail.com>
>
>  >
> > --
> > Unsubscribe, change to digest, or change password at:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
> >
> > ----- End forwarded message -----
> > --
> > Eugen* Leitl <a href="http://leitl.org"; <http://leitl.org>>leitl</a>
> http://leitl.org
> > ______________________________________________________________
> > ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
> > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
> --
> Unsubscribe, change to digest, or change password at:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>
>
>
> _______________________________________________
>
> http://openpgpjs.org
>
>


-- 
Thomas Oberndörfer
Twitter: https://twitter.com/toberndo
LinkedIn: http://de.linkedin.com/in/toberndo
_______________________________________________

http://openpgpjs.org

Reply via email to