I'm not sure what the plan is with the much hyped "Darkmail Initiative to replace email", but here's a great essay on how absurd Lavabit's security measures were as regards securing email:

http://www.thoughtcrime.org/blog/lavabit-critique/

In essence, sending everything around in plaintext and then encrypting on the server obviously doesn't count as secure email. I'd be interested in what people think are the best methods for doing client-side encrypted email.

In particular, Moxie notes that encrypted email is impossible to do due to lack of a usable non-Web mail client (I used to use Mutt, then moved to Thunderbird+Enigmail, but with every passing day Thunderbird gets worse and worse - perhaps due to Mozilla abandoning it.) since "Despite what anyone tells you, end to end encrypted email is not possible in a webmail world."

My question is: What could the W3C due to encourage client-side encryption? In particular, could we one day have encrypted communications in the webworld? Right now the Web Security Model essentially states that the host is trusted 100%, but after the NSA revelations, for some use-cases this is obviously no longer enough, and it would be better to store data on the server client-encrypted. The W3C WebCrypto Working Group [1]'s API should enable client-side use of trusted crypto primitivies, but that's only one piece of the puzzle. What other parts are needed?

For example, currently the Web Crypto API allow JS to set the private key, then some simple JS tricks can be used to achieve everything that a developer might want: effective key extraction, effective supercookie, etc. due to the fact that currently the API does not guarantee on providing secure key storage with the user agent and there is no user dialogue required to set a private key to extractable.

Another example would be that updates on the Web require trusting the website to always update the Javascript code correctly. However, one is often not sure how much Javascript is being imported from foreign sources, or even if the server is attempting to maliciously rewrite the Javascript Code. While work such as Thandy/TUF allows this problem to be solved for normal software updates [2], there is no secure updating mechanism for Javascript. One option would be for code to have integrity checks and be signed, and allow a diverse set of Javascript repositories then check the integrity check and signature via network perspectives across multiple repositories before executing the code.

There's obviously a lot of work to do. While the W3C has been fairly silent so far on this list, as a personal position I am completely against mass surveillance as I believe it's against the principles of a free society. We need to improve our standards to make mass surveillance much, much more difficult. Good luck today everyone at IETF - wish I was there!

   yours,
     harry

[1] http://dvcs.w3.org/hg/webcrypto-api/raw-file/tip/spec/Overview.html
[2] http://google-opensource.blogspot.fr/2009/03/thandy-secure-update-for-tor.html
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to