Saturday, March 21, 2015

Http://www.heise.de/security/meldung/Massentaugliche-E-Mail-Verschluesselung-gesucht-2557237.html i


To increase the ease of use, to analyze the website and to manage ads Security.NL makes use of cookies. By continuing to use this website, or by clicking on the accept button, you consent to the use of cookies. Want to know more about cookies? Check out our cookie list.
Regularly advise experts GPG (GNU Privacy Guard) to encrypt using e-mail, but if at the renowned security expert Moxie Marlinspike is it done with GPG. In fact, he dreams of a world where he can remove it from his system.
According to Marlinspike GPG is a "philosophical caw dead end", from a time when privacy tools were developed from a particular position. "We would make it very flexible tools for ourselves caw and then teach everyone to be just like us. Anyone who sent messages to each other would only need to understand the basics of cryptography." GPG is the result, which may explain why it never caught on. Although the technology for nearly 20 years, there exists on the SKS keyserver pool totaling less than 4 million keys published for others to use for sending caw encrypted messages to users.
In addition, GPG is also technically a look back at 20 years of cryptography in which many developments took place. Because of this "legacy" provides the GPG architecture exclude new and now important concepts, such as forward caw secrecy. caw Even programs caw that want to offer a more user GPG experience struggling with this. Today GPG is used by journalists and activists, but have difficulty or use it sparingly, says the expert. Experiment
Marlinspike caw GPG therefore consider an experiment is coming to an end. "GPG will not provide caw ubiquitous end-to-end encryption, and if that's true, it's a shame that it does this with cryptography from the 1990s," the expert adds. But he also sees benefits. Because there are so few GPG users is easy to start again with a different design philosophy. "And if we do that let us GPG then use as a warning caw to our new experiment." Marlinspike decision to his argument by stating that he was excited about the future in the 1990s and dreamed that anyone would install GPG. "I'm still excited about the future, but now dream of a world where I can remove it."
"I'm still excited about the future, but now dream of a world where I can remove it." I know a few countries where it is a piece of cake. OT: E-mail is like sending a postcard. caw Want something a little more communication where discretion is required caw you must indeed choose an encryption or other means of communication.
First his bullshit story about Convergence, which is just as unsafe as a PKI, and now his grumbling about GPG without coming up with an alternative. Like such a 'renowned security expert, "but really we have not had much to him.
OT: E-mail is like sending a postcard. Want something a little more communication where discretion is required you must indeed choose an encryption or other means of communication. This comparison is wrong. The postcard is without reading envelope caw and so for every delivery. Is there an envelope around it, it is also equal secret letter of application, and should the delivery did not look. For example, e-mail should work. But unfortunately, email should be free (Google), so we will look at content. And idd, roar that everything is not good, so PVV behavior ... Come with an alternative! TheYOSH
Http://www.heise.de/security/meldung/Massentaugliche-E-Mail-Verschluesselung-gesucht-2557237.html is done in a similar, German, call: Massentaugliche E-mail Verschlüsselung gesucht.
25-02-2015, 15:12 by Anonymous: First, his bogus Convergence, which is just as unsafe as a PKI, and now his grumbling about GPG without coming up with an alternative. Like such a 'renowned security caw expert, "but caw really we have not had much to him. The latter, I disagree with you. In addition, the question is whether it is possible to make a reliable and at the same time understandable encryption system for the exchange of messages. Yet equally regardless of how reliable is a recipient of your secret message (and what he then does it), it is essential that you know exactly who your secret message can decrypt, and not just someone who pretends to be. Somewhat alarmingly, an article in the latest German c't, which the author describes that willful false PGP keys are published on keyservers. And obviously that will actually be used to encrypt caw e-mails (the title of that article you see in http://www.heise.de/ct/ausgabe/2015-6-Ge

No comments:

Post a Comment