zlacker

[parent] [thread] 14 comments
1. rollca+(OP)[view] [source] 2025-01-04 14:35:00
> "pgp is too complex"

PGP is too complex. I've known my way around the command line before I learned how to hand-write, and I have to look up the commands to fetch the keys and/or verify the blob every single time. Keyservers regularly fail to respond. There's no desktop integration to speak of. The entire UX stinks of XKCD 196.

Don't blame CIA for obvious deficiencies in usability.

replies(5): >>Y_Y+h7 >>bscphi+0b >>graeme+Ab >>ranger+L01 >>1oooqo+UU2
2. Y_Y+h7[view] [source] 2025-01-04 15:37:53
>>rollca+(OP)
I was with you right up until the end. I think the only thing that would stop me from sabotaging a small project like PGP (was in the early days) is moral aversion. FOSS and academic circles where these things originate is generally friendly and open, and there is plenty of money and length of rubber hose for anyone who doesn't welcome the mole into their project.

I'm not saying I have evidence that this happened to PGP specifically, just that it doesn't seem at all implausible. If the CIA told me my code was never to get too easy to use, but otherwise I could live a long and happy life and maybe a couple of government contracts it would be hard to argue.

Why a mass-market interface never took off (GPG and other descendants notwithstanding) may indicate that the whole cryptographic idea is inherently not amenable to user-friendliness, but I don't find that hypothesis as compelling.

(It could also be an unlikely coincidence that there's a good solution not found for lack of looking, but that's even less plausible to me.)

replies(2): >>rollca+da >>exe34+tx
◧◩
3. rollca+da[view] [source] [discussion] 2025-01-04 16:04:21
>>Y_Y+h7
Then why no such efforts are being pursued for PGP(GPG) nowadays?

signify[1] is approachable at least for the power users - I could print out that man page on a T-shirt. HTTPS is ubiquitous and easy, thanks to ACME & Let's Encrypt. E2EE with optional identity verification is offered in mainstream chat apps.

And of course there are usability improvements to GPG, being made by third parties: Debian introduced package verification a couple decades ago, Github does commit verification, etc. What's to stop e.g. Nautilus or Dolphin from introducing similar features?

[1]: https://man.openbsd.org/signify

replies(1): >>Y_Y+yi
4. bscphi+0b[view] [source] 2025-01-04 16:11:21
>>rollca+(OP)
> I have to look up the commands to fetch the keys and/or verify the blob every single time.

I have no doubt that this is true, but I very much question whether any alternate UX would solve this problem for you, because the arguments for these two tasks are given very obvious names: `gpg --receive-keys <keyIDs>` and `gpg --verify <sigfile>`. There's no real way to make it easier than that, you just have to use it more.

The tool also accepts abbreviations of commands to make things easier, i.e. you could also just blindly type `gpg --receive <keyID>` and it would just work.

replies(1): >>fragme+fC1
5. graeme+Ab[view] [source] 2025-01-04 16:16:41
>>rollca+(OP)
For what purpose? Setting up PGP signing and encryption for emails in Thunderbird is dead simple. if only I knew anyone else willing to use it!

I think you are right that UI sucks in many cases, but I think its not intrinsic to PGP - its fixable.

replies(4): >>arccy+Iu >>jeroen+GO >>pepa65+053 >>rollca+ge4
◧◩◪
6. Y_Y+yi[view] [source] [discussion] 2025-01-04 17:13:32
>>rollca+da
> Then why no such efforts are being pursued for PGP(GPG) nowadays?

I wonder why there aren't more, but there are some, for example Proton's efforts towards encrypted email.

https://proton.me/support/how-to-use-pgp

(I won't mention the relative shortcomings of HTTPS and E2E chat apps here.)

◧◩
7. arccy+Iu[view] [source] [discussion] 2025-01-04 18:54:05
>>graeme+Ab
if only everyone used my preferred set of tools (thunderbird + pgp)...
replies(1): >>exe34+8x
◧◩◪
8. exe34+8x[view] [source] [discussion] 2025-01-04 19:16:55
>>arccy+Iu
so it's their fault that every other tool maker refuses to provide the facilities at the same level of simplicity? they gave an example to show it was possible, it doesn't mean that their example was the only way - other developers decided that the public was too dumb to use those kinds of tools.
◧◩
9. exe34+tx[view] [source] [discussion] 2025-01-04 19:18:29
>>Y_Y+h7
you'd think if the cia don't want it to happen, then somebody somewhere else would make it though. it's not like the CIA and fsb would collude - they serve different oligarchs.
◧◩
10. jeroen+GO[view] [source] [discussion] 2025-01-04 22:04:44
>>graeme+Ab
I know more people who use terminal user interfaces for email than I know people who use Thunderbird, and I say that as a techie.

The UI still sucks, though, because people ask me what the .ASC attachments sent with all of my emails are and if I've been hacked. When I explain that's for encryption, they may ask how to set that up on their phones if they care, but most of them just look at me funny.

I do use email encryption at my job, through S/MIME, and that works fine. Encryption doesn't need terrible UI, but PGP needs support from major apps (including webmail) for it to gain any traction beyond reporting bug bounties.

11. ranger+L01[view] [source] 2025-01-05 00:46:49
>>rollca+(OP)
https://www.latacora.com/blog/2019/07/16/the-pgp-problem/
◧◩
12. fragme+fC1[view] [source] [discussion] 2025-01-05 11:29:30
>>bscphi+0b
> There's no real way to make it easier than that

If we accept that the world has moved to webmail, and use a GUI client, then the way to make it easier is bake in into the client and make it seamless so there's no manual futzing with anything. Make it like TLS certs, so there's a padlock icon for encrypted mail, yellow for insecure, and mail that fails validation gets a big red warning.

Unfortunately, purists in the community could not accept that, so it's never happened, and so gpg failed to get critical mass before alternatives popped up.

13. 1oooqo+UU2[view] [source] 2025-01-05 23:51:50
>>rollca+(OP)
pgp is only complex because there was a jail sentence to anyone willing to discuss or improve it at the crucial start time. go learn history and rethink your argument.

with that stigma no company invested in that that entire space for decades! we are still gluing scraps from Canadian phds when it comes to pgp UX.

now that crypto is cool you will get keypass, which is the obvious evolution of "url padlock". either the login button is enabled or not. don't question whats happening behind the curtain.

... the fact this entire comment thread is mixing my loose points about the url padlock (consequence) with the CIA actions on pgp (cause)... sigh. I won't bother anymore. enjoy the bliss.

◧◩
14. pepa65+053[view] [source] [discussion] 2025-01-06 01:47:01
>>graeme+Ab
Yes, but making sure you can still read your encrypted emails after something went wrong with your setup and you had to reinstall is already harder. How PGP integrates with a system is not trivial to understand.
◧◩
15. rollca+ge4[view] [source] [discussion] 2025-01-06 15:06:49
>>graeme+Ab
I agree, but not with the "fixable" part.

Encrypted email is near useless. The metadata (subject, participants, etc) is unencrypted, and often as important as the content itself. There are no ephemeral keys, because the protocol doesn't support it (it's crudely bolted on top of SMTP and optionally MIME). Key exchange is manual and a nuisance few will bother with, and only the most dedicated will rotate their keys regularly. It leaves key custody/management to the user: if there was anything good about the cryptocurrency bubble, it's that it proved that this is NOT something you can trust an average person with.

Signed email is also hard to use securely: unless the sender bothered to re-include all relevant metadata in the message body, someone else can just copy-paste the message content and use it out of context (as long as they can fake the sender header). It's also trivial to mount an invisible salamanders attack (the server needs to cooperate).

The golden standard of E2EE UX are Signal, iMessage, and WhatsApp; all the details of signing and encryption are invisible. Anything less is insecure - because if security is optional or difficult, people will gravitate towards the easy path.

The only use-case I have for PGP is verifying the integrity of downloads, but with ubiquitous HTTPS it's just easier to run sha256sum and trust the hash that was published on the website. The chain of trust is more complicated and centralised (involves CAs and browser vendors), but the UX is simpler, and therefore it does a better job.

[go to top]