William Waites on Wed, 4 Jun 2014 18:05:52 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> Google, PGP & the Metadata |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Edinburgh, June 2014 Google has announced that they are working on a way to do PGP encryption inside web browsers. When it's finished this means that, if you use the GMail web site, your messages can be enciphered by your web browser and deciphered by the person who is receiving the message in their web browser or email program. This is a good thing, and something that we have been trying to encourage for a long time because the more encrypted messages flying around, the better. Right now using encryption is like raising a flag and shouting "look at me". But there are a few interesting observations to be made. The first one is about Google's business model of data mining and advertising. If they cannot read the messages, they cannot do this. Perhaps this is changing. Perhaps the other revenue that they have has grown to the point where they can afford to forego the this extra source of information. Perhaps emails read and written on mobile devices are numerous enough -- they cannot use this facility yet without third party programs -- that the traffic from the web site is small enough to not significantly impact their bottom line. Whatever the case they have made the judgement that the loss of visibility and ability to derive revenue from the content of people's email messages is worth the benefit of better privacy. How are the keys kept secure? With PGP you have a public key and a private key. The private key is meant to be kept private and is normally stored somewhere and itself kept encrypted with some sort of symmetric cipher using a passphrase. People do not, generally, like typing in long passphrases so are likely to either use a weak one or to have it stored in the clear or at best protected by whatever mechanism they normally use on their computer or phone (when this stuff is available for phones). The poor state of endpoint security and prevalence of all sort of automated exploits and phishing used to retrieve information from people's computers and telephones means that we can expect an increase in this kind of activity. The black market price for exploits of this kind might rise and the botnets used to deliver them to grow in size. Another weakness arises from considering how Google might handle a warrant or order requiring them to divulge the content of messages. When using a web site such as GMail a lot of proprietary JavaScript software is delivered to the browser to run. It is quite conceivable that they add a function to encrypt messages to an additional, hidden, recipent. It is easy enough with the OpenPGP protocol to make the web browser add a recipient and then to strip it out within Google before sending the message along without violating the integrity of the message. That way the recipient would be unaware that the message had been intercepted. Simple. With some cleverness and a pocket certificate authority the same thing could be done with a man in the middle setup by a nefarious third party. The moral here is trusting secure communications to proprietary software delivered "as a service" is foolish. And the elephant in the room is the metadata. It is well known that PGP does not address keeping the sender and recipient of messages confidential. They could not be delivered as email otherwise. This information, coupled with other sources such as location and search history and so forth, the so called "pattern of life" analysis that we have been hearing about recently, is very valuable. Too Google perhaps it is sufficiently valuable to overcome the loss of information from mining the content itself. Certainly it is revealing enough that though it might hamper those organisations engaged in "full take" recording of every bit sent along important paths it is likely to do so only slightly. To fix this we need to also replace our aged email protocols. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJTjtYGAAoJENHVTUTA6LQ3t1EQAJMMbun7+Twi2OFiKSL1wYQY JpAgJ5mJznbmTGt6KMjN/a0DKXb4kLtpzczwt41WefSBTlX38VMh9CyRkUrlVftD 6ud74HtgspHvC7l/UTT+MkoQqI2G7ZnxglIdYXc7dAkxGg/fe3RpAIw1w0spWWry L9yYgQd3uONJSMgbIJB9sDHiz7Mfqcsf6O/Xmpisc5vBVeFYXLoMf0euZFKD+/UA eTR5brRImzgdUAlxEmss7ylH/9f1v3u18SH7Ye9erzdqHds+INH6KxLMo+z3jMIc LaOzwP/sm7qps7BcEDKwxZEPawzIHrBBGThY1ZhO5SC7YH2rrGHnlI4FYGJ8Mh1O 3Mwp2/hqb0LwP9frTkx1h8qgCoAX4lZx0zFKFBsnTmxEC0hc7bhfUiTJoOhmE3T3 5TGypafWu3Kuj/2xOxXg/W2XYNnnIb0xsQPifxHlRSlZCoio/Aty3swdsA3vR7zu tz2Qe7+yTq44q0GYobWEf9hrj+BCSfB1lAzx39kbG6pPvptrbC7sXaE8uLYqCB7B BtxqYSP14tLcEv2u428Gdbc0flTTHbK9zZe6tWwKx13+CB73kOvADCipXogtKKEM is+xy6GJAPA1KgnzBtT0gF7gX8DhHXvCFbkrnpD4FmynlLIgtT5oxD9h+HYFfsgz s8pNfjazImmkzLHvSbSe =hNAR -----END PGP SIGNATURE----- # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime@kein.org