nettime's_roving_reporter on Wed, 22 Sep 1999 17:40:43 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> Tack this on to Web e-mail security -- attachments |
http://www.cnn.com/TECH/computing/9909/21/hushmail/index.html By Robin Lloyd CNN Interactive Senior Writer (CNN) -- As developers and start-ups attack the Web e-mail privacy issue, encryption products for the masses are multiplying, with a company based in Anguilla, in the West Indies, now in tests for sending secure attachments. HushMail, a free, fully-encrypted Web-based e-mail service that gets high marks from some computer privacy specialists, has posted an alpha version of its secure document delivery service on its Web site. The service offers SSL, or Secure Sockets Layer, security for attached documents that may be sufficient for most users -- it relies on 128-bit private keys. "SSL is a valid security protocol," said HushMail co-founder Jon Gilliam, "though these days it's getting less and less valid because people are cracking up to 512-bit encryption." Many e-commerce sites rely on SSL to protect online consumers from credit card fraud and identity thieves. HushMail will keep up with the times and upgrade its security for attachments if necessary, Gilliam said. Based outside the United States, HushMail can dodge restrictions on the export of strong cryptography -- although those constraints may change soon with an announcement last week by President Clinton that he will relax those standards. 'Key management is the Holy Grail' HushMail came on the scene four months ago with a Web-based e-mail service that provides 1024-bit key encryption for messages. Members sign in with a "passphrase" and can send encrypted messages to other HushMail addresses. The current state of browser technology prohibits HushMail and anyone else from using highly secure end-to-end encryption for attachments, Gilliam said. For longer-key security, users can include documents within messages rather than sending them as attachments, he said. "Key management is the Holy Grail of this whole thing," Gilliam says. Keys, or long strings of 1s and 0s, generally are required to open encrypted messages. HushMail's "passphrase" generates a key on the company's servers in Canada, so that users can open encrypted messages without knowing the sender's key. Unlike some of its competitors, HushMail's code is open -- anyone who can read the stuff is free to check out their claims. An alpha test of the attachments feature can be found at www.hushmail.com/attachments. Many options available Recent breaches in Microsoft's free Hotmail service on the Web have piqued interest in more secure e-mail alternatives, although Microsoft says the worst breach has been closed and its commitment to security is tight. Regardless, Hotmail's service certainly is not encrypted. For free encrypted e-mail on the Web, users must turn to HushMail or a competitor -- for instance, Ziplip.com or Network Associates' Pretty Good Privacy. ZipLip.com, based in California, provides Web-based e-mail that allows users to scramble and lock e-mail messages they send, have them unlocked by only their intended target at the other end via a shared password and effectively shredded after they are read. But Ziplip's encryption key is shorter - 128 bits. And PGP can be challenging to use for even seasoned computer users. Web-based e-mail can never be entirely secure, some say, and it's safer to go with downloadable products like Montreal-based Zero-Knowledge System's beta release of its Freedom software, which provides pseudonymous Web surfing, e-mail and chatting with strong encryption. But that product costs about $50 and provides more security than typical users want or need. These may be more useful to companies or citizens dodging repressive governments. What the experts say Cryptography specialists differ on which product is best, saying it depends upon a user's needs. Bruce Schneier, author of "Applied Cryptography" and a monthly newsletter on encryption, criticizes those who point to long keys to bolster their claims of high security. Snoopers can find ways around the keys about which some security software companies boast, he said. "They're saying, 'We use this impressive lock on our screen door. Nobody's going to pick it.' Instead, they're going to take a rock and scissors and cut out the screen," Schneier said. For instance, HushMail's passphrase is short enough to be hacked, Schneier said. Users generally can only remember passphrases about 30 characters long. But few people have the time and know-how to spend two or three weeks figuring out back doors into so-called secure solutions -- on the Web and elsewhere. "You're not choosing the best cryptography. You're choosing a product you want," he said. He recommended a PGP-based product and something with a passphrase. Hushmail has a "lock-out" feature to block attempts to repeatedly guess passphrases. Jim Reavis, founder of SecurityPortal.com, reviews security solutions for corporations and says Schneier sets the bar a bit too high. Reavis recommends HushMail. "I'm looking for open source, something that wasn't using JavaScript because that seems to have lots of security vulnerabilities and something that has publishable algorithms," Reavis said, also stated he'd prefer a Web-based solution. PGP isn't Web-based and Ziplip.com's code is closed. "It looked like [HushMail] had those four features covered," Reavis said. # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body # archive: http://www.nettime.org contact: nettime@bbs.thing.net