Google Announces 'End-To-End' Encryption Extension For Chrome 100
Nexus Unplugged (2495076) writes 'On their security blog today, Google announced a new Chrome extension called "End-To-End" intended to make browser-based encryption of messages easier for users. The extension, which was rumored to be "underway" a couple months ago, is currently in an "alpha" version and is not yet available pre-packaged or in the Chrome Web Store. It utilizes a Javascript implementation of OpenPGP, meaning that your private keys are never sent to Google. However, if you'd like to use the extension on multiple machines, its keyring is saved in localStorage, which can be encrypted with a passphrase before being synced. The extension still qualifies for Google's Vulnerability Reward Program, and joins a host of PGP-related extensions already available for Chrome.'
Google also published a report showing how much email is encrypted in transit between Gmail addresses and those from other providers.
But can you actually trust it? (Score:4, Insightful)
From joe scriptkiddy sure, but not from the people you actually don't want reading your mail.
Re:But can you actually trust it? (Score:5, Funny)
Re: (Score:3, Insightful)
Google has earned a heck of a lot more trust in terms of security than any of the other big internet players.
Re: (Score:1)
Google has earned a heck of a lot more trust in terms of security than any of the other big internet players.
Why? Even if you disregard the reports that have described close cooperation, and exchange of employees, between Google and NSA and other TLA agencies. And the head of Google publicly stating that "you have no privacy, get over it". What about Google's actions or solutions are so different than the other players that they have earned that trust. If anything, it seems that Yahoo and Microsoft have gone to greater lengths in fighting NSA letters and similar.
Re: (Score:1)
Same question to you... "Any what way?"
Re: (Score:1)
*In* what way :S
Re:But can you actually trust it? (Score:5, Informative)
Which reports? Could you show me these reports describing close cooperation with respect to spying on people between Google and the NSA?
I think you are grossly misquoting Eric Schmidt who said words to the effect of, people have to understand the PATRIOT Act, what powers it gives the US government and how little companies can do to fight it. They can't assume they can put stuff into Google and have it be inaccessible to the US Govt. And you know what? He was dead right, wasn't he? But he got crucified by idiots like you for unemotionally stating the facts of the law. A better example of shooting the messenger is hard to find.
Which other players do you mean? If you mean, big web companies, how about:
Being the first big webmail provider to enable SSL for everyone, all the time. Being the first to develop and then open source TLS forward secrecy code (ephemeral EC Diffie Hellman), then being first to activate it. Developing the first SSL pinning implementation, and catching Iran when they tried to use a hacked CA to monitor everyone. Being first to encrypt all internal traffic, something Yahoo is planning to catch up on maybe by the end of this year. Being first to publish transparency reports. Being first to publish statistics on SMTP TLS to help shame companies into upgrading (looking at you Apple). Being first to add and activate new ciphersuites in TLS (ChaCha20 and Curve25519) to replace the horribly broken RC4. Being first to release a new, modern PGP implementation.
If you put down the Google hate I think you'll find they've done a heck of a lot and routinely raised the bar over the past few years. No, they don't collectively march themselves to jail when served with a court order but that's a failure of our governments and indirectly the people who elect them.
Ob. disclaimer: I used to work for Google, doing security related stuff. And I think my colleagues achieved the best that can be expected of them in this arena. Certainly they went well beyond what other companies were doing (nothing).
Re: (Score:2)
How about:
Putting their money where their mouth is and pulling out of China, rather than continue to play along like the other Good Old Boys and divulge dissident info and participate in China's censorship game?
That to me says more than any of the rest of it; all of the technical stuff is just icing. Giving up a market like China is no minor thing; anyone who wants to criticize their "do no evil" mantra is gonna have to explain that.
Re: (Score:2)
Because...
* Unlike most of the other big internet companies, Google gave a big old finger to the Chinese Communist Party when they requested cooperation in censoring / blocking / spying through google. Microsoft and Yahoo have been happy to provide info (even on dissident bloggers) to them since ~2005/2006. Google DID cooperate for a few years but ceased all cooperation around 2010, and have generally been fighting for enduser privacy there since. Notably, Microsoft explicitly cooperates in the b
Re: (Score:2)
Boy, are you full of crap. When has Google cooperated with the NSA, any more than the law requires? What reports? Post credible links or GTFO.
Re:But can you actually trust it? (Score:5, Insightful)
Re: (Score:3)
then use chromium the open source fork and look at the code yourself
Re:Reflections on trusting trust... (Score:5, Insightful)
How would that help?
What would me, you, or him reading the code accomplish? I guaranty that none of us would spot an NSA level backdoor.
Open Source guarantees optimal security, if you are one of the top ten security professions on the planet and basically have enough time to write the software yourself.
Re: (Score:1)
It only takes one motivated person to find and publish the backdoor for it to become worthless.
Sure. But where exactly is this mythical "one motivated person" who can so easily spot bugs? We've seen countless examples of security bugs in F/OSS projects staying hidden for YEARS despite people having given the code a once-over. Heck, Linux developers themselves continue to introduce security vulnerabilities in every single release. (AFAIK no Linux release has been free of security bugs). So yeah, you can continue to live in your fantasy land.
Re: (Score:2)
Why wouldn't you be able to spot a back door that's in the code?
It's not that hard.
Of course if the backdoor is being inserted by the compiler, well then you are screwed. Or, use your own compiler.
Re: Reflections on trusting trust... (Score:3)
Google for "double diverse compiling" and educate yourself a little more.
Re: (Score:3, Informative)
Remember 'reflections on trusting trust'?
That again? [schneier.com]
With that said, this is just ridiculous. What if you're actually the only sentient being in existence, and everything is just part of your dream? What if we're all in the matrix? What if, what if, what if!
Personally, I don't care about vastly unlikely possibilities. Something needn't be 100% safe for me to use it. Obviously. I don't see why people are obsessed with all these vastly unlikely possibilities.
Re:But can you actually trust it? (Score:5, Insightful)
If you're worried about Google itself being forced to compromise this extension, you shouldn't be using Chrome at all.
In any case, the current state of webmail is typically messages stored as plain text, transmitted over secure sockets. Encrypting the message itself is a big step forward.
Re: (Score:2)
Chrome extensions are tied to your Google account, and Google has pretty much complete control over them. Chrome, as a browser, does not need to be tied to a Google account (although it will suggest that you do so) and its automatic updating can be disabled.
More to the point, though, I can securely send messages even though a compromised browser, if I encrypt the messages externally. As soon as you put your PGP private key into this extension, though, it can read all your mail (even if it's encrypted) and a
Re: (Score:2)
Chrome extensions are tied to your Google account, and Google has pretty much complete control over them. Chrome, as a browser, does not need to be tied to a Google account (although it will suggest that you do so) and its automatic updating can be disabled.
Not updating your browser will also leave you vulnerable. You could download updated Chrome installs from a generic download page, using a different browser and an IP address that is not associated with you, instead of accepting (possibly customized) automatic updates. That would be safe under the assumption that the generic Chrome build is not trojaned.
More to the point, though, I can securely send messages even though a compromised browser, if I encrypt the messages externally.
True, but then it would be more convenient to send messages from an external mail application and not use web mail at all.
Re: (Score:2)
I'll go further and say that if the NSA has forced Google to compromise the extension, you shouldn't be using Google or Gmail at all. If the NSA has already coerced Google, obviously, then there's no reason to compromise the extension or PGP; the NSA will just get the mail straight from Google.
Re: (Score:2)
Just as plain text for advertizing has to be done at some point in the internal network, the NSA, GCHQ, 5++ other nations, their staff, ex staff, former staff - a lot of people will still enjoy.
Re: (Score:3)
Re: (Score:2)
Its certainly not encrypted when Google receives it. Encrypted data is useless to Google.
Re: (Score:2)
It is with this encryption.
" Encrypted data is useless to Google."
arguable, but so what? Why does that mean they wouldn't do it? Your hate boner is getting in the way for your thinking.
stop it.
Re:Email should not just be encrypted in transit (Score:5, Funny)
It should be encrypted at all times.
Great idea. Perhaps they should call it "End-to-End" encryption and release it as a Chrome browser extension like they are talking about in this article: http://slashdot.org/story/14/06/03/2059220/google-announces-end-to-end-encryption-extension-for-chrome/ [slashdot.org]
Re: (Score:1)
That's weird that article has the exact same comment on it linked here: http://slashdot.org/comments.p... [slashdot.org]
Re: (Score:2)
So they are begginig the monopoly (Score:1)
Google will still have your internet/search/click usage information and will profit from it. It just makes harder for the goverment or another evesdroper to see what you are doing. But a every goverment is a subpoena away from it.
If you want anonimity, don't use google or their software/services. period.
Sorry about the sour post, but I don't see how this will change anything.
Re: (Score:2)
Re: (Score:1)
This way you are safe of NSA or some other 3 party who is sniffing your data, but not from goverment requesting legally this information to google.
Re:So they are begginig the monopoly (Score:5, Insightful)
Seeings as the FBI fought Phil Zimmermenn a former political activist and the writter of PGP tooth and nail in court over it I would guess that they don't have a backdoor.
Re: (Score:2)
That just means the FBI wants people think there is no backdoor.
Re: (Score:3)
Re: (Score:2)
I believe you can pin extension versions and prevent them from updating.
Re: (Score:2)
I don't know if a subpoena has enough teeth to compel this level of cooperation, why use one of those anyhow? I'm quite certain the NSA could require that Google silently update your copy of the E2E extension to include a backdoor that steals your secret key, at which point they can decrypt all messages sent to you and put your signature on any outgoing message they want to.
Re: (Score:3)
Re: (Score:1)
They wouldn't need to bother Google, after all as we saw thanks to the AT&T whistleblower they hsigned.kbone access at the ISPs. This means they 1.- Know what OS you are running and 2.- Can perform a MITM on said OS. Lets say you use Linux? All they do is intercept the update mechanism for whatever flavor you are running and one of the dozens of packages you get during an update has a backdoor, with Windows or OSX it would work the same, intercept the update mechanism and force in a backdoor. Hell depen
Re: (Score:2)
Re: (Score:2)
You're claiming that Google is purposely breaking their own ability to data mine your email? I somehow highly doubt that. I'm happy to be proven wrong on this.
Re: (Score:2)
If only there was an article some place that talked about it.
https://code.google.com/p/end-... [google.com]
sheeesh.
Re: (Score:2)
This is for email, not your browser.
Thumbs up so far... (Score:5, Insightful)
1: Compatible with OpenPGP (except for some reasonable caveats. Not bad.)
2: Some thought in building it, not just slinging a beta for download, wise.
3: Keys stored away from where the bad code can compromise a browser... smart.
So far, this seems to be something that can be useful for one who does use PGP or gpg often.
Re: (Score:3, Insightful)
So... if google doesn't have the keys, then
a) you can't log into gmail from a different computer unless you brought your keys with you, because they don't have them; if you lose your keys, your hosed.
b) you can't search your gmail, because for them to index your mail box, they'd need to be able to decrypt it.
c) they can't data-mine your gmail, because, again, they can't read it.
I'm having hard time believing that they've actually done this?
And if they have done it, I have a hard time believing it will do an
Re: (Score:2)
In theory, Google can be forced to push out an add-on that slurps up private keys and uploads them. However, no solution is 100%, and anything is better than nothing.
The best solution is to have a MUA, (not a Web browser... a dedicated MUA that isn't a general purpose renderer) handle all E-mail, with separate modules that don't autoupdate that handle PGP/gpg and other encryption. However, anything is better than nothing, and this will do a decent job at protecting against intrusion internally.
Re: (Score:3)
In theory, Google can be forced to push out an add-on that slurps up private keys and uploads them. However, no solution is 100%, and anything is better than nothing.
The best solution is to have a MUA, (not a Web browser... a dedicated MUA that isn't a general purpose renderer) handle all E-mail, with separate modules that don't autoupdate that handle PGP/gpg and other encryption
Precisely.
The fundamental basis of end-to-end encryption is that the endpoints are trustworthy.
Autoupdating chrome, autoupdating c
Re: (Score:2)
That one is easy: don't assume a false sense of security. There, problem solved. I don't know how anyone would ever get into that position, but I agree that if they do, we should give them a common-sense reality check.
I think everybody gets tha
Re: (Score:2)
Can have secure encryption at all without the "if you lose your keys, you're hosed" part? I have never seen a solution to this fundamental problem.
Re: (Score:1)
Re: (Score:2)
Can have secure encryption at all without the "if you lose your keys, you're hosed" part? I have never seen a solution to this fundamental problem.
In general you can't open any lock if you lose the keys. It's a feature, not a fundamental problem. All encryption schemes require that you provide some way of authenticating that you are the intended recipient. Protip: securely back up your keys.
Most important sentence in TFA (Score:5, Insightful)
End-To-End doesn’t trust any website's DOM or context with unencrypted data.
I think this is the most important sentence in TFA, as it shows this is a real user-side-DRM (enforcing pivacy rights) in browsers.
Re: (Score:2)
Comparing the relation between DRiM (Digital Rights Management, what FSF and "End-To-End" do) and DReM (Digital Restrictions Management, what MPAA and Netflix do) with the physical world is like comparing movie pirates to physical thieves.
We live in a digital war on Data. There are entities wanting our data, and there are others which don't want to give their data to us, even if they make their living doing that. Perhaps it is natural to demonize the weapons the other side uses, I don't know.
Privacy or convenience, choose one of the two (Score:1)
Storing information in such a way that Google cannot hand the data over to 3rd parties will break many features that users like, searching emails being on the top of that list. Fully homorphic encryption is just not there yet.
So besides the fact that it's not in Google's interest to give you privacy, you can either put effort into it yourself to get some privacy or sit back and choose convenience. Choose one of the two but don't believe that technology like end-to-end encryption with a service provider wil
Re: (Score:2)
a password protected encrypted version of the key could be synced.
Re: (Score:2)
They could do like Hushmail and serve a specially crafted JavaScript file to users being targeted by law enforcement.
That sort of thing would be pretty easy to detect. Google would be outed unless it were only done on a very small scale, and even then it would be risky.
Re: (Score:2)
And all of it updates automatically and silently from Google on a regular basis. It's OK though, I'm sure they'd never silently ship a backdoored version to a specific target in compliance with a NSL...
Re: (Score:2)
And all of it updates automatically and silently from Google on a regular basis. It's OK though, I'm sure they'd never silently ship a backdoored version to a specific target in compliance with a NSL...
I don't think an NSL could order that. And, if one tried, I'm quite confident the Google legal team would fight it.
Re: (Score:2)
Only the single intended victim would receive the specially modified Javascript from the NSA's MITM server,
As I said, it would be outed unless it were only done on a very small scale.
Re: This should be interesting... (Score:4, Interesting)
Challenge Accepted!!
They want to allow people to be reassured that they have "enough" privacy by giving them tools that will protect them from other end users learning their secrets, whatever they've decided those secrets should be.
Their saleable advantage is that they can let people manipulate you. They've been using mass analysis of mail as a way to better do that since their mail services were invite only.
They want you to be satisfied with them not just invading your privacy, not just manipulating you with what they learn, but manipulating you for anyone who wants to pay.
But don't worry, your data is secure in transit!
Re: (Score:3)
Clearly refusing to comply with China's censorship and cooperation demands was all a ruse to make us THINK they were pro-user rights. Clearly their cooperation with the EFF and ChillingEffects to publicly report on DMCA (and other) takedowns is all a trick to get our precious, precious page impressions. Clearly their ahead-of-the-curve SSL by default on google.com is all because theyre in bed with Uncle Sam.
Not sure what you're smoking but keep it away from me.
Interesting (Score:1)
good (Score:5, Insightful)
At first glance, this looks like a good idea which should be encouraged and nurtured. Even if they fuck up something.
The downside is that it's pretty crazy to be doing stuff like this in a scripting language inside of a machine that downloads new versions from somewhere, at the drop of a hat, and where the machine itself (Chrome) is remotely-coercible. (In other words, point a gun at Google's head, and they will extract your key the next time you enter your passphrase.) But really I think this is a minor point! (bear with me; I know that sounds like a bombshell.)
It's good to for people to start using OpenPGP, even if they do some things wrong, and for it to get more mainstreamed. It'll get 'em familiar with the concepts (and they need to learn them all; take anything out and you have a broken system), and then some day they will graduate to the real thing (actual PGP or GnuPG, outside the vulnerable context of today's web browsers) and do things more carefully on their own time while remaining interoperable with their associates.
I know I am a dead-horse beater on this, but OpenPGP, after all these years, really is still the very best, top-notch, number one PK system we have. It's not merely good; it's right. And the applications for the WoT go far beyond merely securing communications from snooping, though it happens to be excellent that that. Three cheers for Google not inventing something gratuitously nonstandard (and therefore, probably deficient)!
Re: (Score:1)
This is similar to what mega.co.nz does, correct? (kim dotcom site)
Always a balance (Score:3)
Computers are complicated. (most) Users are not. With computing, you basically have a trio of secure, easy, affordable - pick any two.
OpenPGP was right in all ways except one: you can't even explain what it does to your grandma, let alone get her to use it. Because of that, you can't get anybody to pay for it. So you really only have the choice of easy/affordable.
This is a good system if only because it gives you a bit of the secure leg without compromising the other two legs. It sucks, and propeller heads
Re: (Score:2)
Never mind grandma, I can't use it. Decided I'd try it this spring. Spent an afternoon reading manuals, blog posts and howto's, until I realized this is complicated and brittle enough that I'm likely to mess things up and compromise any security as a result. Better to avoid it, and behave under the assumption that people are bulk scanning and analyzing everything i send or receive.
Re: (Score:3)
(In other words, point a gun at Google's head, and they will extract your key the next time you enter your passphrase.)
If someone points a gun to my head, I'll hand them my PGP keys, passphrases for encrypted media, PIN and online banking credentials, mother's maiden name, car keys, and add on the end "Would you like a receipt with that?"
This isn't to protect against government coersion of the business. It's to protect unauthorised monitoring and tapping of communications. The TLA's are certainly authorised to make these demands; It's their job. The legality of those demands are another question.
Re: (Score:2)
IMHO once people are pointing guns at you, you have serious problems. And yet even then, if the attacker happens to be your government, or someone within reach of your government, you still have recourse. Unless they pull the trigger, then you know that it happened, so you can challenge it in court, or call the cops on the assailant after he leaves, or whatever.
But that isn't really the kind of situation that people are talking about much, in 2014.
great (Score:2)
Re: (Score:2)
Guess how I know you didnt read the article?
Heres a hint: your post does not address anything mentioned in the article. Its not server-side encryption, its end-to-end (hence the name).
mail in transit (Score:2)
Did anybody catch this tidbit? (Score:2)
FCC CIO David Bray noted last night that the system is more than 10 years old and pointed to an article on how the FCC is trying to modernize infrastructure badly in need of upgrades.
So the FCC, the folks who are supposed to regulate our communications activities is in the technical stone age? Maybe they just need more of Ted Stevens' pipes?
Re: (Score:2)
Money. It's due to money;' although 10 years ago is meaningless. I know system that are 40 years old and still work great at what they where designed to do.
How does google read our e-mail now? (Score:1)