Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Encryption Facebook Slashdot.org

Facebook Kills PGP-Encrypted Emails (techcrunch.com) 37

An anonymous reader quotes a report from TechCrunch: In 2015, as part of the wave of encrypting all the things on the internet, encouraged by the Edward Snowden revelations, Facebook announced that it would allow users to receive encrypted emails from the company. Even at the time, this was a feature for the paranoid users. By turning on the feature, all emails sent from Facebook -- mostly notifications of "likes" and private messages -- to the users who opted-in would be encrypted with the decades-old technology called Pretty Good Privacy, or PGP. Eight years later, Facebook is killing the feature due to low usage, according to the company. The feature was deprecated Tuesday. Facebook declined to specify exactly how many users were still using the encrypted email feature.
This discussion has been archived. No new comments can be posted.

Facebook Kills PGP-Encrypted Emails

Comments Filter:
  • So? (Score:5, Insightful)

    by dbialac ( 320955 ) on Tuesday December 05, 2023 @04:34PM (#64057915)
    What took so long? I would think anybody interested in privacy probably ditched Facebook a long time ago.
    • by thegarbz ( 1787294 ) on Tuesday December 05, 2023 @05:55PM (#64058169)

      There's a difference between knowing you're ending up in some company's database, and knowing anyone on the internet can read your interactions with said company.

      For the longest time the greater concern was not that people were using Facebook or that marketing companies were involved, it was that the government wanted to snoop on what you liked and didn't like before granting people visas.

      People care about what impacts them. Someone showing me an advert is very frigging low on the list of things qualifying for the limited amount of shits I have to give.

    • by Sloppy ( 14984 ) on Tuesday December 05, 2023 @06:40PM (#64058319) Homepage Journal

      Privacy is half the value of PGP. The other half is about authentication: knowing who sent the email. It's arguably useful (within the hypothesis that Facebook is useful) to know that an email which claims to come from Facebook, actually came from Facebook.

      But wait .. about that privacy thing. I have no idea how a person decides to trust Facebook, but if we ass/u/me they do, then this allows Facebook and a person to communicate without others being able to read it. Lots of people choose (for whatever reason) to communicate with Facebook, but don't choose to communicate the same things with $RANDOM_OTHER_PARTY. Why not keep access controls fine-grained?

    • by AmiMoJo ( 196126 ) on Wednesday December 06, 2023 @06:06AM (#64059391) Homepage Journal

      Businesses use Facebook to advertise and interact with customers.

  • by VampireByte ( 447578 ) on Tuesday December 05, 2023 @04:35PM (#64057917) Homepage

    Sorry, but it's true, they just want free stuff and convenience. Start talking about privacy and rights, see how fast they start ignoring (and avoiding) you.

    • by Brain-Fu ( 1274756 ) on Tuesday December 05, 2023 @04:46PM (#64057975) Homepage Journal

      People care about privacy when something like the Snowden revelations, or the Cambridge Analytica scandal, are making headlines. They get really mad at how they have been spied on and betrayed.

      But the very instant they must expend a modicum of effort towards protecting their privacy, they stop caring. They want their government and corporate providers to do all that for them and have it all be automatic so they don't have to think about it.

      And the next time something like this makes headlines, they will get really mad again that their government and/or corporate providers have been spying on them, and yell a lot about how wrong this is and how it should be fixed.

      And then go right back to doing nothing. It won't even occur to them that the people they expect to be protecting their privacy are the very people who have the most to gain from violating it. They find it a lot easier to just assume that someone else is handling it, and stop thinking about it.

      • by MIPSPro ( 10156657 ) on Tuesday December 05, 2023 @04:52PM (#64057991)
        Well said. I think all these partisans just hope that the abusive policies will all get directed at the other side. They fail to see how chipping away at privacy hurts everyone.
      • by LazarusQLong ( 5486838 ) on Tuesday December 05, 2023 @04:59PM (#64058003)
        yep, they care for just as long as their attention span is on the problem, then two minutes later, they are focused on something new and shiny that has nothing to do with security and have forgotten
      • by thegarbz ( 1787294 ) on Tuesday December 05, 2023 @06:01PM (#64058189)

        But the very instant they must expend a modicum of effort towards protecting their privacy, they stop caring.

        You're conflating all privacy as being equal. That's just not the case. People gave a shit about the Snowden revelations and the Cambridge Analytica scandal because it actually had the ability to affect them. On the flip side Facebook selling likes in some aggregated database to an advertisement company, doesn't qualify as something that most people give a shit about.

        It is perfectly reasonable to give one person some information but want to protect it from another. Incidentally this is why I have three passports. Two for my different nationalities, and one for that sensitive country whose stamp we want to hide from a couple of other sensitive countries. Though given the intelligence of USA immigration officers and their inability to understand the concept of a curtesy hotel when flying first class as a reason for having a stamp in and out of a country on the same day, I think it may be time to use the burner passport for a second country too.

    • by LazarusQLong ( 5486838 ) on Tuesday December 05, 2023 @04:57PM (#64058001)
      when I did computer consulting people would ask me to 'secure' their computer. I'd make a list of tasks for them to do, things like using a VPN, using Brave, Duck Duck Go, or Tor, setting two factor authentication on everything they log into, using strong passwords, not clicking on links in emails from people they don't know and would show them how to check the message headers so they could see that that email from Google telling them that their account was compromised and they need to "click here for a security upgrade" is really just a means to steal from you. Then I would set up their firewall and such and leave...

      The next time I would see maybe 90% of my clients, they'd have random spam popups and a shitload of trojans/viruses/worms... And would have turned off all the security settings i set for them. Asking why, they would say it was too much hassle, couldn't I just 'secure' it for them?

      Of course I would try to explain it to them again... but eyes glaze over after 30 seconds and they'd just act like i should be able to wave my magic wand and poof! they are safe.

      • by DarkVader ( 121278 ) on Wednesday December 06, 2023 @11:51AM (#64060369)

        Why would you recommend a VPN?

        Unless you're trying to hide your torrent box (and yes, that's a valid reason for one, but most home users don't do that much torrenting) or connecting to a business network, a VPN has no value for most users.

        All one of those stupid VPN services does is change who can sniff your traffic from your ISP to a VPN provider.

        I'm not a fan of Brave. I recommend Firefox with uBlock, Facebook Container, and if they're at all capable of handling it, NoScript. And DDG should be used as a search engine, no need to install their browser.

  • I used it (Score:4, Insightful)

    by WoodburyMan ( 1288090 ) on Tuesday December 05, 2023 @04:36PM (#64057923)

    I got the notification it was going away the other day. I liked it simply for the fact if other MFA logins were bypassed, and they had access to my email, they still couldn't reset my password without my PGP key. One extra layer.

  • by Murdoch5 ( 1563847 ) on Tuesday December 05, 2023 @05:06PM (#64058027) Homepage
    Facebook / Meta, should be calling out other companies about not using PGP. PGP is an essential part of email security and identity validation. It's a fair statement to say that any company who won't offer the option to use PGP, and who doesn't sign their emails by default, does not care, even by accident, about cybersecurity.

    Every single bleeping company cries and waxes poetic about how much they “deeply” and “critically” care about security, but then have standards that amount to a broken screen door and stuck open window on their infrastructure. I don't care if you're dealing with the DoD, DoJ or Little Jane's Cookie Company, ran by the 75-year-old woman as a sole venture. PGP is essential, and there is no excuse for not using it. If you don't use PGP, or another open comparable solution, you don't care about security, period!

    Maybe you have no idea how email works, and can't understand how SMS and Email are different, but that's where Facebook / Meta can get involve and throw shame on companies like Google and Microsoft. Why doesn't Outlook support PGP by default? Why doesn't GMail? Facebook / Meta shouldn't sunset PGP, they should make it a battle cry.
    • by dgatwood ( 11270 ) on Tuesday December 05, 2023 @05:49PM (#64058143) Homepage Journal

      Facebook / Meta, should be calling out other companies about not using PGP. PGP is an essential part of email security and identity validation. It's a fair statement to say that any company who won't offer the option to use PGP, and who doesn't sign their emails by default, does not care, even by accident, about cybersecurity.

      Except that to avoid getting blocked as spam, Facebook/Meta already has to sign every email sent from their mail servers (Sender ID), which makes PGP mostly moot unless you are either A. using it to encrypt emails or B. using it to sign emails with an on-device mail client to prove that nobody cracked into the user's email account. Neither of those things likely applies to communication sent by Facebook.

    • by Martin Blank ( 154261 ) on Wednesday December 06, 2023 @10:21AM (#64060039) Homepage Journal

      PGP is essential, and there is no excuse for not using it. If you don't use PGP, or another open comparable solution, you don't care about security, period!

      Phil Zimmermann, the man who created PGP, does not use PGP [scmagazine.com], or at least did not as of 2015, and had no way of encrypting or decrypting such email. He said at the time that he would try GPG, but it's not clear whether he ever did.

      A number of other privacy luminaries have stepped away from it, some doing so publicly. Moxie Marlinspike did so [moxie.org] in February 2015. Filippo Vasorda, one of the cryptographers behind TLSv1.3, followed suit in December 2016. Bruce Schneier has said many times over the last decade that he believes PGP is more difficult to use than it's worth. All of them prefer Signal, which has its issues (particularly being tied to a phone number, which is both a strength and a weakness) but which is far, far easier to use, available on almost every notable platform, and is probably more secure than PGP/GPG will ever be.

      I would suggest that those last three, at least, care a great deal about security, since they have spent their careers working very hard at providing it for the masses and that Phil Zimmermann likely does, too, even if he's not been as involved for a while.

      Why doesn't GMail?

      Google looked at integrating OpenPGP into Gmail via an extension almost a decade ago, and they took a pretty good crack at it. Unfortunately, the threat model [github.com] turned out to have so many holes that it wasn't worth the effort (though Eduardo Vela Nava, aka sirdarkcat, still updates the code every few years). Please do look over that page, as it's one of the best threat model summaries I've ever seen. If you read it in detail, they note in several places that they do not identify all the threats within a particular realm, and that some threats simply cannot be addressed with a browser-based implementation. They published the source code for the extension under Apache 2.0, so you're welcome to pick up from where they left off.

      • by Murdoch5 ( 1563847 ) on Wednesday December 06, 2023 @10:41AM (#64060115) Homepage
        The arguments you're raising are due to complexity and annoyance, not blindness and incompetence. I honestly don't remember if PGP was hard to use in 2015, but in 2023 it's easy and the integrations make it mostly seamless. The only case I'm making is for email, because email is the most insecure point in almost any organization. Email is so insecure that best practices recommend running your email clients in separate VM's or Containers, just to isolate them from your system.

        On this computer I have 3 Qubes setup for email, one for my personal emails, one for my work emails and one throw away emails. The number of emails I delete without reading is rather large, because if anyone emails me and that email had to load almost all its resources from remote hosts, it gets deleted. If you email me and I don't recognize the address, and the email doesn't explain who you are, and why, deleted. If the email doesn't come across as professional, and useful, deleted.

        If your workaround is to use Signal, fine, but you're really just changing the validation point from X to Y.
        • by Martin Blank ( 154261 ) on Wednesday December 06, 2023 @06:03PM (#64062023) Homepage Journal

          Email is so insecure that best practices recommend running your email clients in separate VM's or Containers, just to isolate them from your system.

          Who is recommending this? I've been in security for nearly 20 years, and except for ultra-secure environments that 99.9% of users will never see, I've never seen such a suggestion. Further, almost no one is going to implement a VM just for their email client, and forget about an enterprise doing it to any real scale. There's just too much integration between programs for that to happen. They are especially not going to go the route of one VM for each account, and certainly not going to run Qubes.

          • by Murdoch5 ( 1563847 ) on Thursday December 07, 2023 @11:03AM (#64063673) Homepage
            Right, and because essentially zero companies take email security seriously, we commonly get to read about company X being hacked or having a data breach, because of an email. It's really simple, you either take email security seriously, or, when you get hacked because your email standards are crap, everyone laughs at you.

            Of course a simple workaround that is solid AF, PGP, because then you can verify and validate who is who. If person X from department Y sends me an email, I can look that up and verify they own the key, and validate the email, and if I'm really serious, give them a call and confirm.

            I do this occasionally, when emails look even partially suspect. I have literally lost count on the number of times an email has come in to my inbox, that was legit, that I wouldn't touch with a 10 foot pole.

            I'm actually surprised you haven't heard anyone recommend to run email clients, and especially servers, on VM's / Containers. The entire idea behind Qubes or any of the immutable OS's, NixOS, Fedora SilverCore, basically force this behaviour. There was a project from Microsoft, I'm not sure if they released it, that would isolate applications from each other in sandboxes, basically doing the "FlatPak" concept on Windows. The fundamental idea is to prevent a bad email from causing data loss, because it's contained, so it can only ever access a sandbox.

            Just to be clear, I know Users HATE anything that takes 1 microsecond of time away from their workflow, and that requires any education. However, being email is almost always the flashing arrow of security concern in a company, it's absolutely worth taking seriously. Even if you don't want to use a VM or Container, you can containerize your browsers, which is far from perfect, but it's a decent step.
            • by Martin Blank ( 154261 ) on Thursday December 07, 2023 @10:39PM (#64065501) Homepage Journal

              I greatly respect the work that Joanna Rutkowska put into Qubes, and what her team did when she stepped away from it. But it's not usable as an enterprise platform. It doesn't fit into any remote administration tools that are out there (at least as far as I am aware), and that's a key part of getting enterprises to accept it. Another important thing is, who provides support if something breaks? There was a plan in 2016 to provide commercial support, but I don't believe that ever took off. There are a few small firms offering support, but I don't see anything bigger than boutique firms, and a lot of training and hand-holding would be required for a conversion of any significant size.

              I tried it for a while, but eventually set it aside because I couldn't fit it into my workflow. It was too easy to break things, and the time that it took to fix them interfered with me getting actual work done. I could argue security benefits all day, but ultimately, if I can't do my job, they'll find someone who can.

              I'm actually surprised you haven't heard anyone recommend to run email clients, and especially servers, on VM's / Containers.

              I've heard plenty of people talk about running servers in their own VMs or containers. I do it myself. But that doesn't automatically increase security, and if one doesn't know what they're doing, it can make security worse.

              But those aren't the issue, and you bringing them up is a non sequitur at best and a red herring at worst. Email clients are the issue. And while I have heard of a few people talk about running their clients in a VM, that doesn't address my original question: Who is recommending this as a best practice? Certainly not the Center for Internet Security, or SANS, or NIST, or anyone else that I can find who isn't a purist that values security over getting work done.

              Microsoft has introduced some sandbox isolation features into Windows, though it requires enabling Hyper-V, which brings its own mixed bag of issues. Edge, for example, can be sandboxed, and Outlook 365 has had the capability since 2020 (I have no idea whether the permanent license versions can do it). It's possible to sandbox other applications with some work. But sandboxing isn't containerizing, and it certainly isn't isolating them in a VM. Microsoft gently encourages sandboxing, but I'm not sure they've reached the level of best practice, and they certainly aren't calling isolating email in a VM a best practice.

      • by bwalzer ( 708512 ) <slashdot&59,ca> on Wednesday December 06, 2023 @04:48PM (#64061785)

        All of them prefer Signal, which has its issues (particularly being tied to a phone number, which is both a strength and a weakness) but which is far, far easier to use,...

        Usability is a huge issue for encrypted messaging. PGP is included here. Unfortunately, so is Signal. In a usability study involving Signal[1], 21 out of 28 computer science students failed to establish and maintain a secure end to end encrypted connection. The problem was with identity verification.

        ...and is probably more secure than PGP/GPG will ever be.

        Related to the Signal usability issue related to identity verification, Signal cheerfully allows a user to do messaging without any such verification at all. So that means that Signal, Twilo (the entity that does the phone # verfication) and the phone company all have the opportunity to MITM the connection and get your messages. PGP will insist that you acknowledge that you have done the verification by signing the PGP identity in question. So, for almost all the people that currently use Signal, PGP would actually be more secure.

        Signal isn't the only instant messenger that allows insecure operation with unverified identities. In general, if you don't make the issue clear to the user, you are being at least a little dishonest on your end to end encryption claim.

        [1] https://www.ndss-symposium.org... [ndss-symposium.org]

        • by Martin Blank ( 154261 ) on Wednesday December 06, 2023 @05:58PM (#64062013) Homepage Journal

          PGP insists that someone signs the identity, not you specifically. I can create and upload a PGP key with your address to a key server and, unless you're monitoring for that, you would never know. If I can intercept your email traffic selectively, then since it's signed, it must be you, right? How many people contact their intended recipient to validate the fingerprint? How many of them know to do that, and of them, how many of them know how to reasonably securely contact you to validate that it's the right one?

          In a usability study involving Signal[1], 21 out of 28 computer science students failed to establish and maintain a secure end to end encrypted connection.

          If you look later in the study, you'll find that 13 of the 28 asked Bob to come into the room to compare the keys, but 6 failed to do the actual comparison, so it wasn't just that 75% utterly failed to do anything. There was some confusion about what to do, and the UI didn't help.

          But that paper is also from seven years ago, first presented at EuroUSEC 2016 in July of that year. Signal made several changes afterward to make it clearer what should be done (it changed to safety numbers with clearer messaging and easier confirmation in November 2016) and has made further changes since then.

          Ultimately, Signal is far easier to do than any version of PGP or GPG. Its encryption is much stronger, and while the implementation is not perfect, the fact that people who previously swore by PGP for secure communications have shifted says a lot about it.

  • by jdelarunz ( 10217105 ) on Tuesday December 05, 2023 @05:22PM (#64058059)
    I reckon that the Venn diagram of Facebook users and people interested in privacy would consist of two separate circles...
  • by dowhileor ( 7796472 ) on Tuesday December 05, 2023 @05:37PM (#64058107)

    OK, I tried it for a few days after decades of avoiding it. I felt dirty.....

  • by Feanorian ( 1664427 ) on Tuesday December 05, 2023 @05:54PM (#64058163)

    I didn't know FB allowed encrypted emails. Perhaps the usage was low because the deployment occurred in such a way that ensured its failure ?

  • by thesjaakspoiler ( 4782965 ) on Tuesday December 05, 2023 @06:38PM (#64058309)

    So why would you need encryption for anything anymore?

  • by Opportunist ( 166417 ) on Tuesday December 05, 2023 @08:22PM (#64058599)

    If you still use Facebook, you don't give a fuck about security or privacy.

  • by Dr. Tom ( 23206 ) <tomh@nih.gov> on Wednesday December 06, 2023 @07:05AM (#64059501) Homepage

    What is fasebook? I never heard of it

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...