Re: GPG tool for Windows Embeddd Compact 7

2014-04-09 Thread dbhukta .
Hi,

Can you give the solution for GPGtool which will run for Windows Embedded
Compact 7. Or any Binary file which will be compatible for windows embedded
compact 7.

looking forward to hear from you.

Regards

D Bhukta
+918600096629




On Fri, Feb 21, 2014 at 1:29 AM, Alan Meekins alan.meek...@gmail.comwrote:

 Not all Windows Embedded OSes are built on top of CE! Look here for a
 listing of the 
 productshttps://www.microsoft.com/windowsembedded/en-us/downloads.aspx.
 It sounds like you are likely using Windows Embedded Standard 7(aka WES7,
 yuck what a mouthful!) which is just a rebranded version of normal old
 Windows 7. If this is the case it means anything that can run on windows
 7(big windows) will run on WES7 with no modification. The caveat about
 Windows Embedded is that you have the flexibility to strip out just about
 any componenet of Windows so the most likely issues you will hit are around
 what you have removed from the image causing breaks in 3rd party software
 such as GnuPG. So in short we need to know the exact version if Windows you
 are running to really give accurate advice. CE is a different world which
 may require you to recompile the programs you wish to run depending on your
 exact scenario.

 Cheers,
 -Alan


 On Thu, Feb 20, 2014 at 9:01 AM, Andre Heinecke 
 aheine...@intevation.dewrote:

 Hi,

 On Wednesday 19 February 2014 08:13:36 dbhukta . wrote:
  Let me know any version which is compatible for Windows embedded
 Compact 7
  to encrypt/decrypt  a text file at least.

 GnuPG has been ported to Windows CE 5.0 so it should / could work on
 Windows
 embedded 7 (I guess its untested) as this work was done 2010 as part of a
 Project and there has been little interest in Windows CE since.

 We still have some binaries lying around:

 http://files.kolab.org/local/windows-ce/gpg-snapshots/gpg_wince-dev-190111.zip

 Sources for that version:

 http://files.kolab.org/local/windows-ce/gpg-snapshots/gpg-ce-dev-190111-src.zip

 And a signed sha1sums file in:
 http://files.kolab.org/local/windows-ce/gpg-snapshots/

 Maybe it works, maybe not.
 Have fun

 --
 Andre Heinecke |  ++49-541-335083-262 |  http://www.intevation.de/
 Intevation GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B
 18998
 Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users





-- 
Regards,

Dinabandhu Bhukta
8600096629
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Sam Gleske
On Tue, Apr 8, 2014 at 11:01 PM, Felipe Vieira fmv1...@gmail.com wrote:

 Dear GNUPG community,
 I think a lot of unexperienced users would like to know more about the
 Heartbleed problem found on some of the openssl versions. I have two broad
 questions and two specific questions:
 1) Which type of clients have been compromised (consider an ordinary user)?
 2) Which common applications use openssl and are a potential target?

 2) Are firefox users compromised?
 3) Are RetroShare users compromised?
 Thanks in advance.


For the most part it is service providers who are affected by the bug.
There's a handy website to verbosely explain heartbleed.

http://heartbleed.com/

Affected services include HTTP, email servers (SMTP, POP and IMAP
protocols), chat servers (XMPP protocol), virtual private networks (SSL
VPNs), databases (e.g. mysql), and pretty much any service that uses
openssl TSL/SSL to secure transport of services if they're recently patched.

Security notices for popular server distros...
RHEL - https://access.redhat.com/site/solutions/781793
Ubuntu - http://www.ubuntu.com/usn/usn-2165-1/

CLIENT

There's not much you can do at this point.  Update your system packages and
that's about it.

SERVICE PROVIDER
Essentially you want to take the following steps if you're  service
provider.

1. Test for the vulnerability - http://pastebin.com/WmxzjkXJ it is also
prudent to search for the affected package versions across all services.
2. If vulnerable patch the OpenSSL version of public front end services
first.  Patch backend services after the front end is secure.
3. Reissue SSL private keys and certificates.  Since the leak exposes the
private key it is no longer pristine.

For the remaining more thorough steps of what to do see the
heartbleed.orgwebsite which has a nice set of instructions.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Tristan Santore
On 09/04/14 14:17, Sam Gleske wrote:
 On Tue, Apr 8, 2014 at 11:01 PM, Felipe Vieira fmv1...@gmail.com
 mailto:fmv1...@gmail.com wrote:

 Dear GNUPG community,
 I think a lot of unexperienced users would like to know more about
 the Heartbleed problem found on some of the openssl versions. I
 have two broad questions and two specific questions:
 1) Which type of clients have been compromised (consider an
 ordinary user)?
 2) Which common applications use openssl and are a potential target?

 2) Are firefox users compromised?
 3) Are RetroShare users compromised?
 Thanks in advance.


 For the most part it is service providers who are affected by the
 bug.  There's a handy website to verbosely explain heartbleed.

 http://heartbleed.com/

 Affected services include HTTP, email servers (SMTP, POP and IMAP
 protocols), chat servers (XMPP protocol), virtual private networks
 (SSL VPNs), databases (e.g. mysql), and pretty much any service that
 uses openssl TSL/SSL to secure transport of services if they're
 recently patched.

 Security notices for popular server distros...
 RHEL - https://access.redhat.com/site/solutions/781793
 Ubuntu - http://www.ubuntu.com/usn/usn-2165-1/

 CLIENT

 There's not much you can do at this point.  Update your system
 packages and that's about it.

 SERVICE PROVIDER
 Essentially you want to take the following steps if you're  service
 provider.

 1. Test for the vulnerability - http://pastebin.com/WmxzjkXJ it is
 also prudent to search for the affected package versions across all
 services.
 2. If vulnerable patch the OpenSSL version of public front end
 services first.  Patch backend services after the front end is secure.
 3. Reissue SSL private keys and certificates.  Since the leak exposes
 the private key it is no longer pristine.

 For the remaining more thorough steps of what to do see the
 heartbleed.org http://heartbleed.org website which has a nice set of
 instructions.


 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
It is imperative you revoke old keys! Not just reissue!

Regards,
Tristan

-- 

Tristan Santore BSc MBCS
TS4523-RIPE
Network and Infrastructure Operations
InterNexusConnect
Mobile +44-78-55069812
tristan.sant...@internexusconnect.net

Former Thawte Notary
(Please note: Thawte has closed its WoT programme down,
and I am therefore no longer able to accredit trust)

For Fedora related issues, please email me at:
tsant...@fedoraproject.org

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Robert J. Hansen
 Dear GNUPG community,

That right there should be your first hint.  :)

This is a great email list to get informed opinions on GnuPG and the
OpenPGP RFCs, but this may not be a great place to get informed
commentary on OpenSSL.  It's a completely different software package run
by a completely different outfit.

You may get better answers if you ask on the OpenSSL mailing lists.  :)

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


It's 2014. Are we there yet?

2014-04-09 Thread Kapil Aggarwal
Folks,

I'm an ardent reader of this (and a few other) mailing
lists, but usually stay quiet and in the background. However, in light of
global events and paradigm shifts in the last few months, I'm tempted to
speak up.

 

While I do use PGP/GPG, I have to admit that the usage has
been minimal and sporadic over the last few years, with the usual suspects
as reasons. But the biggest reason of course is adoption i.e. very few in
my social/professional circle use it. Now, we all (probably,
subconsciously?) know/acknowledge why that is, we are in 2014 after all. 

 

My personal belief is that the awareness for secure
communications is starting to rise, not just for the niche users who are
already using it/know how to use it, but for the average Joe user as well.
My definition of the average Joe user btw is someone who:

 

-  Has at least one computing device, if not more

-  Is familiar with email

-  Is already using various online mediums

-  Has usually never thought about secure communications or maybe
in an abstract fashion

 

Now, the barrier to entry of secured communications is high. I realize that.
I'm sure a lot of you do as well. It's not easy, it takes time, patience, a
certain level of expertise and a tacit acknowledgement that they need to use
it in the first place (probably the most important).

 

The secure communications paradigm of course spans a whole spectrum from
I don't give a  to I'll do anything to protect my communications,
including giving away my first born. I suspect the average Joe user in
2014 is slightly above the former, but way below the latter. Without going
to the other end of the spectrum, what will make adoption of secure
communications a bit more palatable to the average Joe user?

 

Let's list a few arguments:

 

-  I don't even know what I need. - Well, assuming they are starting
to recognize the need, I suspect they will find out relatively easily as to
what they need. With a few caveats of course. There's way more FUD/noise/BS
out there than the average person can decipher, so it'll probably end as
being word-of-mouth recommendations or such.

-  Even if I know what I need, getting it/installing it is hard. -
It is. The setup/install needs to be simpler, i.e. as simple as installing
an app. That is what the average Joe user is capable of.

-  WTF is a key pair/public key/private key/insert more arcane
terminology. - J This IS a big problem. I may get it, you may get it, how
does the average Joe user gain that understanding? The nomenclature needs to
be, well, something that the average Joe user can understand as well. They
understood SSL (well, for the most part).

-   . several more similar arguments.

 

Now, what will help drive this adoption more?

 

-  A better install experience?

-  A dumbed down (if you will) taxonomy that they can understand?

-  Simpler UIs? (without sacrificing secure functionality)

-  Better integration with existing systems?

-  Education? i.e. ongoing information dissemination that educates
people on these things. Newsletters? How tos? Youtube videos (shudder)? And
others.

-  Start hitting them on the head with a baseball bat? J

 

All thoughts are very much welcome and appreciated.

 

Kapil Aggarwal.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


It's 2014. Are we there yet?

2014-04-09 Thread Kapil Aggarwal
Folks,
I’m an ardent reader of this (and a few other) mailing lists, 
but usually stay quiet and in the background. However, in light of global 
events and paradigm shifts in the last few months, I’m tempted to speak up.

While I do use PGP/GPG, I have to admit that the usage has been 
minimal and sporadic over the last few years, with the usual suspects as 
reasons. But the biggest reason of course is “adoption” i.e. very few in my 
social/professional circle use it. Now, we all (probably, subconsciously?) 
know/acknowledge why that is, we are in 2014 after all. 

My personal belief is that the awareness for secure 
communications is starting to rise, not just for the niche users who are 
already using it/know how to use it, but for the “average Joe user” as well. My 
definition of the “average Joe user” btw is someone who:

-   Has at least one computing device, if not more
-   Is familiar with email
-   Is already using various online mediums
-   Has usually never thought about “secure communications” or maybe in an 
abstract fashion

Now, the barrier to entry of secured communications is high. I realize that. 
I’m sure a lot of you do as well. It’s not easy, it takes time, patience, a 
certain level of expertise and a tacit acknowledgement that they need to use it 
in the first place (probably the most important).

The “secure communications” paradigm of course spans a whole spectrum from “I 
don’t give a ” to “I’ll do anything to protect my communications, including 
giving away my first born”. I suspect the “average Joe user” in 2014 is 
slightly above the former, but way below the latter. Without going to the other 
end of the spectrum, what will make adoption of secure communications a bit 
more palatable to the “average Joe user”?

Let’s list a few arguments:

-   I don’t even know what I need. – Well, assuming they are starting to 
recognize the need, I suspect they will find out relatively easily as to what 
they need. With a few caveats of course. There’s way more FUD/noise/BS out 
there than the average person can decipher, so it’ll probably end as being 
word-of-mouth recommendations or such.
-   Even if I know what I need, getting it/installing it is hard. – It is. 
The setup/install needs to be simpler, i.e. as simple as installing an “app”. 
That is what the average Joe user is capable of.
-   WTF is a key pair/public key/private key/insert more arcane 
terminology… -  This IS a big problem. I may get it, you may get it, how does 
the average Joe user gain that understanding? The nomenclature needs to be, 
well, something that the average Joe user can understand as well. They 
understood SSL (well, for the most part).
-… several more similar arguments.

Now, what will help drive this adoption more?

-   A better install experience?
-   A “dumbed down” (if you will) taxonomy that they can understand?
-   Simpler UIs? (without sacrificing secure functionality)
-   Better integration with existing systems?
-   Education? i.e. ongoing information dissemination that educates people 
on these things. Newsletters? How tos? Youtube videos (shudder)? And others.
-   Start hitting them on the head with a baseball bat? 

All thoughts are very much welcome and appreciated.

Kapil Aggarwal.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's 2014. Are we there yet?

2014-04-09 Thread Sam Gleske
On Wed, Apr 9, 2014 at 1:20 PM, Kapil Aggarwal ka...@hotmail.com wrote:

 -   I don’t even know what I need. – Well, assuming they are starting
 to recognize the need, I suspect they will find out relatively easily as to
 what they need. With a few caveats of course. There’s way more FUD/noise/BS
 out there than the average person can decipher, so it’ll probably end as
 being word-of-mouth recommendations or such.
 -   Even if I know what I need, getting it/installing it is hard. – It
 is. The setup/install needs to be simpler, i.e. as simple as installing an
 “app”. That is what the average Joe user is capable of.
 -   WTF is a key pair/public key/private key/insert more arcane
 terminology… -  This IS a big problem. I may get it, you may get it, how
 does the average Joe user gain that understanding? The nomenclature needs
 to be, well, something that the average Joe user can understand as well.
 They understood SSL (well, for the most part).
 -… several more similar arguments.

 Now, what will help drive this adoption more?

 -   A better install experience?
 -   A “dumbed down” (if you will) taxonomy that they can understand?
 -   Simpler UIs? (without sacrificing secure functionality)
 -   Better integration with existing systems?
 -   Education? i.e. ongoing information dissemination that educates
 people on these things. Newsletters? How tos? Youtube videos (shudder)? And
 others.
 -   Start hitting them on the head with a baseball bat? 


I've actually started talking to my family a lot about using it and getting
my parents to use GNUPG.  I think the biggest problem is too many paths
to accomplish what is needed.  There's so much software and so many
recommendations that you, as an expert explaining to your friends, need to
show them a single path and say, This is how it is done.

I've written a document for my family and regularly link it on facebook
encouraging friends and family to use it.  Warning to PGP experts, the
terminology is dumbed down and the concepts are filtered so not everything
is technically correct but explained in a way that the user can
understand.  Also, it's a few pages of text and mostly screen shots.  I
tried making it fun somewhat so bear with the imagery.

http://www.pages.drexel.edu/~sag47/privacy_for_everyone.pdf

SAM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's 2014. Are we there yet?

2014-04-09 Thread Robert J. Hansen
 The “secure communications” paradigm of course spans a whole spectrum
 from “I don’t give a ” to “I’ll do anything to protect my
 communications, including giving away my first born”. I suspect the
 “average Joe user” in 2014 is slightly above the former, but way below
 the latter. Without going to the other end of the spectrum, what will
 make adoption of secure communications a bit more palatable to the
 “average Joe user”?

Every year or so this subject comes up, and my answers are unchanged
from last time: start by reading up on academic papers studying this
exact problem.  For a while John Clizbe and I kept a list of good
papers, but I have to confess I haven't been keeping up on the latest
literature.  Still, our last list is pretty good reading.

(These selections come from both John and me, but John is the one who
assembled them into proper cite format -- thanks, John.  For the
original message, see Re: what is killing PKI? on this mailing list,
posted on 24 Aug 2012.)

=

Gaw, S., Felten, E. W., and Fernandez-Kelly, P. 2006.
Secrecy, flagging, and paranoia: adoption criteria in encrypted email.
In Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems (Montreal, Quebec, Canada, April 22 - 27, 2006).
R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and
G. Olson, Eds. CHI '06. ACM, New York, NY, 591-600.
DOI= http://doi.acm.org/10.1145/1054972.1055069

Garfinkel, S. L., Margrave, D., Schiller, J. I., Nordlander, E.,
and Miller, R. C. 2005. How to make secure email easier to use.
In _Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems_ (Portland, Oregon, USA, April 02 - 07, 2005).
CHI '05. ACM, New York, NY, 701-710.
DOI= http://doi.acm.org/10.1145/1054972.1055069

Alma Whitten and J.D. Tygar. Why Johnny Can’t Encrypt: A Usability
Evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security
Symposium, Washington, DC, August 1999. http://bit.ly/OaEeTD

Steve Sheng, Levi Broderick, Colleen Alison Koranda, and Jeremy J.
Hyland. Why Johnny Still Can’t Encrypt: Evaluating the Usability of
Email Encryption Software. Poster session, 2006 Symposium On Usable
Privacy and Security, Pittsburgh, PA, July 2006.
http://cups.cs.cmu.edu/soups/2006/posters/sheng-poster_abstract.pdf

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: It's 2014. Are we there yet?

2014-04-09 Thread Kapil Aggarwal
I have. I was hoping there has been atleast a small rise in user perception
about secure communications and newer software platforms/delivery channels
that are beneficial.

-Original Message-
From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of Robert
J. Hansen
Sent: Wednesday, April 09, 2014 1:59 PM
To: gnupg-users@gnupg.org
Subject: Re: It's 2014. Are we there yet?

 The secure communications paradigm of course spans a whole spectrum 
 from I don't give a  to I'll do anything to protect my 
 communications, including giving away my first born. I suspect the 
 average Joe user in 2014 is slightly above the former, but way below 
 the latter. Without going to the other end of the spectrum, what will 
 make adoption of secure communications a bit more palatable to the 
 average Joe user?

Every year or so this subject comes up, and my answers are unchanged from
last time: start by reading up on academic papers studying this exact
problem.  For a while John Clizbe and I kept a list of good papers, but I
have to confess I haven't been keeping up on the latest literature.  Still,
our last list is pretty good reading.

(These selections come from both John and me, but John is the one who
assembled them into proper cite format -- thanks, John.  For the original
message, see Re: what is killing PKI? on this mailing list, posted on 24
Aug 2012.)

=

Gaw, S., Felten, E. W., and Fernandez-Kelly, P. 2006.
Secrecy, flagging, and paranoia: adoption criteria in encrypted email.
In Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems (Montreal, Quebec, Canada, April 22 - 27, 2006).
R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds.
CHI '06. ACM, New York, NY, 591-600.
DOI= http://doi.acm.org/10.1145/1054972.1055069

Garfinkel, S. L., Margrave, D., Schiller, J. I., Nordlander, E., and Miller,
R. C. 2005. How to make secure email easier to use.
In _Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems_ (Portland, Oregon, USA, April 02 - 07, 2005).
CHI '05. ACM, New York, NY, 701-710.
DOI= http://doi.acm.org/10.1145/1054972.1055069

Alma Whitten and J.D. Tygar. Why Johnny Can't Encrypt: A Usability
Evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium,
Washington, DC, August 1999. http://bit.ly/OaEeTD

Steve Sheng, Levi Broderick, Colleen Alison Koranda, and Jeremy J.
Hyland. Why Johnny Still Can't Encrypt: Evaluating the Usability of Email
Encryption Software. Poster session, 2006 Symposium On Usable Privacy and
Security, Pittsburgh, PA, July 2006.
http://cups.cs.cmu.edu/soups/2006/posters/sheng-poster_abstract.pdf

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl / Pertinent? I say yes.

2014-04-09 Thread Christopher J. Walters

On 4/9/2014 2:08 PM, Robert J. Hansen wrote:

safe.  How would you protect your home and valuables then?  That is the
type of problem that Heartbleed is, and it IMO needs to be posted
EVERYWHERE, so that people can at least try to protect themselves.


Please re-read my message.  I never told him to post elsewhere or that
it was off-topic for this list.  I simply told him where he might get
better answers.  If I was still teaching at the university and a student
came by looking for help with calculus homework, my first response would
be, Well, you're in the Computer Science department; the Math
department is at the other end of this hallway.

And my second response would be, But maybe I can help you: let's see.

:)


Believe it or not, I did read your message.  I did not mean to accuse you of 
telling him to post elsewhere or that it was off-topic for the list.  I am 
sorry if you got that impression. I just feel the the issue is very important, 
and needs to be shouted from the roof tops, as the saying goes.


Again, my message was nothing personal against you.  I just thought I'd provide 
more information on the bug.


My message has not shown up on the list, yet.  Is the list moderated, or is it 
just an issue of a reply to a message showing up before the actual message does?


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl / Pertinent? I say yes.

2014-04-09 Thread Christopher J. Walters

On 4/9/2014 12:51 PM, Robert J. Hansen wrote:

Dear GNUPG community,


That right there should be your first hint.  :)

This is a great email list to get informed opinions on GnuPG and the
OpenPGP RFCs, but this may not be a great place to get informed
commentary on OpenSSL.  It's a completely different software package run
by a completely different outfit.

You may get better answers if you ask on the OpenSSL mailing lists.  :)


You're right in the respect that this list is only for GnuPG and OpenPGP RFC 
support.


However, the Heartbleed vulnerability is such a pervasive Internet security 
issue that everyone needs to be made aware of it, so that they may become 
educated on it.  In my experience, the majority of Internet users take for 
granted that their Internet banking, shopping, and all other secure uses of 
the Internet are, in fact, truly *secure*.  This vulnerability affect the 
entire SSL of the Internet (since the majority of clients and servers use 
OpenSSL) - that makes every site vulnerable to spoofing, and everyone who uses 
the Internet for any secure transactions vulnerable to identity theft.


This bug *should* have been reported across the whole Internet when it was 
discovered about 2 years ago, but even now, no one wants to talk or hear about 
it anywhere.


Imagine if ALL companies that produce locks, safes, and provide home security 
had a security problem that would allow anyone who knew about the problem to 
anonymously get keys (or even master keys) to any lock, and to override any 
home security system, and get the combination to any safe.  How would you 
protect your home and valuables then?  That is the type of problem that 
Heartbleed is, and it IMO needs to be posted EVERYWHERE, so that people can at 
least try to protect themselves.


Regards,
Chris

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's 2014. Are we there yet?

2014-04-09 Thread Sam Gleske
On Wed, Apr 9, 2014 at 3:23 PM, Daniel Kahn Gillmor
d...@fifthhorseman.netwrote:

 Hi Sam--

 [offlist for now, see why below]

 On 04/09/2014 01:29 PM, Sam Gleske wrote:
  I've written a document for my family and regularly link it on facebook
  encouraging friends and family to use it.  Warning to PGP experts, the
  terminology is dumbed down and the concepts are filtered so not
 everything
  is technically correct but explained in a way that the user can
  understand.  Also, it's a few pages of text and mostly screen shots.  I
  tried making it fun somewhat so bear with the imagery.
 
  http://www.pages.drexel.edu/~sag47/privacy_for_everyone.pdf

 I'm really glad to see popularization of these tools.  thank you for
 writing this up.  i also really like your tinfoil hat photograph :) But...

 i read your disclaimer above, but the document (sha1sum
 6dac22e5fa1095638149a537d6a3b641ad2dd551) has dangerously misleading
 directions.  I strongly recommend you take it down for now while we
 figure out what to do about it.

 I haven't reviewed the whole document yet, but page 15 is particularly
 troubling.  the problem is that you describe the concept of key
 validity, but associate it with key ownertrust.

 key validity is does this key belong to a person whose name and e-mail
 are indicated in the User ID?

 key ownertrust is am i willing to rely on identity certifications made
 by the holder of this key?

 These are entirely separate questions.  I may know for sure that my
 boss's key belongs to my boss, but i don't want her to be able to create
 a new key that appears to belong to my husband, certify it, and send me
 mail that would then appear to come from my husband.  Even worse, i
 wouldn't want my mail to my husband to be encrypted to this bogus key,
 because my boss could then read the contents of the mail.

 There are other problems with the text, including (from a quick skim,
 not exhaustive, ordered from trivial to security-critical):

  * page 17 is far too much information about a useless-at-best feature
 (see [0])

  * the document recommends the use of pgp.mit.edu instead of the
 standard pool.sks-keyservers.net

  * the document discourages the creation of revocation certificates

  * page 11 seems to assume that asking their key ID is sufficient to
 verify identity, though this is distinctly not the case [1].  this is
 seriously insecure.  I can send you a new OpenPGP key show private half
 i control, but with your user ID and your keyID later if you need
 convincing. :/

 I recommend you read the riseup/debian OpenPGP best practices document
 [2] and the GnuPG DETAILS document and consider trying to align your
 document with the information and recommendations in those materials.

 I've left this message offlist for now, because i'm hoping you'll follow
 up on the message publicly and make it clear what your plan is with this
 document;  If you'd like, either you or i can post these concerns
 publicly, and we can have the discussion on-list.  But i think a quick
 note from you asking people not to rely on the current draft of that
 document while you revise it for clarity and correctness would be great.

 let me know what you think.  sorry to send you a lengthy critique, and i
 hope it doesn't discourage you from continuing to spread the word about
 encryption.  It's just important to avoid making recommendations that
 give people a sense of security that turns out to leave them vulnerable
 in hidden ways.

 All the best,

 --dkg

 [0] https://www.debian-administration.org/users/dkg/weblog/98
 [1] https://www.debian-administration.org/users/dkg/weblog/105
 [2] https://we.riseup.net/debian/openpgp-best-practices



I agree with your concerns.  In reality I only started using GPG a few
weeks ago which would explain my amateurish approach I suppose.  There is a
source document written in openoffice...

http://www.pages.drexel.edu/~sag47/privacy_for_everyone.odt

Also, I have created sha1 files... just append *.sha1 to the file name e.g.
http://www.pages.drexel.edu/~sag47/privacy_for_everyone.odt.sha1

For now I have removed the PDF since I have widely distributed the link to
the PDF so that people don't download it and receive misinformation.

The odt file remains.  I'm open to editing the document for clarity and
fact checking.  Once, an acceptable revised copy is well received on the
list then I'll recreate a PDF and upload it again.

SAM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Pete Stephenson
On Apr 10, 2014 12:22 AM, Felipe Vieira fmv1...@gmail.com wrote:

 So going back to the original question as I can see there is no
disagreement on its importance:
 1) What are the consequences to the ordinary user?
 All the news are lacking information on that. Can you point relevant
examples?

Any service using a vulnerable version of OpenSSL in the last two years
could have been silently attacked, with the attackers being able to gain
access to information stored in the servers memory.

The attacker might get memory containing empty sections, boring system
files, secret cryptographic keys (the compromise of which could, in some
cases, lead to user data being decrypted or a MITM being possible with no
warnings), user data, etc.

Its not clear of any bad guys knew about the bug prior to the announcement.
If they didn't and one patched any affected servers as soon as possible,
then the effects would be quite minimal. If they did know and exploited
things, or if one has not yet patched vulnerable systems, things could be
very bad.

In short: the consequences could be dire but there is no way of knowing for
certain what, if any, things have been compromised. Its probably best to
assume the worst.

 All I could gather is that the only major/well known server to be
compromised was Yahoo.

Yahoo fixed the issue shortly after the public announcement of the bug. It
is not clear of bad guys were able to compromise their systems before it
was fixed, but researchers were able to successfully probe various systems
at Yahoo prior to the fix, so one should assume bad guys could do the same.

 For example: Gmail and Dropbox and Hotmail seem to be imune to this. I
also found out that Mozilla/Firefox browser were also imune. If I would
persuade someone of this bug's importance, which other examples could I
give?

No service using an affected version of OpenSSL is immune. Some (like
Cloudflare) received advanced notice and patched their systems before the
public announcement, while others may have used other SSL libraries or
versions of OpenSSL that were not vulnerable.

 2) (specific question) Does Firefox use openssl to connect to some
servers while browsing?

No. Firefox is immune because it uses the NSS Crypto library.

The issue typically exists on and affects servers. A server using an
affected version of OpenSSL is vulnerable regardless of what browser
clients use.

 3) How about Ubuntu and other OSs? Do they use openssl to update
themselves? (as in apt-get update  apt-get upgrade).

Ubuntu and Debian use GnuPG to sign packages but updates typically take
place over unencrypted connections. The update mechanism is not affected by
this bug.

Cheers!
-Pete
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Felipe Vieira
So going back to the original question as I can see there is no
disagreement on its importance:
*1) What are the consequences to the ordinary user? *
All the news are lacking information on that. Can you point relevant
examples?
All I could gather is that the only major/well known server to be
compromised was Yahoo.
For example: Gmail and Dropbox and Hotmail seem to be imune to this. I also
found out that Mozilla/Firefox browser were also imune. If I would persuade
someone of this bug's importance, which other examples could I give?

2) (specific question) Does Firefox use openssl to connect to some servers
while browsing?

3) How about Ubuntu and other OSs? Do they use openssl to update
themselves? (as in apt-get update  apt-get upgrade).
Be as clear and basic as possible. In the context of It's 2014. Are we
there yet? thread, I would like more shocking/tangible examples to suggest
friends to start thinking of cryptography (and then we are back to gnupg).
Thanks again.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Sam Gleske
On Wed, Apr 9, 2014 at 6:45 PM, Pete Stephenson p...@heypete.com wrote:

 On Apr 10, 2014 12:22 AM, Felipe Vieira fmv1...@gmail.com wrote:
 
  So going back to the original question as I can see there is no
 disagreement on its importance:
  1) What are the consequences to the ordinary user?
  All the news are lacking information on that. Can you point relevant
 examples?

 In short: the consequences could be dire but there is no way of knowing
 for certain what, if any, things have been compromised. Its probably best
 to assume the worst.


^ That.  Assume the worst because the vulnerability was there for two
years.  Not sure who you're having a hard time convincing but send them to
heartbleed.com.  The first three paragraphs are for high flying executives
whose business critical documents are at risk.

  For example: Gmail and Dropbox and Hotmail seem to be imune to this. I
 also found out that Mozilla/Firefox browser were also imune. If I would
 persuade someone of this bug's importance, which other examples could I
 give?

What type of person are you trying to persuade?  If you download any of the
vulnerability test scripts in the wild you'll notice that the 64k output is
truncated and the script simply states you're vulnerable.  Edit that
script so that it dumps the full 64k.  While you're at it put that script
in an infinite while loop and dump the output to a file on disk.  Then use
Firefox or chrome or whatever browser you want and log in to the service.
When you're done search the file for your credentials.  It doesn't matter
what browser you're using.

  2) (specific question) Does Firefox use openssl to connect to some
 servers while browsing?

 No. Firefox is immune because it uses the NSS Crypto library.

I have verified this claim.  (Firefox Version: 28.0+build2-0ubuntu0.12.04.1)

$ dpkg -L firefox | while read x;do [ -f ${x} ]  (if ldd ${x}
2/dev/null | grep libssl /dev/null;then echo ${x};fi);done | while
read x;do echo ${x};ldd ${x} 2/dev/null | grep libssl;done
/usr/lib/firefox/components/libmozgnome.so
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7ffd9d836000)
/usr/lib/firefox/components/libdbusservice.so
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7f778ceda000)
/usr/lib/firefox/libxul.so
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7f326e66)
/usr/lib/firefox/browser/components/libbrowsercomps.so
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7fa4537f3000)
/usr/lib/firefox/plugin-container
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7f0807de7000)

$ dpkg -S /usr/lib/x86_64-linux-gnu/libssl3.so
libnss3: /usr/lib/x86_64-linux-gnu/libssl3.so

If it was openssl then it would be linked to
/lib/x86_64-linux-gnu/libssl.so.1.0.0 which is a part of the libssl1.0.0
package which is a dependency of the openssl package.

 The issue typically exists on and affects servers. A server using an
 affected version of OpenSSL is vulnerable regardless of what browser
 clients use.

While it's true Firefox does not link openssl in binaries the vulnerability
allows an attacker to easily hijack sessions, steal usernames and
passwords, and steal the server private key during the SSL negotiation
phase.  See my comments above for how you can verify that.

  3) How about Ubuntu and other OSs? Do they use openssl to update
 themselves? (as in apt-get update  apt-get upgrade).

 Ubuntu and Debian use GnuPG to sign packages but updates typically take
 place over unencrypted connections. The update mechanism is not affected by
 this bug.

True.  $ grep -rH 'http:' /etc/apt/sources.list*

I'm not sure who you're trying to convince, Felipe, but HOPEFULLY you have
already handled this bug by patching and added rules to your intrusion
detection system for packets trying to attack SSL using this method (the
attack packets look very different from normal SSL communication).

Pete, forgive me breaking down your reply but I found it a good exercise in
attempting to verify your claims.

Environment
KUbuntu 12.04.4 LTS
Linux 3.8.0-37-generic x86_64

SAM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Robert J. Hansen
 1) What are the consequences to the ordinary user?

None.  The ordinary user is such an easy target that as bad as this
attack is, I don't see it as making things any worse.

 All the news are lacking information on that. Can you point relevant
 examples?

Not yet.  Give it a few days: news reports will develop, Wikipedia will
be updated, and so on.

 2) (specific question) Does Firefox use openssl to connect to some
 servers while browsing?

https://www.google.com/search?q=does+firefox+use+openssl

No, it does not.  Nor does Chrome.

 3) How about Ubuntu and other OSs? Do they use openssl to update
 themselves? (as in apt-get update  apt-get upgrade).

Usually not.  Repositories are normally accessed via HTTP, not HTTPS.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's 2014. Are we there yet?

2014-04-09 Thread Sam Kuper
On 09/04/2014, Kapil Aggarwal ka...@hotmail.com wrote:
 Now, what will help drive this adoption more?

 All thoughts are very much welcome and appreciated.

One possible answer: https://www.mailpile.is/faq/

I haven't tried it myself, btw.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Daniel Kahn Gillmor
On 04/09/2014 07:20 PM, Robert J. Hansen wrote:

 No, it does not.  Nor does Chrome.

Chromium (from which chrome is based) actually embeds a copy of openssl,
but doesn't use it for its TLS implementation, which is where the bug
would be triggered.  (i'm not sure why they do this embedding actually,
i haven't reviewed it).

 3) How about Ubuntu and other OSs? Do they use openssl to update
 themselves? (as in apt-get update  apt-get upgrade).
 
 Usually not.  Repositories are normally accessed via HTTP, not HTTPS.

even if they were accessed via https, this bug wouldn't have caused any
problem greater than a malicious attacker on the network being able to
see what packages you were downloading, and/or making you fetch an older
version of the repo you're looking at (or giving you this repository
can't be authenticated warnings).  This is the same situation you're in
when you download via HTTP, though, so it's not a big deal in this context.

Your software updates for apt and yum are secured by OpenPGP signatures
over the archives themselves, which are made (for responsible
repositories anyway) via secret keys that aren't exposed to the web
servers that host the archives.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


PGP/GPG does not work easily with web-mail.

2014-04-09 Thread One Jsim
PGP/GPG does not work easily with web-mail.

Most email, today, is read and write using the browser

POP ou IMAP mail is a rarity

That is the problem

Some text/link in this problem?

José Simões
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Robert J. Hansen
 Chromium (from which chrome is based) actually embeds a copy of openssl,
 but doesn't use it for its TLS implementation, which is where the bug
 would be triggered.  (i'm not sure why they do this embedding actually,
 i haven't reviewed it).

I have heard that Chrome is migrating to OpenSSL instead of Mozilla's
NSS libraries; it's possible Chromium is a testbed.  Speculation on my
part, though.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Felipe Vieira
Thanks everyone for the quick and complete feedback. New questions arose:

1) Firefox uses NSS instead of OpenSSL. Still it can communicate with a
OpenSSL based server (say X) and thus the browser's type is irrelevant. The
communication between browser and X could be eavesdropped. Is that correct?

2) If the first answer is yes, only the X service credentials/data could be
stolen or does that compromis the whole browser session (e.g.:
communication browser - service Y and browser - service Z)?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/GPG does not work easily with web-mail.

2014-04-09 Thread Leo Gaspard
On Wed, Apr 09, 2014 at 11:37:52PM +0100, One Jsim wrote:
 PGP/GPG does not work easily with web-mail.
 
 Most email, today, is read and write using the browser
 
 POP ou IMAP mail is a rarity
 
 That is the problem
 
 Some text/link in this problem?
 
 José Simões

Well... I started to write a firefox addon, but never had enough time to finish
it. Perhaps later. If anyone wishes to get what I've done (that is, a js-ctype
binding of gpgme, along with tests AFAICR), I can try to locate the source code!

However, a major issue remains the encryption of HTML documents, which is,
AFAICT, not possible today (well, not automatically at least, as of course gpg
can be used to sign html files); and besides not obviously secure: what about
white-on-white text and such? I don't doubt there are fixes for such, and most
isn't even an issue; I just remember enigmail forbids it, so I guess there are
reasons.

Sorry for not helping you more,

Leo

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Robert J. Hansen
 Thanks everyone for the quick and complete feedback. New questions arose:

Again, you will have better luck asking on an OpenSSL mailing list.
There is no guarantee that anyone on this mailing list is an expert in
OpenSSL.

 The communication between browser and X could be eavesdropped. Is that
 correct?

Someone else could connect to X and use Heartbleed to scan the contents
of X's memory.  Anything sent to X could be considered compromisable for
so long as it's stored in X's RAM.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


request for pgp encrypted messages for testing

2014-04-09 Thread Tim Prepscius
Hey there,

As I've said before, I'm working on a PGP based web mail program.
https://github.com/timprepscius/mv


The whole thing is GPL-Affero.  Copy, steal, add, reduce, as you wish.

Demonstration is here (which is often killed/reset/etc/so...):
http://pmx.mooo.com/

And some screenshots:
http://tinypic.com/r/2ljmj9i/8
http://tinypic.com/r/4vp7hu/8

Also, if anyone is interested in what the db looks like (without
actually setting it up for yourself)
http://pmx.mooo.com/mv/util/Dump

-


At this point I'm at 100% for testing signatures of messages (both
inline and pgp-mime).  (Prob actually 95% but not enough test cases
yet.)


I need more messages testing encryption.  I have found a few bugs in
openpgpjs concerning mime signing, and am dubious that it will
function perfectly with pgp-encryption.

If anyone here would like to help, please send an encrypted message to:
g...@pmx.mooo.com

g's public key is here:
http://pastebin.com/raw.php?i=RAi8cfjC

If you would like your message to be placed in a public repository of
these messages, please include that in the encrypted block.
Please send whatever you'd like, html/text/attachment/etc.

My email address is timprepsc...@gmail.com.  You can let me know
through the gmail if mooo does not go through (I'm using postfix
default settings)



Thank you to those who have already helped, and thank you all for your
time previously (with regard to the mime signing issues)

-tim

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/GPG does not work easily with web-mail.

2014-04-09 Thread a k'wala
You may want to look at these:
- http://www.mailvelope.com/
-
https://chrome.google.com/webstore/detail/mymail-crypt-for-gmail/jcaobjhdnlpmopmjhijplpjhlplfkhba/details
- https://www.penango.com/products
​​Some info about the above:
http://www.makeuseof.com/tag/encrypt-your-gmail-hotmail-and-other-webmail-heres-how/
​

​Also, this is a promising project: https://www.mailpile.is/​


--aslamK
http://gplus.to/akwala

PGP key http://is.gd/aslampgpmit (id: FECF84FB) fingerprint: 736C D83E
32DB A2FD 0208 9113 0FC8 BA7D FECF 84FB



On Wed, Apr 9, 2014 at 6:37 PM, One Jsim one.j...@gmail.com wrote:

 PGP/GPG does not work easily with web-mail.

 Most email, today, is read and write using the browser

 POP ou IMAP mail is a rarity

 That is the problem

 Some text/link in this problem?

 José Simões

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Laurent Jumet

Hello Robert !

Robert J. Hansen r...@sixdemonbag.org wrote:

 1) What are the consequences to the ordinary user?

 None.  The ordinary user is such an easy target that as bad as this
 attack is, I don't see it as making things any worse.

Does it make sense to disable SSL in my browser for a couple of weeks?
HTTPS is linked with TLS v1.2 128 bit ARC4 (2048 bit RSA/SHA) instead.

-- 
Laurent Jumet
  KeyID: 0xCFAF704C

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Doug Barton

On 4/9/2014 9:06 PM, Laurent Jumet wrote:

 Does it make sense to disable SSL in my browser for a couple of weeks?


No, but for my own curiosity what is your thought process that leads you 
to ask that question?


Doug


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Robert J. Hansen
On 4/10/2014 12:06 AM, Laurent Jumet wrote:
 Does it make sense to disable SSL in my browser for a couple of weeks?
 HTTPS is linked with TLS v1.2 128 bit ARC4 (2048 bit RSA/SHA) instead.

I am flattered that you think I am a mind reader, but I assure you, I am
not able to use the Heartbleed attack to pull important information out
of your frontal cortex -- like what operating system you're using, what
browser you're using, and so on and so on.

At any rate, these are questions for your browser vendor.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/GPG does not work easily with web-mail

2014-04-09 Thread Tim Prepscius
PGP actually does work well with web mail.

There are two libraries which do pgp encryption, there are 3 that I
know which do AES-SHA256-CBC-PKCS7.  There are at least two libraries
which do pkdf2 sha 256.

There is also one library which does AES-SHA256-GCM, but I'm not sure
if it does pkcs7 or not.  (or whether padding is incorporated into
GCM, need to research).

Looking up keys on a pgp key server is trivial, registering a key is
also trivial.

---

However there are some legitimate concerns.  The most important to my
mind are javascript injection attacks.

For instance, let's say the NSA takes over your web-mail server.  You
think, well my users' data is fine, because all of the encryption is
happening client side, I never see any of the keys, etc.

However the NSA could *force* you to place code inside your server
which tells the client to send the keys to you randomly.
This would be difficult (not impossible) to detect, and when executed
*once* would completely destroy the privacy of the target machine
forever.

Generally these days, (at least the conversations I've been reading),
people are talking about making plugins out of the client side code
and protecting them through the app store.  So, I download the app for
the client, I check it's signature.  It *NEVER* downloads code again.

I think there are some other solutions to this problem, which I could
babble about, but won't right here.



However, there are still attacks.  For instance, I'm the NSA, I've
spent the hours necessary reading through your code to know that if I
write you an email with SO-and-SO pattern, when you display that
e-mail my script will be run.  That script then would destroy the
privacy.  This is a very hard attack to guard against.

---

In my webmail I'm developing (I wrote one previously using GWT which
was too complicated, too difficult to maintain and enhance, this one
is much simpler).  My goals are three fold:

1. raise the cost of the NSA exponentially.  I want them to have to
spend considerable time for each target, instead of just hey Google,
give me these 20,000 peoples' email.

2. re-normalize the idea of privacy.  Google has pretty much destroyed
privacy.  And they are trying to destroy anonymity as well.  I believe
it is important to have by this year's end at least 10 services
running which re-normalize privacy in e-mail.  Each service hopefully
will castigate Google and call them for what they are.

3. give good security.  Nothing will protect you if you are
*actually* some terrorist or something, but it would be nice if we
weren't being big-brothered *all* of the time.

---

I encourage you to look at those others people referenced.  Also, if
you care to, take a look at mine as well.
https://github.com/timprepscius/mv

If you need any help setting up a server, let me know.  If you are
versed in sys-admin, it should take 5 minutes to get a VM running, or
use something like DigitalOcean.

The benefits of my server, (I think), is that you should be able to
change how it looks and feels without changing any of the fundamental
code.  Meaning you can change the html templates and css and what not,
and it will still function correctly.  It uses Backbone, so the
rendering is clearly separated from the code/models.



Anyhowz,

If you are looking for perfect security, web mail is not the way to go.
Hopefully a plugin will be able to provide near-ish the same security
that a standalone program with no javascript interpreter might.
But that doesn't mean that PGP WebMail won't be a billion-million
times better than gmail.  (can't wait to leave it! so close, soon
soon)

Good night,

-tim

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users