I'm not a fan of openpgp.js for a lot of reasons.
http://tonyarcieri.com/whats-wrong-with-webcrypto explains why in a much
better way than I ever could.

- alasdair
On Jul 8, 2014 3:47 PM, "Griffin Boyce" <grif...@cryptolab.net> wrote:

> OpenPGP.js doesn't require the user to have GPG installed on their system.
>
> Ideally, in this case, the pubkey would be already packaged within the
> extension, with only signed updates being able to overwrite it. However, I
> think to some extent this still relies on a user making an effort to verify
> the key's validity via its web of trust.
>
> best,
> Griffin
>
> On July 8, 2014 6:19:07 PM EDT, sajol...@pimienta.org wrote:
>>
>> Giorgio Maone wrote:
>>
>>>  Hi everybody.
>>>
>>>  The blueprint should be enough for me to start hacking a prototype 
>>> together.
>>>
>>>  If nobody has suggestions, I'd propose to call the extension with the
>>>  catchy (!) name of "Tails Catcher".
>>>
>>>  I'd just add that a future version might embed tails developer's key and
>>>  perform OpenPGP authentication itself.
>>>
>>
>> I didn't put that idea on the blueprint so far, for the following reasons:
>>
>>   - OpenPGP for verifying our ISO image is only stronger than SHA256 if
>> the WoT is used to build strong trust in the signing key. Otherwise, you
>> might as well get an HTTPS MitM while receiving the key, as much as
>> while receiving the hash.
>>   - Our past experience with Firegpg [1] taught us that doing GPG inside
>> of a browser is usually a
>> bad idea. The same might not apply to an ISO
>> verification but I would check this very carefully before going this way.
>>   - I don't know how portable it would be to do such GPG operations from
>> inside the browser. Would the user need to have GPG installed on their
>> Windows or Mac OS X? Would we ship a GPG ourselves? All those options
>> sounds scary to me :)
>>
>> Those are the reasons why I'm not convinced by that idea. We might also
>> want to further discuss the role of the OpenPGP verification in the
>> broad installation process with UX people. But anyway, that discussion
>> shouldn't block in any way the first implementation...
>>
>> [1]:
>> https://tails.boum.org/doc/encryption_and_privacy/FireGPG_susceptible_to_devastating_attacks/index.en.html
>>
>>
> --
> Sent from my tracking device. Please excuse brevity and cat photos.
>
> _______________________________________________
> Tails-dev mailing list
> Tails-dev@boum.org
> https://mailman.boum.org/listinfo/tails-dev
> To unsubscribe from this list, send an empty email to
> tails-dev-unsubscr...@boum.org.
>
_______________________________________________
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Reply via email to