TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How to support PGP encryption in Gmail

113 pointsby conorppalmost 10 years ago

11 comments

kweksalmost 10 years ago
It&#x27;s worth mentioning Mailvelope ( <a href="https:&#x2F;&#x2F;www.mailvelope.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.mailvelope.com&#x2F;</a> )<p>- Free - Supported in FF &#x2F; Chrome - Supports Gmail, Yahoo, Outlook and GMX<p>I&#x27;ve been using it extensively for about 12 months now. It&#x27;s solid, unobtrustive, and just .. works.<p>Decryption of attachments would be nice, but it&#x27;s definitely not a deal breaker.
评论 #10124550 未加载
评论 #10121976 未加载
aratalmost 10 years ago
At the moment, end-to-end is NOT production ready, and will likely undergo further hardening in the coming months. Use at your own risk.
评论 #10121265 未加载
评论 #10121204 未加载
评论 #10121955 未加载
tristoralmost 10 years ago
What is so terrible for people about using an email client? I find using the Gmail web interface to be frustrating because they&#x27;ve removed the ability to pop out the compose view into it&#x27;s own window, so I can&#x27;t easily reference information in another browser tab while writing an email for instance. Meanwhile, Gmail has excellent IMAP support, which lets me use Thunderbird + Enigmail to get excellent PGP support.
评论 #10121503 未加载
评论 #10123950 未加载
评论 #10121567 未加载
评论 #10121705 未加载
评论 #10123100 未加载
评论 #10121504 未加载
评论 #10122162 未加载
edentalmost 10 years ago
At the moment, I use the Mailvelope extension.<p><a href="https:&#x2F;&#x2F;www.mailvelope.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.mailvelope.com&#x2F;</a><p>Excellent in Chrome - a bit slow in Firefox.
评论 #10121451 未加载
评论 #10121380 未加载
viraptoralmost 10 years ago
FAQ is a bit confusing. They say there&#x27;s only one keyring, but at <a href="https:&#x2F;&#x2F;github.com&#x2F;google&#x2F;end-to-end&#x2F;wiki&#x2F;Keyring" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;google&#x2F;end-to-end&#x2F;wiki&#x2F;Keyring</a> they admit it was not a great idea and that they&#x27;re splitting the responsibilities.<p>Based on the last planned implementation (External Key Manager (GnuPG bridge, other hardware, network oracle etc..)), I hope it will &quot;just work&quot; with hardware keys.
评论 #10121850 未加载
jaaronalmost 10 years ago
The fact that you lose your draft when the window loses focus kills it for me.
chromanoalmost 10 years ago
There&#x27;s no way I&#x27;d share my private key with whatever extensions there are. It just doesn&#x27;t feel right.
mtgxalmost 10 years ago
Good to see that E2E has been progressing, but I still wish we had a PFS alternative to PGP.<p>With today&#x27;s hacks and the total state of surveillance in which we are in, it&#x27;s a little crazy to expect people to use the same key 10+ years without it getting compromised. Even a year seems too much.
feldalmost 10 years ago
Wait, you have to install a JDK to use this chrome extension?
评论 #10123311 未加载
drdaemanalmost 10 years ago
Does it use inline PGP or PGP&#x2F;MIME?<p>(On an unrelated note, I wonder if there&#x27;s anything on mobile that supports PGP&#x2F;MIME. K-9 Mail only knows about inline.)
leni536almost 10 years ago
I tried to use gnupg but can&#x27;t wrap my head around the web of trust. My main concern of WoT: What my signature of an other guy&#x27;s public key actually means? My takeaway is that there is an implicit statement that you sign, but I don&#x27;t really know what it is. According to the gnupg privacy handbook[1] this statement is roughly &quot;I trust that this guy can properly sign other stuff&quot; which is kind of recursive, but I like it.<p>But when you validate if a message is really written buy a guy named John Doe then the trust path doesn&#x27;t actually verify this. The trust path verifies that this guy who claims to be John Doe is good at signing other guy&#x27;s keys. I don&#x27;t care about that at this point. Of course people don&#x27;t actually think of the statement written in the privacy handbook, they implicitly sign the statement &quot;I trust that this guy can properly trust other stuff <i>and</i> I know that this guy&#x27;s name is what he currently has as an ID.&quot;. There are several problems with this in practice:<p>- Now you are signing two statements with one signature and you can&#x27;t separate the two. Now using anonymous public keys becomes tricky as you lose one half of your statement.<p>- Signing the id happens at the wrong place. Malory can revoke her identity than push &quot;Barack Obama&quot; as her new id, now she can send messages in the name of the president. Of course in practice it&#x27;s hard, because you can&#x27;t delete revoked ids from key servers. But at this point you trust the key servers. I thought that key servers are not trusted part of PGP.<p>- gnupg guys advocate key signing parties: you gather at one place, bring your ID then sign each other&#x27;s keys. The problem with this that you only verify half of your statement (id). The other half is tricky to verify (Can this guy properly protect his priv key? Will this guy just randomly sign everything he sees?), I think it makes more sense to trust a friend who you already know well. Of course there are trust levels and I think you should only use marginal trust at these parties, however I don&#x27;t know what&#x27;s the practice.<p>- There are keys that are not tied to people, they are typically tied to software packages. Now what does it mean when someone signs such a key? Take putty as an example. Its master key is signed by several people. Each signature could mean that &quot;this is the putty project&#x27;s master key that is used to sign the binaries themselves&quot; which can be verified by the given guy knowing the developer and that he is trustworthy (at this point PGP is misused though, the guy should have signed the developer&#x27;s key instead and only the developer should sign the binary signing key, but it would make trust paths longer). It could also mean that &quot;I trust that PuTTY is a great software and doesn&#x27;t do anything nasty behind your back&quot; which requires an entirely different verification.<p>In the end the trust path a way too simplified projection of these statements and most likely you can&#x27;t actually verify the statement that you care about.<p>[1] <a href="https:&#x2F;&#x2F;www.gnupg.org&#x2F;gph&#x2F;en&#x2F;manual.html#AEN282" rel="nofollow">https:&#x2F;&#x2F;www.gnupg.org&#x2F;gph&#x2F;en&#x2F;manual.html#AEN282</a>
评论 #10121476 未加载
评论 #10121475 未加载
评论 #10121811 未加载