TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Address Verification and Full PGP Support

174 pointsby johnnycarcinalmost 7 years ago

7 comments

ddevaultalmost 7 years ago
I spoke on Mastodon recently about Protonmail - it&#x27;s a scam and I cannot recommend it to anyone. They own your email, they don&#x27;t support open protocols including SMTP and IMAP and the only way to export your emails is through a proprietary end-user application. They excuse this nonsense by saying that it&#x27;s necessary for encryption, which is blatantly false. Their security is also based on trusting ProtonMail, since they could easily siphon off plaintext at the SMTP level or secretly modify their JavaScript to exfiltrate your private keys from the web browser. Genuinely secure systems do not require you to trust their operators.<p>&gt;PGP, because it is built on top of email, is therefore also a federated encryption system. Unlike other encrypted communications systems, such as Signal or Telegram, PGP doesn’t belong to anybody, there is no single central server, and you aren’t forced to use one service over another. We believe encrypted communications should be open and not a walled garden. ProtonMail is now interoperable with practically ANY other past, present, or future email system that supports the OpenPGP standard, and our implementation of this standard is also itself open source.<p>This is rich. Why don&#x27;t you start with the far more fundamental and important standards of SMTP and IMAP, Protonmail? Why don&#x27;t you open source your desktop &amp; mobile applications or your bridge? What a joke.
评论 #17611623 未加载
评论 #17611312 未加载
评论 #17611220 未加载
评论 #17611336 未加载
评论 #17611061 未加载
评论 #17614926 未加载
评论 #17612003 未加载
评论 #17611005 未加载
评论 #17611004 未加载
评论 #17611384 未加载
评论 #17616860 未加载
mirimiralmost 7 years ago
This is very good news!<p>It&#x27;s also great to have <a href="https:&#x2F;&#x2F;protonirockerxow.onion&#x2F;" rel="nofollow">https:&#x2F;&#x2F;protonirockerxow.onion&#x2F;</a> :)<p>But I have a suggestion. If I hit <a href="https:&#x2F;&#x2F;protonmail.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;protonmail.com&#x2F;</a> via Tor, there&#x27;s no warning to use the .onion address. Except for an &quot;Onion Site&quot; link at the bottom. And after I recently created a free account via Tor at <a href="https:&#x2F;&#x2F;protonmail.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;protonmail.com&#x2F;</a>, I got that either SMS verification or a credit&#x2F;debit card number was required for activation. Gak!<p>But using <a href="https:&#x2F;&#x2F;protonirockerxow.onion&#x2F;" rel="nofollow">https:&#x2F;&#x2F;protonirockerxow.onion&#x2F;</a>, there&#x27;s no authentication requirement for activation. So perhaps there could be an alert when connecting to <a href="https:&#x2F;&#x2F;protonmail.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;protonmail.com&#x2F;</a> via Tor. As I recall, Bitmixer or Helix Light used to do that. Or maybe just put the .onion address near the top of the front page.
评论 #17612365 未加载
Boulthalmost 7 years ago
It&#x27;s nice to see their own keyserver.<p>I wonder though if it wouldn&#x27;t be more practical to support the Web Key Directory protocol [0]. WKD is both more secure than HKP (as it&#x27;s always over HTTPS and authenticates user&#x27;s domain), it&#x27;s enabled by default in a growing number of email clients (Enigmail, GPG for Outlook, KMail) and providers (kernel.org [1], posteo.de), it&#x27;s used by GPG when locating a key and the setup is incredibly easy (just put binary key in one location).<p>(to check it out try `gpg --locate-key torvalds@kernel.org` in modern GnuPG)<p>From my perspective it looks like a perfect match for ProtonMail for both use cases: exposing @protonmail.ch users&#x27; keys and fetching keys of contacts on other servers.<p>[0]: <a href="https:&#x2F;&#x2F;wiki.gnupg.org&#x2F;WKD" rel="nofollow">https:&#x2F;&#x2F;wiki.gnupg.org&#x2F;WKD</a><p>[1]: <a href="https:&#x2F;&#x2F;www.kernel.org&#x2F;category&#x2F;signatures.html" rel="nofollow">https:&#x2F;&#x2F;www.kernel.org&#x2F;category&#x2F;signatures.html</a>
评论 #17611737 未加载
Sephralmost 7 years ago
Yet they still don&#x27;t support read receipt privacy when you enable loading images by default for unencrypted email.<p>Webmail providers can implement read receipt privacy by requesting images from every email automatically on-delivery instead of on-read. Doing this for non-existent mailboxes also prevents mailbox enumeration.
评论 #17610759 未加载
评论 #17610798 未加载
评论 #17611361 未加载
marcrosoftalmost 7 years ago
Maybe the title should read &quot;Email address verification and full PGP support&quot;.<p>This should not be confused with real physical address verification.
mikedilgeralmost 7 years ago
For the other perspective, fastmail has a good write-up on why they don&#x27;t offer PGP: <a href="https:&#x2F;&#x2F;fastmail.blog&#x2F;2016&#x2F;12&#x2F;10&#x2F;why-we-dont-offer-pgp&#x2F;" rel="nofollow">https:&#x2F;&#x2F;fastmail.blog&#x2F;2016&#x2F;12&#x2F;10&#x2F;why-we-dont-offer-pgp&#x2F;</a>
kradlealmost 7 years ago
relevant: <a href="https:&#x2F;&#x2F;blog.cryptographyengineering.com&#x2F;2018&#x2F;05&#x2F;17&#x2F;was-the-efail-disclosure-horribly-screwed-up&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.cryptographyengineering.com&#x2F;2018&#x2F;05&#x2F;17&#x2F;was-the-...</a>
评论 #17610768 未加载