TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

End-to-end encrypted email is bad for you

3 点作者 kookiburra5 个月前

1 comment

LinuxBender5 个月前
This article is talking about what I call pseudo E2EE, not real E2EE.<p>- Pseudo E2EE is where an email or chat vendor is encrypting the contents using the keys they generated on behalf of their client of which they can control via <i>targeted ephemeral</i> updates. Most centralized platforms doing E2EE for email or chat is really just pseudo E2EE. It&#x27;s probably useful for protecting against some junkie that stole your laptop or phone. Pseudo E2EE can be target-bypassed with a warrant by making subtle changes to the client via targeted ephemeral updates.<p>- Real E2EE is when the email client controlled by the sender and receiver manage key exchanges out of band and encrypt the email themselves, meaning POP&#x2F;IMAP still work as expected, the server can not see the clear-text version of the body and the client can choose whether to store encrypted or unencrypted. All they get is the meta-data and if that is an issue, do not use email. To hide meta-data use anonymous SFTP on either your home router or a disposable VM instead and encrypt all the contents and zero out the contents and after delivery. Use a ram disk if the contents are small enough and reboot after delivery.<p>Thunderbird makes doing real E2EE just a few clicks. It&#x27;s happy-clicky. One can exchange their public keys with friends and associates however they wish. Making local backups of the Thunderbird data folder is trivial and it can be stored offsite wherever the client wishes. Real E2EE can not be bypassed without abducting one of the recipients and putting them under duress <i>warrant and arrest plus threat of imprisonment, torture, etc...</i> There are a myriad of ways to further mitigate these attack vectors.
评论 #42640231 未加载