• asudox
    link
    English
    34 months ago

    Exactly. There’s no justification for them storing the private key online for “convenience”. And key generation happens in the browser with JS. Which means it is possible to send backdoored JS to easily copy the private key.

    • @[email protected]
      link
      fedilink
      English
      34 months ago

      There is a reason: simplicity. Either you do all the key management yourself, which in practice means 98% of the people won’t do it at all, or you implement a solution like they did and increase the risk of a small % (see my other comment) but you cover every customer.

      • asudox
        link
        English
        1
        edit-2
        4 months ago

        That simplicity introduces security and privacy issues.

        • @[email protected]
          link
          fedilink
          English
          44 months ago

          Introduces some risks in terms of security. Privacy concerns are extremely minimal, because in any case you don’t control the setup of your other interlocutor(s).

          Considering that the realistic alternative is not using anything at all and the fact that you have both options with Proton, it’s a win-win scenario.

          • asudox
            link
            English
            1
            edit-2
            4 months ago

            One of the biggest risks is when someone knows your password. Your PGP encrypted emails that you want noone to see will be available to the attacker. Whereas if no such thing happened, the attacker wouldn’t be able to decrypt the PGP encrypted emails even if the attacker gained access to your account. Manually encrypting your stuff is better than having some random on the internet do it for you. It’s really just a tradeoff. Convenience or security? It’s not even hard to manually encrypt emails.

            • @[email protected]
              link
              fedilink
              English
              5
              edit-2
              4 months ago

              One of the biggest risks is when someone knows your password.

              Just a curiosity. How do you think every password for every online service works? The service “has” your password. It is hashed, but if this doesn’t matter (similarly for encryption) to you, then you should be panicking about basically everything.

              In the case of Proton an attacker has basically these options:

              • Option 1: Attack you, try to compromise your device. If this is the case, your local keys are going to be taken, one way or another, even if you have them locally and encrypted. The only way you might save yourself in this scenario is if you store them on an hardware device (like a yubikey).
              • Option 2: Attack proton. Once the infrastructure is compromised, the JS code that does the crypto operation needs to be backdoored, you need to use the service while the JS is compromised, and the attacker will obtain the keys and the messages.
              • Option 3: Compromise the sender/recipient for the emails (this is in cleartext in any case).

              In the case of a manual solution:

              • Option 1 is identical.
              • Option 2: Attack the software you use (let’s say, mutt). Once you gain access to the repository, push a backdoored update and wait for you to install the new version. Incidentally, compromising this tool also allows the attacker to compromise your whole machine (unlike what happens with JS code, which runs at least in the browser sandbox).
              • Option 3 is identical.

              So the tradeoff is really that:

              • With Proton an update is going to be pushed quicker and without your explicit interaction, but
              • compromising Proton is going to be much, much harder than compromising the laptop/repository for the handful of maintainers that generally have the keys to push updates for the software you are most likely going to use. We are talking company with security department + SOC vs maintainers with whatever security practice and no funding.

              It’s not even hard to manually encrypt emails.

              Yeah, and this is why 99.9% of the people have never and will never touch GPG with a 10-foot pole. The tradeoff is a complete no-brainer for the vast majority of people, because the reality is that for most, either someone else does the key discovery, management, signing, encryption, decryption, or nobody does. We can sit here and pretend that it’s easy, but it’s not. Managing keys is hard, it is painful, especially on multiple devices, etc…

              EDIT:

              The entire threat model for proton is also documented BTW: https://proton.me/blog/protonmail-threat-model

              • asudox
                link
                English
                -1
                edit-2
                4 months ago

                Encrypted or not, the fact that someone else has it stored somewhere in their computers is dangerous. The fact that it can be accessed online is dangerous. The only recommended way to store private keys are offline and encrypted. Why are you so ignorant of this fact, I wonder? I think you trust Proton a bit too much.

                • @[email protected]
                  link
                  fedilink
                  English
                  44 months ago

                  Encrypted or not, the fact that someone else has it stored somewhere in their computers is dangerous.

                  Of course. You are simply over-representing this risk, though. Besides, regular people realistically don’t need to worry about Proton being backdoored, because their device is 10-100x more likely to be breached instead. Security is not a binary, it’s a shade. Performing a software update is also “dangerous”. Do you check every time you update the software its code, to verify no malicious backdoor is there? No, exactly, you trust the maintainers and the package infrastructure.

                  The only recommended way to store private keys are offline and encrypted.

                  So you don’t store them on your device(s) (encrypted)? I store my GPG keys that I use to sign software on my yubikeys. That said, email is something I check from my phone and multiple computers (as most people). Do you really use a hardware key to do on-the-fly decryption, every time someone sends you a message, from each device?

                  As a security engineer, I also generally discourage such absolute “recommendations”. My threat model is different from a regular Joe threat model, and both are different from Snowden’s. There is no such thing as “only recommended way”, because this is not a religion, it’s a risk decision. Most people use Gmail, where the content of their email is literally available server side. Those same people can gain privacy and security using GPG via Proton, and in their threat model “provider gets compromised and software backdoored” is completely irrelevant. Is it relevant in your threat model? Good, then yes, you should only store keys offline and encrypted. Actually, you shouldn’t use email at all, and you should use dedicated tools and protocols that are meant for security, where metadata is not transmitted in clear text, for example. You should also have virtually no session duration and perform a full login with 2FA every time, you should probably access the software that you use to communicate only from a secure machine dedicated for the purpose etc…

                  I think you trust Proton a bit too much.

                  I simply have clear in my mind what my threat model is and what risks are acceptable. I perfectly fit in the “Anyone with privacy concerns” category in the threat model they built. What about you?

                  • asudox
                    link
                    English
                    14 months ago

                    Indeed. Email is not ideal for such things but it exists and is needed because everyone refuses to make a switch. If XMPP were to replace emails, that would’ve been great.

                    Anyway, I still don’t trust Proton. Have a great day.

    • @[email protected]
      link
      fedilink
      English
      24 months ago

      endof

      Especially with the fact that: 1) deminificafion of the javascript code is not simple 2) you cannot “freeze” the code version you use. Still your computer does allow it ( minus the windows which follows the Microsoft thinking way, kidding about windows updates )