A place to cache linked articles (think custom and personal wayback machine)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

index.md 5.7KB

5 years ago
12345678910111213141516171819202122232425262728293031323334353637
  1. title: GPG And Me
  2. url: http://www.thoughtcrime.org/blog/gpg-and-me/
  3. hash_url: 505bc33094882e995c2b00ecd971b738
  4. <p>I receive a fair amount of email from strangers. My email address is public, which doesn’t seem to be a popular choice these days, but I’ve received enough inspiring correspondence over the years to leave it be.</p>
  5. <p>When I receive a <em>GPG encrypted</em> email from a stranger, though, I immediately get the feeling that I don’t want to read it. Sometimes I actually contemplate creating a filter for them so that they bypass my inbox entirely, but for now I sigh, unlock my key, start reading, and – with a faint glimmer of hope – am typically disappointed.</p>
  6. <p>I didn’t start out thinking this way. After all, my website even has my GPG key posted under my email address. It’s a feeling that has slowly crept up on me over the past decade, but I didn’t immediately understand where it came from. There’s no obvious unifying theme to the content of these emails, and they’re always written in earnest – not spam, or some form of harassment.</p>
  7. <p>Eventually I realized that when I receive a GPG encrypted email, it simply means that the email was written by <em>someone who would voluntarily use GPG</em>. I don’t mean someone who cares about privacy, because I think we all care about privacy. There just seems to be something particular about people who try GPG and conclude that it’s a realistic path to introducing private communication in their lives for casual correspondence with strangers.</p>
  8. <p>Increasingly, it’s a club that I don’t want to belong to anymore.</p>
  9. <h2 id="a_philosophical_dead_end">A philosophical dead end</h2>
  10. <p>In 1997, at the dawn of the internet’s potential, the working hypothesis for privacy enhancing technology was simple: we’d develop really flexible power tools for ourselves, and then teach everyone to be like us. Everyone sending messages to each other would just need to understand the basic principles of cryptography.</p>
  11. <p>GPG is the result of that origin story. Instead of developing opinionated software with a simple interface, GPG was written to be as powerful and flexible as possible. It’s up to the user whether the underlying cipher is SERPENT or IDEA or TwoFish. The GnuPG <a href="http://linux.die.net/man/1/gpg">man page</a> is over sixteen thousand words long; for comparison, the novel <em>Fahrenheit 451</em> is only 40k words.</p>
  12. <p>Worse, it turns out that nobody else found all this stuff to be fascinating. Even though GPG has been around for almost 20 years, <a href="http://pgp.cs.uu.nl/plot/">there are only ~50,000 keys in the “strong set,”</a> and less than <a href="https://sks-keyservers.net/status/key_development.php">4 million keys</a> have <em>ever</em> been published to the SKS keyserver pool <em>ever</em>. By today’s standards, that’s a shockingly small user base for a month of activity, much less 20 years.</p>
  13. <h2 id="a_technology_dead_end">A technology dead end</h2>
  14. <p>In addition to the design philosophy, the technology itself is also a product of that era. As Matthew Green has <a href="http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html">noted</a>, “poking through an OpenPGP implementation is like visiting a museum of 1990s crypto.” The protocol reflects layers of cruft built up over the 20 years that it took for cryptography (and software engineering) to really come of age, and the fundamental architecture of PGP also leaves no room for now critical concepts like <a href="https://whispersystems.org/blog/advanced-ratcheting/">forward secrecy</a>.</p>
  15. <p>All of this baggage has been distilled into a ballooning penumbra of OpenPGP specifications and notes so prolific that the entire picture is almost impossible to grasp. Even projects that are engaged in the process of writing a simplified experience on top of GPG suffer from this legacy: Mailpile had to write 1400 lines of <em>python</em> code <a href="https://www.mailpile.is/blog/2014-10-07_Some_Thoughts_on_GnuPG.html">just to interface with a native GnuPG installation</a> for basic operations, and it still isn’t rock solid.</p>
  16. <h2 id="what_we_have">What we have</h2>
  17. <p>Today, journalists use GPG to communicate with sources securely, activists use it to coordinate world wide, and software companies use it to help secure their infrastructure. Some really heroic people have put in an enormous amount of effort to get us here, at substantial personal cost, and with little support.</p>
  18. <p>Looking forward, however, I think of GPG as a glorious experiment that has run its course. The journalists who depend on it struggle with it and often mess up (“I send you the private key to communicate privately, right?”), the activists who use it do so relatively sparingly (“wait, this thing wants my finger print?”), and no other sane person is willing to use it by default. Even the projects that attempt to use it as a dependency struggle.</p>
  19. <p>These are deep structural problems. GPG isn’t the thing that’s going to take us to ubiquitous end to end encryption, and if it were, it’d be kind of a shame to finally get there with 1990’s cryptography. If there’s any good news, it’s that GPG’s <a href="http://pgp.cs.uu.nl/plot/">minimal install base</a> means we aren’t locked in to this madness, and can start fresh with a different design philosophy. When we do, let’s use GPG as a warning for our new experiments, and remember that “innovation is saying ‘no’ to 1000 things.”</p>
  20. <p>In the 1990s, I was excited about the future, and I dreamed of a world where <em>everyone</em> would install GPG. Now I’m still excited about the future, but I dream of a world where <em>I</em> can uninstall it.</p>