this post was submitted on 16 Nov 2023
189 points (93.5% liked)

Privacy

32159 readers
641 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Proton Mail, the leading privacy-focused email service, is making its first foray into blockchain technology with Key Transparency, which will allow users to verify email addresses. From a report: In an interview with Fortune, CEO and founder Andy Yen made clear that although the new feature uses blockchain, the key technology behind crypto, Key Transparency isn't "some sketchy cryptocurrency" linked to an "exit scam." A student of cryptography, Yen added that the new feature is "blockchain in a very pure form," and it allows the platform to solve the thorny issue of ensuring that every email address actually belongs to the person who's claiming it.

Proton Mail uses end-to-end encryption, a secure form of communication that ensures only the intended recipient can read the information. Senders encrypt an email using their intended recipient's public key -- a long string of letters and numbers -- which the recipient can then decrypt with their own private key. The issue, Yen said, is ensuring that the public key actually belongs to the intended recipient. "Maybe it's the NSA that has created a fake public key linked to you, and I'm somehow tricked into encrypting data with that public key," he told Fortune. In the security space, the tactic is known as a "man-in-the-middle attack," like a postal worker opening your bank statement to get your social security number and then resealing the envelope.

Blockchains are an immutable ledger, meaning any data initially entered onto them can't be altered. Yen realized that putting users' public keys on a blockchain would create a record ensuring those keys actually belonged to them -- and would be cross-referenced whenever other users send emails. "In order for the verification to be trusted, it needs to be public, and it needs to be unchanging," Yen said.

Curious if anyone here would use a feature like this? It sounds neat but I don't think I'm going to be needing a feature like this on a day-to-day basis, though I could see use cases for folks handling sensitive information.

you are viewing a single comment's thread
view the rest of the comments
[–] thesmokingman@programming.dev 4 points 1 year ago (2 children)

Did we read the same article? Emphasis mine.

Yen said Proton might move the feature to a public blockchain

I’m not interested until it’s public. Additionally, building out the chain then dropping it to rebuild a new public one is rewriting history, which violates the whole “immutable” part of “immutable ledger.”

[–] Nougat@kbin.social 6 points 1 year ago (1 children)

Context matters:

Proton rolled out the beta version of Key Transparency on their own private blockchain, meaning it's not run by a decentralized series of validators, as with Bitcoin or Ethereum. Yen said Proton might move the feature to a public blockchain after the current version serves as a proof of concept.

It's not rewriting history. We're talking about validation of public keys. The exact same information can be added to a public non-beta chain, to satisfy the concerns about security that would come from maintaining a previously private beta chain into production.

[–] thesmokingman@programming.dev 2 points 1 year ago (1 children)

… which gives a timing attack and the ability for bad actors to impersonate someone. I agree with you that, once public, this is a good idea. You cannot convince me that this is a good idea if done privately because there is no way to trust but verify, especially in the highly sensitive contexts they want trust in.

If it’s not public, I won’t trust it. You trust it blindly because it’s in beta. We’re not going to come to an agreement over these mutually exclusive positions.

[–] Nougat@kbin.social 7 points 1 year ago (1 children)

I don't "trust it blindly" because it's in beta - I understand that it's a work in progress because it's in beta. Jesus christ you people and your fucking tinfoil hats.

[–] thesmokingman@programming.dev 1 points 1 year ago (1 children)

Your only response to valid criticism about the lack of verification is pointing to the state of development as if that magically washes away all of the criticism. It doesn’t.

While I do have many tinfoil hats, basic fucking trust measures do not require me to pull them out. This is cryptography 101 shit not anything complicated.

[–] Nougat@kbin.social 3 points 1 year ago (1 children)

"Hey, I'm making a cake, I think you'll like to have a piece when it's done!"

NO WAY AM I EATING THAT RAW BATTER WITH UNCOOKED EGGS IN IT YOU'RE EVIL

This is why you're not one of the beta testers.

[–] thesmokingman@programming.dev 1 points 1 year ago (1 children)

You don’t understand basic trust relationships. I don’t really care about your opinion. I already called out that your blind trust in beta software conflicts with my security fundamentals so we’re at an impasse. Once you understand why validation is important or can show why a critical component of trust architecture is somehow not necessary, I’d be happy to be happy to reconsider your opinion.

[–] Nougat@kbin.social 0 points 1 year ago (1 children)

Keep living in your weird fantasy world where applications and solutions should pop into existence fully formed, feature-rich, and bug-free, with no development or testing whatsoever.

[–] thesmokingman@programming.dev 2 points 1 year ago (1 children)

Hey I’ve got a new scheme to validate the identity of someone for a very sensitive conversation. You wanna use it? Trust me, it’s secure.

I feel like you don’t understand the difference between a product roadmap and security fundamentals.

[–] Nougat@kbin.social 0 points 1 year ago (2 children)

I feel like you don't understand how blockchains work.

[–] thesmokingman@programming.dev 3 points 1 year ago

It doesn’t matter what the tech is, if you can’t audit it, you can’t trust it.

Also a single private blockchain owner is just a blackbox data store, not a blockchain. I’ve already explained how it’s vulnerable to very simple attacks, much less the complicated attacks that will be thrown at something like this.

[–] Pipoca@lemmy.world 1 points 1 year ago

How do private block chains protect against 51% attacks?

[–] toomanyjoints69@lemmygrad.ml 0 points 1 year ago (1 children)

There is obviously an invasion of shills.

Its. In. Beta.

[–] thesmokingman@programming.dev 1 points 1 year ago (1 children)

Untestable security claims for sensitive information are useless. I’m a huge fan of Proton and I’m excited to test this but only once the blockchain is public. Until then there is no way to verify the trust so there is no trust.

If you disagree, I might have something for you. I’ve got the strongest financial encryption known to man on top of the best transit system ever that makes it super easy to do stuff. It’s all based on blockchain, of course. Just give me your credit card info and bank details. It’s in beta so I won’t let you audit it, but unless you’re shilling you don’t have a problem with that.

[–] toomanyjoints69@lemmygrad.ml 0 points 1 year ago (1 children)

Its. In. Betaaaaaa

This is good for blockchain.

[–] thesmokingman@programming.dev 1 points 1 year ago (1 children)

Beta doesn’t negate security fundamentals ¯\_(ツ)_/¯

[–] toomanyjoints69@lemmygrad.ml 0 points 1 year ago (1 children)

Idk what part of Beta you dont understand.

[–] thesmokingman@programming.dev 1 points 1 year ago (1 children)

Yeah I guess I missed the part where security fundamentals weren’t supposed to be a part of a secure product. Do you mind explaining how a product centered on trust can be developed without trust? I think that would really help me understand why you think repeating the word “beta” allows a security-focused company to sidestep normal foundational components.

[–] toomanyjoints69@lemmygrad.ml 0 points 1 year ago (1 children)

When something is in Beta its not complete. That stuff can be added later!

[–] thesmokingman@programming.dev 1 points 1 year ago (1 children)

I think you’re missing “security fundamentals.”

[–] toomanyjoints69@lemmygrad.ml 0 points 1 year ago (1 children)

Security isnt needed when you are working fast and breaking things. How do you think man learned to fly?

[–] thesmokingman@programming.dev 1 points 1 year ago (1 children)

I don’t think we read the same article. We’re talking about a product those goal is secure verification of identity, correct? Something all about security?

[–] toomanyjoints69@lemmygrad.ml 1 points 1 year ago

I dont understand the problem you have with my reasoning. I think its air tight?