@jsparknz @aral He gives zero support for his thesis. Of course the best case is absence of need for trust. Trust /is/ risk. There's nothing favorable about that. If you must trust, then lots of factors come into play and turn a straight-forward decision into a fuzzy one. It's better for your email payload to be PGP-encrypted so you don't need trust vs hoping the MitMs don't exploit.

@aral @jsparknz @resist1984 PGP isn’t a great example of good risk management. Email simply isn’t meant to send sensitive information and PGP is a cumbersome attempt at covering what is a design choice.

See latacora.micro.blog/2020/02/19… but if @dhh argument didn’t land, I doubt this will touch you.

Ultimately, technology cannot and will not solve social problems.

@hypolite @jsparknz @aral I fully reject the "this wasn't meant for that" line of reasoning. Magnetrons were meant for radar not microwave ovens, but one day someone realised magnatrons can be used to cook food. We don't reject a usa case because it doesn't match original intent.

@aral @jsparknz @hypolite When you realize the separation of duties, that email is a means to get data from A to B & crypto serves to mitigate disclosure, then of course email /can/ be used to move a payload without disclosure. It doesn't matter that email predates PGP. PGP over email is cumbersome for many novices with some implementations, but there are exceptions, but this is red herring territory.

@hypolite @jsparknz @aral came close enough to solving the social problem. A novice can open a HM acct as easily as a Yahoo acct. An external expert user can do all the key management on hushtools.com. And for me that worked. I was able to get accountants & lawyers to use crypto effectively. Novice-to-novice => HM-to-HM. BTW, the latacora.micro.blog link is dead for me.

@resist1984 @hypolite @aral @jsparknz Yes but then you are at their mercy, you don't know they aren't funneling all your data straight to the great NSA data warehouse in Utah.
Follow

@nanook @jsparknz @aral @hypolite Mass surveillance would require to push malicious to everyone, which would work right up until just one user decides to audit the js code one time. I'd say that's unlikely. Targeting is a risk, so HM is not useful if your threat model includes targeted surveillance.

Sign in to participate in the conversation
Mastodon 🔐 privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!