eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

242
active users

NB Most such certificates are rooted in a key pair generated by a “certificate authority”, not the user themself. This already critically compromises the user’s ability to prevent man-in-the-middle attacks by anyone who can compel that to issue fake certificates in their name. docs.cosmian.com/key_managemen

docs.cosmian.comS/MIME Email encryption - Cosmian Technical DocumentationS/MIME is a standard for public key encryption and signing of MIME data. It is used to secure email messages and is supported by most email clients and servers.

I have never understood why the ability for users to generate their own key pairs, then upload the public key to the for certification, was removed from all browsers I’m aware of 😱 NB2 This is not an issue for organisational users where their own organisation is their CA, since the organisation has many other (simpler) surveillance mechanisms if it chooses…

Finally: this is a huge improvement over unencrypted e-mail flying around, subject to mass surveillance anywhere it travels. But a weakness of relying on the security of an online service (rather than software running on your own PC/smartphone) is that it can be changed in subtle, targeted ways at any time by the provider, which is very difficult for you to detect.

Obviously, (under order from the US government) could serve compromised “updates” at any time to individual users.

It would be technically possible to enable users to compare a “fingerprint” (hash) of security-critical plugins they are running, such as the one supporting Gmail’s capability. If I can see I’m getting a different plugin for my OS/CPU to 99% of other users on the same platform, that’s a big warning sign. But I haven’t seen such software widely deployed (yet) 🧐

This would be analogous to the “reproducible builds” used to protect software against such targeted attacks. Although I don’t know widely deployed these are yet, either ☹️

Ian Brown 👨🏻‍💻

Here is Google’s announcement, with a lot of additional detail: workspace.google.com/blog/iden

NB this functionality is good from a security perspective, but its competitive implications will need to be thought through carefully: “the option to require all external recipients (even if they are Gmail users) to use the restricted version of .”

Google Workspace BlogGmail: Bringing easy end-to-end encryption to all businesses | Google Workspace BlogAnnouncing plans to bring easy to use end-to-end encryption in Gmail to all our business customers

@1br0wn If Gmail rolled this out to their general end users, it would be a legally sufficient reason to reconsider the CPS designation 🤔

@gateklons And you could imagine some governments might even start using it as a secure, general communications mechanism with their citizens…