ProtonBlog(new window)

Edited May 25th, 2018 to remove the GPGTools recommendation due to the fact that Apple still has not patched certain Apple Mail vulnerabilities.

We are the developers of Enigmail(new window), Mailvelope(new window), Proton Mail, and the inventor of PGP(new window). Together, we have built a lot of the software that powers email encryption today. Last week, a group of security researchers released a paper(new window) that was then promoted by the Electronic Frontier Foundation(new window) (EFF) and received significant media coverage. The EFF and many news outlets proclaimed there are “serious vulnerabilities in PGP” and recommended that users disable PGP email encryption.

These statements are highly misleading and potentially dangerous. PGP is not broken. The vulnerabilities identified by eFail are not flaws with the OpenPGP protocol itself but rather flaws in certain implementations of PGP, including in Apple Mail and Mozilla Thunderbird. Many other commonly used software based upon PGP are not affected by the eFail vulnerability in any way, as the researchers themselves point out in their paper.

As an open standard, anybody can implement PGP, and it comes as no surprise that some implementations have security weaknesses.

However, this does not mean PGP itself is broken.

Our recommendation to PGP users

In light of the eFail vulnerability, we recommend that PGP users:

  • Use PGP implementations that are not impacted by eFail, or update their PGP software to the latest version.
  • Ensure that everyone you communicate with is also using unaffected implementations or has updated their PGP software. Be sure to get a verified confirmation from your contacts before sending sensitive information to them.

Among the commonly used software based on PGP, GnuPG, Mailvelope, and Proton Mail were never susceptible to eFail. Enigmail and GPGtools were vulnerable, and we recommend the following mitigations:

  • If you use Enigmail, upgrade to version 2.0.5, use only simple HTML or plain text viewing modes in Thunderbird, and update to the latest version of Thunderbird
  • If you use GPGTools with Apple Mail, switch to Enigmail and Thunderbird, or one of the other unimpacted implementations like Proton Mail or Mailvelope.

Why our recommendation is better than EFF’s recommendation

EFF recommended that users disable PGP plugins or stop using PGP altogether. This is akin to saying, “Some locks can be broken; therefore we must remove all doors.” This is particularly dangerous because it can put at risk individuals who rely on PGP encryption for security.

Both our recommendations and EFF’s recommendations require user action on the part of the sender and recipient of messages, but our recommendation provides better security. If you receive PGP email, following our recommendation protects you from eFail, while still allowing you to easily decrypt PGP messages. If you send PGP email, you need to inform your contacts to take appropriate action. If you give them EFFs recommendation, you may not be able to exchange encrypted messages with them. If you follow our recommendation, you can continue to use email encryption safely. It is that simple.

Using a secure PGP implementation will always be a better solution than not using encryption at all for email communication.

Concluding thoughts

Given that the OpenPGP protocol is still fundamentally secure, the recommendation publicized in the eFail announcements just does not make sense, especially considering that the vulnerabilities are so easy to mitigate.

Email is the world’s most widespread form of communication, and is an irreplaceable tool for many forms of communication. It is essential to improve the security of email, and PGP encryption plays a crucial role in this. As PGP developers, we are committed to keeping PGP users safe.

Signed,

Andy Yen, Founder, Proton(new window)
Phil Zimmermann(new window), Creator, PGP
Patrick Brunschwig, Founder, Enigmail(new window)
Thomas Oberndörfer, Founder, Mailvelope(new window)

You can also find additional technical statements from GnuPG(new window) and Proton Mail(new window).

Protect your privacy with Proton
Create a free account

Related articles

chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv
Social engineering is a common hacking tactic involving psychological manipulation used in cybersecurity attacks to access or steal confidential information. They then use this information to commit fraud, gain unauthorized access to systems, or, in
is whatsapp safe for sending private photos
WhatsApp is the world’s leading messaging app, trusted by billions of people around the globe to send and receive messages. However, is WhatsApp safe for sending private photos? Or are there better ways to share photos online privately? Let’s find ou
passwordless future
With the advent of passkeys, plenty of people are predicting the end of passwords. Is the future passwordless, though? Or is there room for both types of authentication to exist side-by-side?  At Proton, we are optimistic about passkeys and have int
At Proton, we have always been highly disciplined, focusing on how to best sustain our mission over time. This job is incredibly difficult. Everything we create always takes longer and is more complex than it would be if we did it without focusing on