ProtonBlog(new window)

Edited May 25th, 2018 to remove the GPGTools recommendation due to the fact that Apple still has not patched certain Apple Mail vulnerabilities.

We are the developers of Enigmail(new window), Mailvelope(new window), Proton Mail, and the inventor of PGP(new window). Together, we have built a lot of the software that powers email encryption today. Last week, a group of security researchers released a paper(new window) that was then promoted by the Electronic Frontier Foundation(new window) (EFF) and received significant media coverage. The EFF and many news outlets proclaimed there are “serious vulnerabilities in PGP” and recommended that users disable PGP email encryption.

These statements are highly misleading and potentially dangerous. PGP is not broken. The vulnerabilities identified by eFail are not flaws with the OpenPGP protocol itself but rather flaws in certain implementations of PGP, including in Apple Mail and Mozilla Thunderbird. Many other commonly used software based upon PGP are not affected by the eFail vulnerability in any way, as the researchers themselves point out in their paper.

As an open standard, anybody can implement PGP, and it comes as no surprise that some implementations have security weaknesses.

However, this does not mean PGP itself is broken.

Our recommendation to PGP users

In light of the eFail vulnerability, we recommend that PGP users:

  • Use PGP implementations that are not impacted by eFail, or update their PGP software to the latest version.
  • Ensure that everyone you communicate with is also using unaffected implementations or has updated their PGP software. Be sure to get a verified confirmation from your contacts before sending sensitive information to them.

Among the commonly used software based on PGP, GnuPG, Mailvelope, and Proton Mail were never susceptible to eFail. Enigmail and GPGtools were vulnerable, and we recommend the following mitigations:

  • If you use Enigmail, upgrade to version 2.0.5, use only simple HTML or plain text viewing modes in Thunderbird, and update to the latest version of Thunderbird
  • If you use GPGTools with Apple Mail, switch to Enigmail and Thunderbird, or one of the other unimpacted implementations like Proton Mail or Mailvelope.

Why our recommendation is better than EFF’s recommendation

EFF recommended that users disable PGP plugins or stop using PGP altogether. This is akin to saying, “Some locks can be broken; therefore we must remove all doors.” This is particularly dangerous because it can put at risk individuals who rely on PGP encryption for security.

Both our recommendations and EFF’s recommendations require user action on the part of the sender and recipient of messages, but our recommendation provides better security. If you receive PGP email, following our recommendation protects you from eFail, while still allowing you to easily decrypt PGP messages. If you send PGP email, you need to inform your contacts to take appropriate action. If you give them EFFs recommendation, you may not be able to exchange encrypted messages with them. If you follow our recommendation, you can continue to use email encryption safely. It is that simple.

Using a secure PGP implementation will always be a better solution than not using encryption at all for email communication.

Concluding thoughts

Given that the OpenPGP protocol is still fundamentally secure, the recommendation publicized in the eFail announcements just does not make sense, especially considering that the vulnerabilities are so easy to mitigate.

Email is the world’s most widespread form of communication, and is an irreplaceable tool for many forms of communication. It is essential to improve the security of email, and PGP encryption plays a crucial role in this. As PGP developers, we are committed to keeping PGP users safe.

Signed,

Andy Yen, Founder, Proton(new window)
Phil Zimmermann(new window), Creator, PGP
Patrick Brunschwig, Founder, Enigmail(new window)
Thomas Oberndörfer, Founder, Mailvelope(new window)

You can also find additional technical statements from GnuPG(new window) and Proton Mail(new window).

Protégez votre vie privée avec Proton
Créer un compte gratuit

Articles similaires

Une communication sécurisée et fluide est la base de toute entreprise. Alors que de plus en plus d’organisations sécurisent leurs données avec Proton, nous avons considérablement élargi notre écosystème avec de nouveaux produits et services, de notre
what is a brute force attack
En matière de cybersécurité, un terme qui revient souvent est l’attaque par force brute. Une attaque par force brute est toute attaque qui ne repose pas sur la finesse, mais utilise plutôt la puissance de calcul brute pour craquer la sécurité ou même
en
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
En réponse au nombre croissant de fuites de données, Proton Mail propose une fonctionnalité aux abonnés payants appelée surveillance du dark web. Notre système vérifie si vos identifiants ou autres données ont été divulgués sur des marchés illégaux e
Votre adresse e-mail est votre identité en ligne et vous la partagez chaque fois que vous créez un nouveau compte pour un service en ligne. Cette solution est pratique, mais elle expose votre identité au cas où des pirates parviendraient à accéder au
proton pass f-droid
Notre mission chez Proton est de contribuer à l’avènement d’un internet qui protège votre vie privée par défaut, sécurise vos données et vous donne la liberté de choix. Aujourd’hui, nous franchissons une nouvelle étape dans cette direction avec le l