Profile picture
Matthew Green @matthew_d_green
, 12 tweets, 3 min read Read on Twitter
I think there are two distinct problems here. And they are getting munged together and misunderstood b/c Twitter.

1. For a vast number of users who want secure *messaging*, PGP+e-mail is the wrong (and perhaps a dangerous) choice.
2. For the small subset of expert users who have some other application and/or are using it for some extremely careful messaging application, it is still bad crypto that should be replaced with something better.
For the first set of users and for users who don’t know explicitly that they’re in set (2), my strong recommendation is: use a secure messaging platform.

Are these perfect? No. But neither will the PGP+SMTP hybrid these users cook up. In fact it will be *much much* worse.
(Like worse to the degree that I think it’s *strongly* unethical to send vulnerable non-expert users into the PGP ecosystem. I really get steamed about that.)
Regarding the expert users and special applications of set (2): I think that the problem with PGP is that it’s *bad crypto*. And bad tooling.

Its probably true you’re an expert you can use bad tooling safely. But I have a counterproposal: let’s make better tools.
The great advantage of focusing case (2) is that we have a relatively tiny slice of users. And they’re already using PGP in specific ways that largely negate both the flaws of PGP *and* many of the advantages of using a standardized, legacy protocol like OpenPGP.
These users generally don’t need a protocol to be backwards compatible with clients written in 1997. They don’t need CAST5 support and complex extensible file formats. They need modern, secure crypto and some simplified key management.
For these users we should be promoting replacement tools, one use-case at a time. Need to encrypt large files on a server? Use a solid tool with that use case in mind, and not GnuPG. Need to email a small set of people? Ditto. Need signing? Ditto.
Some of these tools are either relatively unknown or don’t exist yet. This is a huge TODO item for the talents of the crypto engineering community. Which are considerable, and largely *not* going into OpenPGP/GnuPG which has entered a bad legacy mode.
But those talents aren’t going to be coordinated and applied as long as people are dogmatically claiming that OpenPGP/GnuPG are “good enough”, or worse, claiming that anybody who says differently is “attacking” PGP or putting lives at risk.
So from my perspective, step one is identifying that we have a problem. Then step two is fixing that problem. And people are doing that: saltpack.org etc.
Anyway. That’s what I think. Maybe I’ll just cite this thread instead of repeatedly making the same points.

@threadreaderapp please unroll
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Matthew Green
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!