Wikileaks Sidesteps Publishing Public PGP Key 96
An anonymous reader writes "Repeated requests toward the Wikileaks staff regarding their use of PGP have gone unanswered. The current public PGP key posted has been expired since November 2nd, 2007. A response on their PGP talk page notes that the 'SSL based mail submission system' will be the secure online method of document submission. At the current time, there is no method to safely encrypt any postal communications with Wikileaks or verify that any given communication actually originated from a Wikileaks staff member."
Doubtless there are some complicating factors here -- but what is the best way to keep a confidentiality-centric site like Wikileaks trustworthy?
Whoo boy (Score:4, Interesting)
Gut reaction to that statement makes me feel a bit queasy.
Re:Whoo boy (Score:5, Insightful)
I think what they mean by "provides proof of intention to conceal" is that they don't want people leaking something and then saying "aha! You just told everyone something that I meant to be kept private, I'm going to sue! Why would I have encrypted it if I had meant you to release it?"
And that person would have a point. It's hard to think how someone could post something to WikiLeaks, so that it can be publicly posted, but desire that their information be transmitted encrypted. The assumption should always be anything you send to WikiLeaks is public, and allowing encrypted submissions may make this unclear.
If they need to submit the information anonymously they should do it anonymously, PGP can't help with that.
Re:Whoo boy (Score:5, Insightful)
"Proof of intention to conceal" would refer to the fact that when the next scandal at ACME is published, and only one of their faithful employees ever used PGP as evidenced by their router logs, that would constitute enough proof to sue, even without being able to read the actual contents of the mail.
So what the nice folks at wikileaks are saying is that you might as well ditch PGP and use web-based SSL forms so you can just claim you were paying your annual Playboy magazine subscription, or whatever. Or you could send all your mail with PGP and try to convince everybody else to do so as well.
So yes, PGP isn't going to do you much good, but not for the reasons you stated.
Another option (Score:2, Insightful)
Anyone dumb enough to ... (Score:2)
Furthermore, anyone using SSL to send data to Wikileaks from work is equally stupid. The logs you speak of can just as easily identify who connected to Wikileaks over a secure connection and thus are just as easily identified as the PGP encrypted fool who does so.
Besides, they don't seem to get much pgp tagged submissions, according to them. Or perhaps it's all someone pretending to be them, and the r
Re: (Score:1)
Furthermore, anyone using SSL to send data to Wikileaks from work is equally stupid. The logs you speak of can just as easily identify who connected to Wikileaks over a secure connection and thus are just as easily identified as the PGP encrypted fool who does so.
Ha! That's the beauty of it!
You see, in phase #2 of their plan for global domination, wikileaks is planning to offer annual Playboy subscriptions at 50% rate, at which point their SSL servers are going to be taking hits like there's no tomorrow ;-)
Re: (Score:2)
But it's complete BS... You can use PGP to *sign* documents. Encrypting is optional. You can do both. In some implementations you can actually do neither... odd.
Signing a document does not conceal anything.
Re: (Score:2)
Re: (Score:2)
why should that be an issue?
This is all about the web of trust and authenticating data. Why does it matter that the sender keeps their private key private?
Pretty sure their SSL setup will have a private key too. I suspect they'll have to conceal that too...
Re: (Score:2)
Re: (Score:2)
why should that be an issue?
This is all about the web of trust and authenticating data. Why does it matter that the sender keeps their private key private?
because, like you say, its about trust and authentication. The only way that is possible is to sign with a private key and keep it private. If you sign with a private key and then distribute the private key, then anyone can sign the document as that person and you no longer have a signature that is meaningful.
Re: (Score:3, Insightful)
That's silly, you don't have to distribute the private key, that's the whole point.
Take the wikileak's SSL key. How do you know that's their private key and it's not a MiM attack? You know that because verisign (or someone) signed the public key. They did that with a private key -- and wikileak doesn't have it!! Oh nos!!!
There's always a private key you don't have. That's the whole point of asymetric cryptography. PGP is no different.
So this argument is all very silly.
Re: (Score:2)
Re: (Score:2)
You can use a private key to create a signature that was verifiable created with that private key using the public key that's paired with it. If that public key was signed by other private keys and those are signed by other private keys, then using that web of trust you can confirm the sender is who they claim to be.
That is the other purpose of asymmetric crypto. You can use it to encrypt an
Re:Whoo boy (Score:4, Insightful)
I read it as "the Chinese or other totalitarian governments might punish you solely for using PGP".
Re: (Score:2)
Re:What happened on November 2nd, 2007? (Score:5, Informative)
Expiry can also be useful in the event that a private key is lost. Revocation of a public key requires access to the private keys.
Comment removed (Score:5, Insightful)
Re: (Score:1, Informative)
PGP was and still is just a hack.
Re: (Score:2)
Re: (Score:3, Insightful)
I know there are extensions to firefox to get s/mime support, PGP and a few other (proprietary) methods of encrypting emails, but you don't always have ontrol over the browser you're using.
I'd love to use encryption on my email, but if I can't read it, there's no point.
Re:I wish the world would use GPG more (Score:4, Insightful)
Re: (Score:3, Interesting)
Re:I wish the world would use GPG more (Score:4, Insightful)
Re: (Score:3, Insightful)
Also, what has changed is that nowadays the reason I want more privacy is because of the government and not because of regular people/crooks. And there are various ways in which the government could still read my files even when I use encryption, both by checki
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Also, I mixed OpenPGP with HTTP and created Enigform (firefox extension) and mod_openpgp (apache module, formerly known as mod_auth_openpgp).
There you go, more things to use pgp with.
Re: (Score:2)
Also, what has changed is that nowadays the reason I want more privacy is because of the government and not because of regular people/crooks. And there are various ways in which the government could still read my files even when I use encryption, both by checking my screen and what I type.
That's the same as saying, "Why lock my door? The lock can be picked anyway."
And some would say it's the same as, "Why try to hide any secrets? They've probably figured out how to read my mind anyway."
Re:maybe if gmail supported it.... (Score:4, Informative)
Re: (Score:2)
But if you want: open the mail, go offline, then decrypt the email, read it, close it, clear your cookies, then go back online.
the point of encrypted emails was never to protect you from your email reader, it was to protect it from between sender & receiver
gmail won't support it. (Score:5, Insightful)
I can't envisage an encrypted mail service that has an externalized revenue source, so the only way to fund it is by the customer paying. Which then begs the question, who do you trust enough to pay them to keep your secrets safe? In my case, I no secrets worth keeping, but if I did, I wouldn't trust anyone else to keep them for me.
Open-source, peer-reviewed encryption, under my own control, is the only technique I would trust to keep digital secrets transmitted across a wire.
The best kept secrets are of course the ones you keep solely in your own head.
Re: (Score:2)
This has absolutely nothing to do with targeted ads and everything to do with the encryption itself. Webmail -can't work- with encryption since you'd have to give your private key to the webmail. That would completely invalidate the encryption automatically.
No, this isn't a capitalist conspiracy. It's just logic at work.
Re: (Score:2)
http://www.google.com/a/help/intl/en/security/message.html#utm_campaign=en&utm_source=en-ha-na-us-content&utm_medium=ha [google.com]
searchability without resorting to completely plaintext [slashdot.org], though admittedly that doesn't have the privacy properties a whistleblower needs.
Wonder why Wikileaks doesn't get a Hushmail acount.
>Open-source, peer-reviewed encryption, under my own control, is the only technique I would trust to keep digital secrets transmitted across a wire.
Your reasoning is soun
Re: (Score:2)
Re: (Score:2)
This is a firefox plugin that adds pgp support to firefox, and integrates fully with gmail.
Adds encrypt decrypt and sign buttons down by the send and save buttons.
Re: (Score:2)
Not really.
Webmail systems have to decrypt everything server-side before they can display it. All mail readers need to be able to decrypt messages before displaying them-- here, the mail reader is Google's server, not your browser. This should be obvious with even the most basic un
Re: (Score:1)
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
I've used gpg for Icedove and I considered it for Iceweasel but I'll be damned if I will 'register' with mozilla.org, now required, just to download it. When did they start that crap?
Re: (Score:2)
Of course it has; it's a solution looking for a problem. Sorry to say, but most of us don't have anything to hide, and that does mean that there's not much point hiding it.
What's happened is that we have, in general, grown up a bit and realised that encrypting everything is not "
There isn't (Score:4, Insightful)
Unfortunately, there isn't - information is only as trustworthy as the source.
Re: (Score:1)
I believe the saying goes, "Trust no one but yourself."
The issue is more than encrypting and signing (Score:5, Insightful)
Wikileaks appears to want to provide a way for submitters to deny they even submitted anything to Wikileaks. Sending an e-mail to wikileaks with the contents encrypted is a clear indication that you're sending something to them. By the time the leaks are made public all they want to do is find the person, searching for something that sent pgp encrypted mail, even without being able to decrypt the actual contents, is going to be good enough for them.
An ssl page, especially if wikileaks sets up some sort of drop system with other domains so you aren't obviously submitting to wikileaks, is much harder to track because people use ssl pages all over the internet all the time. If PGP were used more frequently then they could probably use that with a drop system as well, but it's just too rarely used.
Re:The issue is more than encrypting and signing (Score:4, Insightful)
Why would you submit something to Wikileaks from your organization's network or through your organization's mail servers? I would think that act alone would scream, "Fire me," at the top of its figurative lungs to your soon to be ex-employers.
Re: (Score:2)
Re:The issue is more than encrypting and signing (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
The real problem is that it sounds as if they intend to trust SSL, which is a mistake. I know (and apply URL filtering policy on) any SSL connections made at my job site. If I wanted to, I could MITM the SSL as well, but I don't have a policy to back me up no
I beg to differ (Score:2)
When push comes to shove, "the individual persons" are both the weakest and most important of a security plan. Plans based on having "no bad actors" inside the security ring is important and everyday useful.
One of the major reasons to restrict the a
Re: (Score:2)
DNS logs, e-mail logs, etc.... then back track the trail looking for a server that keeps copies of e-mail as it passes through (how many ISP's now require you use their SMTP server instead being able to send your own e-mail straight to another server?) or starts keeping copies of your mail w
Re: (Score:2)
An ssl page, especially if wikileaks sets up some sort of drop system with other domains so you aren't obviously submitting to wikileaks, is much harder to track because people use ssl pages all over the internet all the time.
The problem with SSL, as implemented in browsers, is that there is a crapload of root certification authorities that are blindly trusted by default. On my Firefox browser for example I can see:
- AOL
OK, I might trust them for something like an online forum login page, but not for online banking.
- TurkTrust
Seems to be a Turkish quasi-government entity related to international trade. Since I'm not trading with any Turkish entities right now, this one went bye bye from the list.
- GoDaddy: Holy Fucking Shite
Re: (Score:2)
Through video (Score:1)
I suppose he could also sign it while he talks.
Re: (Score:3, Informative)
If you mean the public key, that proves nothing, if you mean the private key, anyone who uses it in the future can attribute documents to you. I know 3am PBS isn't popular, but I still wouldn't broadcast it.
Reading between the lines (Score:2, Interesting)
Re: (Score:1, Funny)
Tinfoil hats.
Re: (Score:1, Insightful)
Re:Reading between the lines (Score:4, Interesting)
And why should wikileaks care about that? The domain is registered to an address in Kenya, and the web server appears to be in Sweden.
Re: (Score:2)
I don't understand one thing (Score:1)
there isn't (Score:2, Insightful)
There isn't. By verifying that anyone is anyone the cover is blown. Regardless the best use of it is still to post anonymously and link as many people as humanly possible. Then even if your cover is blown, the message still gets out. If you're a whistleblower, this is something you should have accepted long before you blew the whistle
Tomorrow's headlines: (Score:2, Funny)
- Wikileaks Director Recommends Ivory Soap
- Wikileaks to Sponsor Next Super Bowl
- Wikileaks leaks Wikileaks' Wikileaks leaks
- Wikileaks wikileaks wikileaks, Wikileaks wikileaks
Secure proof of sending, reading (Score:1)
I'm in a situation where I need to *prove* that someone has opened/read an email. I know there are paid "registered email" services, but they seem a bit overkill to me. And return receipts are jokes, since they aren't widely supported.
Is there *any* service out there that can post a letter to a person, send them the link (presumably) information (via email) to read that note, and log when they
Re:Secure proof of sending, reading (Score:4, Insightful)
The short answer is "don't try to make SMTP do something that it wasn't designed to do".
The long answer - send people unique links to a web server that you control.
Re: (Score:2)
Re: (Score:2)
Anonymous Remailers (Score:2)
ssl is secure- but should distr. w/rss bittorrent (Score:1)
what i don't think is sufficient is how the info is distributed. the thing can be shut down / censored too easily. to make the information distribution resiluant, it needs to be decentralized. that's why i think the website should provide an rss feed that can serve new leaks as torrents. torrent clients equiped with rss scanners can automatic