Hi all,

So, Thunderbird will finally implement OpenPGP. Great! \o/

Unfortunately, Mozilla as usual have their own way... /o\

TB will store PGP-Keys without encryption - unless you use a master
password. Which... must be entered on every start anyway.

One password for everything might seem comfortable, but doesn't that
mean our keys will be kept in memory without any protection? Sounds like
a terrible idea to keep sensitive information like this in a complex and
most probably still buggy application like TB.

Enigmail asks for pasphrases on demand and comes with a timeout option.
Keys are protected by gpg, which also handles decryption, so it would
never spit out any key data unless there's a bug in the pgp binary. With
enigmail and gpg a memory leak in TB would not compromise your keys. Am
I right? (Or is gpg executed in TB's address space?)

Looks like a certain loss of security to me.

Also, in the future we have to maintain two separate key storages,
because TB has to have it's Extrawurst*.

The web of trust is basically dead - but keysigning by all means is not.
TB will replace enigmail before WoT functionality has been implemented.
If ever.

ATM, this is the scariest change to deal with in the FOSS world.
Please tell me I got it all wrong.

d.



(* Funny German word for special treatment.)

_______________________________________________
enigmail-users mailing list
enigmail-users@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net

Reply via email to