Re: gpg in a cybercafé

2015-03-06 Thread Heinz Diehl
On 05.03.2015, Robert Deroy wrote: 

> How could i do for use gpg on a usb key, because i have no computer, i only 
> go in cybercafé.

Don't do it, it's not safe.

In case you're allowed to boot from an external medium, this still won't be
secure. Because you have no control over the hardware built into the computer,
a keylogger could read your input (read: passphrase), and somebody else with
remote access could copy your secret key.

After all, it boils down to what your thread model is, and how much unsecurity
you can live with. If your data is crucial: don't do it.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg in a cybercafé

2015-03-06 Thread Werner Koch
On Fri,  6 Mar 2015 09:12, htd...@fritha.org said:

> In case you're allowed to boot from an external medium, this still won't be
> secure. Because you have no control over the hardware built into the computer,

Does not even need to be hardware: A (remotely) modified firmware might
first boot you into a virtual machine and only then boot the OS from
disk or USB.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Trezor - Could this be the model for a PGP crypto device?

2015-03-06 Thread Felix E. Klee
Yesterday in Las Palmas de Gran Canaria, I attended a [talk][1] by Marek
Palatinus, one of the relatively early Bitcoin miners and cofounder of
[SatoshiLabs][2]. He gave an introduction to his path into Bitcoin, and
things that went wrong, and then he presented the [Trezor][3] crypto
device.

The Trezor has a little display and two buttons. It generates and stores
your private key which is used for identifying your address in the
Bitcoin network. The Bitcoins that you own are associated with your
address. Connected via USB to a computer, the Trezor signs Bitcoin
transactions.

Marek later explained to me that the Bitcoin crypto standard is
different from those used with PGP.

After the talk, I hammered him with questions:

  * What if I lose the device or if it breaks? For backup, the device
presents a list of 24 English words, that the user should write down
and keep on paper in a safe place. Using this list, the private key
can be recreated.

  * What if Eve wants to access the device without my authorization?
There is a PIN.

  * How is the key generated? With an RNG on the device, using entropy
gathered from the connected computer.

  * There’s no PIN pad on the device; Couldn’t malware sniff the PIN?
The device has a little screen that displays a matrix of nine
numbers. On the computer’s screen appears the same matrix without
numbers, and one clicks on these with the mouse.

  * Do I have to enter the PIN for every transaction? Only once, then
the device remains activated.

  * Once the device is activated, couldn’t malware do arbitrary
transactions? For every transaction there is information displayed
on the device’s display, and it has to be confirmed with the press
of a button on the device.

  * Can I trust the firmware? [Source code][4] is available. Users can
check the code, compile it, and flash their own version.

  * What if Eve modifies the firmware in a malignant way and flashs it
to the device? Flashing unsigned firmware causes the private key to
be erased by the bootloader.

  * Can I trust the bootloader? Source code is available as well.

Of course there could still be backdoors. However, at the moment I
cannot see what can be done better, other than building your own
hardware, ideally down to chip manufacturing level.

[1]: http://www.meetup.com/lpa-tech/events/220413356/
[2]: http://satoshilabs.com/
[3]: http://satoshilabs.com/trezor/
[4]: https://github.com/trezor/

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Trezor - Could this be the model for a PGP crypto device?

2015-03-06 Thread Antoine Michard
Hi Felix,

I've got one of this device ! Work like a charm !
Love the idea that everything was encrypt inside of the device, nothing on
the computer.
Try to restore my wallet, again no problem !!!

I will love to see one of this device for PGP.
I'm thinking to use a smartcard inside Gemalto K50 but on a computer
without GPG is useless...
Same thing about NitroKeys

Last thing: For Trezor, you have to install a bridge compatible on Windows,
MacOSX and Linux.
Of course, source code is available: https://github.com/trezor/trezord

2015-03-06 13:50 GMT+01:00 Felix E. Klee :

> Yesterday in Las Palmas de Gran Canaria, I attended a [talk][1] by Marek
> Palatinus, one of the relatively early Bitcoin miners and cofounder of
> [SatoshiLabs][2]. He gave an introduction to his path into Bitcoin, and
> things that went wrong, and then he presented the [Trezor][3] crypto
> device.
>
> The Trezor has a little display and two buttons. It generates and stores
> your private key which is used for identifying your address in the
> Bitcoin network. The Bitcoins that you own are associated with your
> address. Connected via USB to a computer, the Trezor signs Bitcoin
> transactions.
>
> Marek later explained to me that the Bitcoin crypto standard is
> different from those used with PGP.
>
> After the talk, I hammered him with questions:
>
>   * What if I lose the device or if it breaks? For backup, the device
> presents a list of 24 English words, that the user should write down
> and keep on paper in a safe place. Using this list, the private key
> can be recreated.
>
>   * What if Eve wants to access the device without my authorization?
> There is a PIN.
>
>   * How is the key generated? With an RNG on the device, using entropy
> gathered from the connected computer.
>
>   * There’s no PIN pad on the device; Couldn’t malware sniff the PIN?
> The device has a little screen that displays a matrix of nine
> numbers. On the computer’s screen appears the same matrix without
> numbers, and one clicks on these with the mouse.
>
>   * Do I have to enter the PIN for every transaction? Only once, then
> the device remains activated.
>
>   * Once the device is activated, couldn’t malware do arbitrary
> transactions? For every transaction there is information displayed
> on the device’s display, and it has to be confirmed with the press
> of a button on the device.
>
>   * Can I trust the firmware? [Source code][4] is available. Users can
> check the code, compile it, and flash their own version.
>
>   * What if Eve modifies the firmware in a malignant way and flashs it
> to the device? Flashing unsigned firmware causes the private key to
> be erased by the bootloader.
>
>   * Can I trust the bootloader? Source code is available as well.
>
> Of course there could still be backdoors. However, at the moment I
> cannot see what can be done better, other than building your own
> hardware, ideally down to chip manufacturing level.
>
> [1]: http://www.meetup.com/lpa-tech/events/220413356/
> [2]: http://satoshilabs.com/
> [3]: http://satoshilabs.com/trezor/
> [4]: https://github.com/trezor/
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>



-- 
Antoine Michard
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: where can one find an official gnupg project statement on the state of sub project?

2015-03-06 Thread Robert J. Hansen
> Wow  at last someone has said it.  What a good idea !! For gnupg
> 2.1.2 as well ...

I think this is a bad idea.

Third-party software repositories are beyond the capabilities of many
users, particularly casual ones.  Their distro came with certain
repositories pre-configured.  So for us to say, "oh, and by the way, you
need to add this new third-party distro, and then do these steps to
replace your old distro-provided package with a new one," runs smack in
the face of

> At present, the [consensus] of many threads is that encryption in
> general is just too difficult for the average email user to use
> willingly and successfully.  The 'average email user' just has his
> burden increased exponentially if he has to build everything from
> source as well in order to follow the progress of the 'industry'.

We're not going to make things better by demanding casual users develop
even more skills.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Trezor - Could this be the model for a PGP crypto device?

2015-03-06 Thread NIIBE Yutaka
On 03/06/2015 09:50 PM, Felix E. Klee wrote:
> Marek later explained to me that the Bitcoin crypto standard is
> different from those used with PGP.

Do you mean the curve of secp256k1?

GnuPG modern 2.1.x with development version of libgcrypt support
secp256k1.

Development version of Gnuk also supports secp256k1.

It was introduced to GnuPG and Gnuk, so that we can sign the
transactions of Bitcoin with GnuPG (and using Gnuk Token, if you
have).  That was the intention.

I also asked Kristian for SKS server.  And the support was added.

I considered some enhancement to existing Bitcion client (such as
Electrum), so that it can ask signing to GnuPG.

However, nothing more happened beyond these lower level implementation
enhancement.

Perhaps, there wouldn't be enough demand (other than my own hack
value).

I had to stop my development for Bitcoin, because of infamous
"BITTOKOIN" fraud in Japan.  After all, their customers had no idea
about controlling their own private keys and their computation by
themselves, it could never be the potential market of Gnuk Token (or
GnuPG).

... and I think that there is some interoperability issue(s) for
handling of secp256k1 key in GnuPG implementation which doesn't
support the specific curve (or ECC at all) and/or some? keyservers.

I got report that my key on keyservers are huge, and it seems because
of the subkey of secp256k1.  I haven't examined the detail of this
issue yet, and I don't know the cause of this trouble.

So, I never recommend to join the experiment of secp256k1, now.


If some people still want this direction, a person can check my subkey
of secp256k1 (available in keyservers) with GnuPG modern and
development version of libgcrypt.  Then, he can see my Bitcoin address
by a tool I posted last year (gpgkey2bc) [0].  And if he really wish
to do so, he can send some Bitcoin to that address.

When the amount of Bitcoin into the specific address will be much, it
will be perhaps enough pressure to move my development to this area,
back again.


Well, I don't believe the device with good UI, in general.  UI is (or
can be) most complex component in a system.  If there is a better UI,
it means (for me, at least) that the system is more complex to make
audit more difficult.  And, in general, the hardware (MCU) requirement
from good UI is rather bigger than the one from ECC itself.  If a
system will have a much power, power will corrupt.  We could learn
from the architecture of phone (with better UI).


[0] gpgkey2bc: Generating address of Bitcoin from public key:
https://lists.gnupg.org/pipermail/gnupg-devel/2014-January/028147.html
-- 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Anything that just works easily for folks?... without knowing this stuff.

2015-03-06 Thread Don Saklad
Anything that just works easily for folks?... without knowing this stuff.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


A beautiful banker woman talks about the failed war on drugs in Latin America

2015-03-06 Thread Mr. Clif


She is on some global council to change drug policy:

http://www.ted.com/talks/ilona_szabo_de_carvalho_4_lessons_i_learned_from_taking_a_stand_against_drugs_and_gun_violence#t-380552

Clif

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users