German ct magazine postulates death of pgp encryption

Christoph Anton Mitterer calestyo at
Sat Feb 28 19:07:59 CET 2015

On Sat, 2015-02-28 at 18:45 +0100, Johan Wevers wrote: 
> OK, not cryptographically. They could always try to bribe/threat/torture
> someone to cooperate. But that model fails if you want to perform
> unnoticed mass surveillance.

Admittedly, when it comes to "unnoticed mass surveillance" anonymous
cryptography (like TextSecure does for most users, since they aren't
pushed to validate - and even if, one cannot mark who was validated and
who not)... *might* help somewhat against unnoticed mass surveillance,
that is when something like DH is used.

But this assumption is largely based on two things:
- That's resource-wise too costly for them to MitM everyone
  => and given what we've learned from Snowden (and what "paranoid"
     people already assumed/knew before)... I really doubt that this
     would be any bigger problem for them.
     Apparently they sit at all the bigger internet exchanges,
     transatlantic cables, etc. and all the big US players (FB, Google,
     and Tier-1 content providers are anyway forced to cooperate with
- That people actually eventually check their keys, so that they'd find
  out whether their anonymous DH was attacked by some MitM.
  This might be done by some "more advanced" people who even know about
  what a fingerprint is, and when their client actually exports it to
  them (which may not be the case when you do something like whotsapp™
  or any other system used by the masses, which just promises you to be

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5313 bytes
Desc: not available
URL: </pipermail/attachments/20150228/6274b050/attachment.bin>

More information about the Gnupg-users mailing list