GnuPG meets the standard of care set by Signal (Re: Betamax v. VHS, and the future of PQ-PGP)
Robert J. Hansen
rjh at sixdemonbag.org
Fri Jan 3 23:13:50 CET 2025
>> Breaking RSA-4096 via Shor's algorithm is straight out of science
>> fiction.
>
> No, *this* is science fiction:
I stand by my statement. RSA-4096 via Shor's requires science fiction
level technology advances.
> Signal is acting ethically and responsibly: They have had hybrid-PQC
> fully deployed to all Signal users for more than a year! You literally
> believe a non-fact-based argument. Please live up to your stated hope:
There are several responses here:
1. I wasn't aware Signal was transitioning to PQC: thank you for that.
2. Do me the courtesy of taking my argument seriously, please, as I am
with you.
A serious response would have been, "Signal is actually transitioning to
PQC, so that's a nonissue. But do I believe SSL.com is acting
unethically and irresponsibly by selling S/MIME encryption and signing
certificates that aren't PQC? Yes. I believe the same about NaCl and
Sodium, since they're not yet deploying PQC. I believe the same about
projects that rely on NaCl or Sodium to provide cryptographic
primitives. It's a long list. I believe they're acting unethically and
irresponsibly."
Building the strongest possible version of someone else's argument and
engaging with that -- as I am attempting to do with you -- is called
"steelmanning", and is seen as a courtesy among serious people.
> The foregoing timeline comparison MUST NOT be taken as a criticism of GnuPG.
On the one hand, thank you for being clear you're not criticizing GnuPG.
On the other, my experience on this list has shown me people interested
in criticizing GnuPG will not be dissuaded by such imperatives.
> The same above-linked Signal blog post has a well-balanced view of if or
> when quantum computers will break ECC/RSA; I agree with this quote:
I don't doubt your sincerity. I do doubt your understanding. See next
response.
>> to be around the 5 to 10 year time horizon. We are not in a position
>> to judge which timeline is most likely, but we do see a real and
>> growing risk which means we need to take steps today to address the
>> future possibility of a large enough quantum computer being created.
Signal is only saying their risk model requires them to take steps to
address a future possibility.
GnuPG *has no risk model*. GnuPG provides a toolbox by which to
implement the LibrePGP and RFC4880 standards. Which of those tools are
ultimately utilized depends on each user's particular threat model.
GnuPG imposes a truly minimalist set of policies (like not supporting
RSA past 4kbit). Beyond that, GnuPG is utterly silent on how users
should employ the provided tools. The defaults are sane: that's all the
policy we promise.
Sort of like NaCl and Sodium, come to think of it.
> It should be the minimum standard of care. At this late date, as we
> enter 2025, all else is crypto-negligence. Thus, I thank you for
> invoking an appeal to authority with Signal as your argument—
That wasn't an appeal to authority. It was pointing out the logical
consequence of your argument: there exist a *vast number* of
communications security projects that are improving the lives of
millions worldwide, and for you to write them all off as unethical just
because they're not using CRYSTALS-Kyber is childish.
Steelman the argument. Engage the strongest version of what someone says.
Or don't. Up to you.
> Please do not misdirect. My message clearly pertained only to
> encryption.
That was not how I read it. If you're now clarifying that you only mean
asymmetric encryption and/or key negotiation, I'm happy to stipulate I
misread. Accusing me of misdirection is just rude.
Please note I've accused you of nothing except holding foolish positions.
> We all know the difference between encryption and digital
> signatures.
Really? What is it?
I'm not kidding. Every asymmetric encryption algorithm I'm aware of is
convertible to a digital signature algorithm. Encrypt using an RSA
public key and you encrypt; encrypt with a private key and you sign.
Look at discrete logs one way and you get Elgamal encryption and/or
Diffie-Hellman; look at them another and you get Elgamal signatures; add
arbitrary constraints and you get the Digital Signature Algorithm. Shake
a bag of CRYSTALS and out falls Kyber; keep shaking and out falls Dilithium.
You appear to be saying the obverse and reverse of a coin are
fundamentally different things. I'm saying the coin has two faces.
If you can show an asymmetric algorithm that's not convertible, I'd love
to hear about it. No kidding, no sarcasm.
>> This could only be true if everyone holds to a threat model in which
>> their data being collected by the MDR and potentially decrypted by a
>> First World nation-state actor is a risk that needs mitigation. Most
>> of us do not.
>
> The entire concept of dragnet mass-surveillance is that this is
> *everyone’s* threat model.
Bullshit it is.
A couple of years ago I was at the Internet Freedom Festival in
Valencia, Spain. I was in the break room when this massive bear of a
Middle Eastern guy came up and asked in broken English if I was Rob from
Enigmail. I said I was.
This guy wrapped me in a hug that almost broke my ribs, lifted me off
the ground, and thanked me for saving his life. I'm a large guy and this
bear of a man was heaving me around like a sack of flour.
He was a Syrian dissident and journalist who had used Enigmail to
communicate securely with local Syrian sources and Western media
contacts. al-Assad's regime threw him in jail. They worked him over but
he didn't identify his contacts or decrypt his messages for the secret
police, and a couple of weeks later international pressure led to his
release. He left Syria for safety in Turkey. He bought me a beer and
thanked me for my work with GnuPG and Enigmail, because we kept his
contacts alive.
(Me, I think this guys who spent *two weeks being tortured in a Syrian
prison* is the real hero. But he was being very fulsome in sharing the
credit.)
My friend Ali Gharavi is a human rights volunteer who specializes in
training people in how to communicate securely in hostile regimes. While
visiting Turkey on an Amnesty International-funded trip to meet and
train people from repressive Middle Eastern regimes, Tayyip Erdogan
ordered him arrested on trumped-up charges. Ali was terrified his arrest
would directly lead to compromised comms and Erdogan trading the names
of dissidents for political favors from their home countries. That
didn't come to pass, and after months of detention Ali got to go home.
( https://hivos.org/istanbul-10-released-hivos-very-relieved/ -- Ali is
third from the left in the photo at the top. I do not know a kinder,
more thoughtful gentleman.)
These are two people I know, whom I've shared meals with, whom I've had
tea with, for whom some enormous classified data repo in Utah was an
extremely remote concern compared to their friends falling into the
hands of an autocrat. Are you really telling me that they're wrong to
say "nah, you know, RSA-3072 is fine for our purposes, but for God's
sake, Rob, you have got to do *something* about Enigmail's usability in
Farsi and Pashto"?
Don't get me wrong. I'm entirely in favor of PQC and preparing for a
transition. But you are revealing yourself to be a deeply unserious
person, fond of making sweeping pronouncements without understanding of
nuance.
So far you have asserted:
1. Everyone needs to migrate to Kyber *now*. (No, we don't.)
2. There is a format war brewing between PGP specs. (There is not.)
3. It is imperative GnuPG win this format war. (Vacuously true by false
premise.)
4. It is universally unethical to deploy encryption solutions or
services that don't employ PQC, even if those solutions are vast
improvements over plaintext. (No, it is not.)
5. Massive data repositories and dragnet surveillance by First World
nation-states is part of everyone's threat model. (It is not.)
After five claims, some of which were truly ludicrous, I'm done taking
you seriously.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 236 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20250103/d049df52/attachment.sig>
More information about the Gnupg-users
mailing list