Bikeshedding while the world burns
rca
rca at disroot.org
Sat May 2 23:05:48 CEST 2026
I convinced some of my co-workers to use GPG, we have been using it to
secure some emails/Whatsapp messages, but your email got me thinking
about keyloggers. Are there some security recommendations to stay safe
from it?
Ricardo
On 4/28/26 00:37, Robert J. Hansen via Gnupg-users wrote:
> 1. INTRODUCTION
>
> Around 1997, Sun Microsystems hauled Microsoft in court over the Java
> virtual machine (JVM) Microsoft was shipping with new versions of
> Windows. Microsoft had entered an agreement with Sun to ship a JVM that
> fully complied with Sun's compatibility tests, but they failed to honor
> this promise. They insisted they were doing the right thing for their
> users, which may have well been true -- but "best for our users" was not
> the same as "best for Java users".
>
> I'm told that after Microsoft lost this lawsuit they decided to embrace
> C# and the Common Language Runtime as sort of a "Java that we control."
> Java and C# started off as very similar languages but drifted apart over
> time; likewise with their virtual machines.
>
> I am afraid GnuPG is soon going to be a retelling of this story.
>
> I downloaded GnuPG 1.0 the day it was released. I was at the time
> writing an RFC1991 ("ClassicPGP") implementation for a now-defunct
> telecom that had very strange ideas about why PGP 2.6 exposed them to
> legal liability, and I wanted to see how GnuPG implemented some packet
> parsing magic. At that time GnuPG's mission statement was crystal clear:
> to provide a libre command-line implementation of the RFC2440 standard.
>
> For a quarter-century GnuPG has been the gold standard of OpenPGP
> implementations and 100% libre software. This is an amazing achievement,
> and I think Werner deserves immense accolades for his persistence and
> determination in achieving this vision.
>
> But I think we're heading down the wrong road by turning away from the RFC.
>
> 2. THE COLD TRUTH
>
> You could replace RFC9580 with RFC1991 from thirty years ago and still
> be sufficient for many users.
>
> Seriously. Most users don't need 30-year security, they need 10-year
> security at the outside, for secrets that are relatively low value
> (under $1 million). RSA-1024 still looks solid for that time window. It
> might be possible to break an RSA-1024 key today, but not for a million
> dollars.
>
> A lot of users don't care very much about signatures, either. They care
> a lot about the confidentiality of their email: the authenticity takes a
> back seat. MD5 matters a lot less.
>
> RFC1991 used a single key for authentication and encryption. This meant
> trouble if a user was ever compelled by a court to reveal their
> decryption key. That was a major motivator of RFC2440, and yet it turns
> out compelled turnover of an asymmetric encryption key is incredibly
> rare: it happens so infrequently it might as well not happen.
>
> Over the last thirty years the IETF working group leading RFC design has
> invented an ever-more-impregnable bank vault door, even as the building
> that bank vault is installed in (operating systems and environments)
> have become ever shoddier.
>
> In my mind, the LibrePGP versus OpenPGP technical arguments are about as
> interesting to me as arguing whether a meter-thick tempered steel vault
> door that laughs in the face of explosives, diamond-tipped drill bits,
> and antitank rockets is secure enough, or whether we need to also have a
> Belgian malinois watching things.
>
> Please don't think, "oh, Rob doesn't understand the specifications,
> that's why he's saying these differences don't matter". I _do_
> understand the specifications. I don't influence the specs. I never said
> I didn't read them or have opinions on them.
>
> Here's the truth: I love Belgian malinois. After German shepherds
> they're my favorite breed. They're a little too energetic and high-
> strung for me to ever own one, but I adore them. I also don't care if my
> vault door is guarded by one.
>
> 3. THE REAL RISK
>
> The real risk today is endpoint compromise. It's cheap, it's easy, it's
> fun.
>
> Many years ago a divorce attorney came to me with a problem: his client
> was divorcing her husband. They lived in separate apartments since the
> divorce petition was filed. She had reason to believe he was lying about
> his assets but had no way to check on his bank accounts without his
> knowledge. Was there any way I could help?
>
> After confirming they lived in a marital joint property state (where,
> until the time a divorce is finalized, all property in the marriage is
> owned by both), I agreed to do the job. The woman wrote a letter
> authorizing me to enter her husband's apartment to look for financial
> records, and I filed this with my attorney.
>
> I showed up at his apartment after he left for work, picked the lock,
> walked into his office and started taking photographs so I could leave
> the place in the exact same state as when I left. I made a forensic
> image of his hard drive, connected a keylogger, and left. I returned the
> next day to pick up the keylogger.
>
> All of his online security measures -- only using HTTPS through a VPN,
> using Bitlocker, not using a password manager, etcetera -- vanished in
> about a day the moment a semi-skilled attacker decided to go after the
> endpoint. Even Bitlocker fails when the enemy has a forensic image of
> your hard drive and, thanks to a keylogger, your BitLocker password.
>
> Had he shared his apartment with a Belgian malinois, I would have been
> deterred. But neither a cryptographic vault door nor a cryptographic
> Belgian malinois proved any obstacle whatsoever.
>
> 4. MORE ON ENDPOINTS
>
> Physical endpoint compromise, like what I describe above, is the
> ultimate game over condition. Network endpoint compromise is almost as bad.
>
> The network landscape in 2026 is not what it was in 1996. There is no
> longer any meaningful concept of a secure network perimeter. In the
> cyberwarfare trade the Internet of Things is instead called the
> "Internet of Targets".
>
> Here in Washington D.C., it's widely believed the Chinese government,
> through a cyberwarfare program called SALT TYPHOON, has at-will access
> to any smartphone it wants in the metropolitan area. (This may be
> revenge of a kind: Edward Snowden revealed to them the NSA had at-will
> access to any text message in Hong Kong.)
>
> My apartment building has decided my front door should no longer have a
> physical key, but instead be locked and unlocked from my smartphone. My
> bank encourages me to do all my banking via an app. Local hotels do the
> same thing.
>
> The endpoints are already compromised, and we're ...
>
> ... arguing about whether we need a Belgian malinois _and_ a meter-thick
> tempered steel vault door?!
>
> 5. C# AND JAVA, REDUX
>
> When Microsoft was told the Java spec was what it was and wouldn't be
> changed to accommodate them and their users' needs, Microsoft made a
> wise call. They walked away and made a clean break. Over time C# has
> become its own thing and a vastly different ecosystem compared to Java.
>
> I would very much like GnuPG to decide either to:
>
> (a) implement RFC9580 in GnuPG, even if it's not enabled
> by default
> (b) make a clean break from RFC9580 and go on to solve a
> similar-but-different set of problems a similar-but-
> different way
>
> I don't care which is done but I really think we need to do one or the
> other.
>
> This community is suffering, *badly*, because people are arguing over
> the presence of a Belgian malinois. We should stop the bleeding, even if
> the tourniquet hurts.
>
> 6. AM I LEAVING THE COMMUNITY?
>
> Of course not. That would be silly. I love this community too much for
> that.
>
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> https://lists.gnupg.org/mailman/listinfo/gnupg-users
More information about the Gnupg-users
mailing list