ProtonBlog(new window)

Edited May 25th, 2018 to remove the GPGTools recommendation due to the fact that Apple still has not patched certain Apple Mail vulnerabilities.

We are the developers of Enigmail(new window), Mailvelope(new window), Proton Mail, and the inventor of PGP(new window). Together, we have built a lot of the software that powers email encryption today. Last week, a group of security researchers released a paper(new window) that was then promoted by the Electronic Frontier Foundation(new window) (EFF) and received significant media coverage. The EFF and many news outlets proclaimed there are “serious vulnerabilities in PGP” and recommended that users disable PGP email encryption.

These statements are highly misleading and potentially dangerous. PGP is not broken. The vulnerabilities identified by eFail are not flaws with the OpenPGP protocol itself but rather flaws in certain implementations of PGP, including in Apple Mail and Mozilla Thunderbird. Many other commonly used software based upon PGP are not affected by the eFail vulnerability in any way, as the researchers themselves point out in their paper.

As an open standard, anybody can implement PGP, and it comes as no surprise that some implementations have security weaknesses.

However, this does not mean PGP itself is broken.

Our recommendation to PGP users

In light of the eFail vulnerability, we recommend that PGP users:

  • Use PGP implementations that are not impacted by eFail, or update their PGP software to the latest version.
  • Ensure that everyone you communicate with is also using unaffected implementations or has updated their PGP software. Be sure to get a verified confirmation from your contacts before sending sensitive information to them.

Among the commonly used software based on PGP, GnuPG, Mailvelope, and Proton Mail were never susceptible to eFail. Enigmail and GPGtools were vulnerable, and we recommend the following mitigations:

  • If you use Enigmail, upgrade to version 2.0.5, use only simple HTML or plain text viewing modes in Thunderbird, and update to the latest version of Thunderbird
  • If you use GPGTools with Apple Mail, switch to Enigmail and Thunderbird, or one of the other unimpacted implementations like Proton Mail or Mailvelope.

Why our recommendation is better than EFF’s recommendation

EFF recommended that users disable PGP plugins or stop using PGP altogether. This is akin to saying, “Some locks can be broken; therefore we must remove all doors.” This is particularly dangerous because it can put at risk individuals who rely on PGP encryption for security.

Both our recommendations and EFF’s recommendations require user action on the part of the sender and recipient of messages, but our recommendation provides better security. If you receive PGP email, following our recommendation protects you from eFail, while still allowing you to easily decrypt PGP messages. If you send PGP email, you need to inform your contacts to take appropriate action. If you give them EFFs recommendation, you may not be able to exchange encrypted messages with them. If you follow our recommendation, you can continue to use email encryption safely. It is that simple.

Using a secure PGP implementation will always be a better solution than not using encryption at all for email communication.

Concluding thoughts

Given that the OpenPGP protocol is still fundamentally secure, the recommendation publicized in the eFail announcements just does not make sense, especially considering that the vulnerabilities are so easy to mitigate.

Email is the world’s most widespread form of communication, and is an irreplaceable tool for many forms of communication. It is essential to improve the security of email, and PGP encryption plays a crucial role in this. As PGP developers, we are committed to keeping PGP users safe.

Signed,

Andy Yen, Founder, Proton(new window)
Phil Zimmermann(new window), Creator, PGP
Patrick Brunschwig, Founder, Enigmail(new window)
Thomas Oberndörfer, Founder, Mailvelope(new window)

You can also find additional technical statements from GnuPG(new window) and Proton Mail(new window).

Protect your privacy with Proton
Create a free account

Related articles

what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers