• Re: Online Safety Act 2023 & 2FA vulnerabilities

    From Jethro_uk@21:1/5 to J Newman on Sat Dec 21 10:32:29 2024
    On Sat, 21 Dec 2024 12:45:40 +0800, J Newman wrote:

    FBI warns against using text message based 2FA.

    https://nypost.com/2024/12/19/tech/feds-issue-another-warning-about-
    texting-dangers-the-scary-reason-to-stop-using-two-factor-authentication-
    now

    The temporary recommendation is that users switch their 2FA if possible
    to encrypted apps (such as WhatsApp) or email-based 2FA. The text message-based 2FA is transmitted in plaintext, making them susceptible
    to interception.

    Now that the OSA 2023 has received Royal Assent, such encrypted apps are potentially under threat, and the app that is unencrypted (SMSes) is a threat.

    It is conceivable that the original warnings against weakening
    encryption, i.e. that it would in fact make users less safe, may well be correct.

    What do you think?

    SMS has long been deprecated for grown up 2FA. This is nothing new.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to All on Sun Dec 22 11:20:02 2024
    On 21/12/2024 10:32, Jethro_uk wrote:
    On Sat, 21 Dec 2024 12:45:40 +0800, J Newman wrote:

    FBI warns against using text message based 2FA.

    https://nypost.com/2024/12/19/tech/feds-issue-another-warning-about-
    texting-dangers-the-scary-reason-to-stop-using-two-factor-authentication-
    now

    The temporary recommendation is that users switch their 2FA if possible
    to encrypted apps (such as WhatsApp) or email-based 2FA. The text
    message-based 2FA is transmitted in plaintext, making them susceptible
    to interception.

    Now that the OSA 2023 has received Royal Assent, such encrypted apps are
    potentially under threat, and the app that is unencrypted (SMSes) is a
    threat.

    It is conceivable that the original warnings against weakening
    encryption, i.e. that it would in fact make users less safe, may well be
    correct.

    What do you think?

    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to J Newman on Sun Dec 22 13:59:32 2024
    On 2024-12-22, J Newman <jenniferkatenewman@gmail.com> wrote:
    On 22/12/2024 19:20, Max Demian wrote:
    On 21/12/2024 10:32, Jethro_uk wrote:
    On Sat, 21 Dec 2024 12:45:40 +0800, J Newman wrote:

    FBI warns against using text message based 2FA.

    https://nypost.com/2024/12/19/tech/feds-issue-another-warning-about-
    texting-dangers-the-scary-reason-to-stop-using-two-factor-authentication- >>> now

    The temporary recommendation is that users switch their 2FA if possible >>>> to encrypted apps (such as WhatsApp) or email-based 2FA. The text
    message-based 2FA is transmitted in plaintext, making them susceptible >>>> to interception.

    Now that the OSA 2023 has received Royal Assent, such encrypted apps are >>>> potentially under threat, and the app that is unencrypted (SMSes) is a >>>> threat.

    It is conceivable that the original warnings against weakening
    encryption, i.e. that it would in fact make users less safe, may well be >>>> correct.

    What do you think?

    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.


    Emails are encrypted in transit. SMSes are not.

    The attack surface for a phone is generally much larger than that of a properly secured computer.

    I'm pretty sure you've got all of that backwards. And why would you give
    the computer the benefit of being "properly secured" and not the phone?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to J Newman on Sun Dec 22 14:52:44 2024
    On Sun, 22 Dec 2024 21:06:45 +0800, J Newman wrote:

    On 22/12/2024 19:20, Max Demian wrote:
    On 21/12/2024 10:32, Jethro_uk wrote:
    On Sat, 21 Dec 2024 12:45:40 +0800, J Newman wrote:

    FBI warns against using text message based 2FA.

    https://nypost.com/2024/12/19/tech/feds-issue-another-warning-about-
    texting-dangers-the-scary-reason-to-stop-using-two-factor-
    authentication-
    now

    The temporary recommendation is that users switch their 2FA if
    possible to encrypted apps (such as WhatsApp) or email-based 2FA. The
    text message-based 2FA is transmitted in plaintext, making them
    susceptible to interception.

    Now that the OSA 2023 has received Royal Assent, such encrypted apps
    are potentially under threat, and the app that is unencrypted (SMSes)
    is a threat.

    It is conceivable that the original warnings against weakening
    encryption, i.e. that it would in fact make users less safe, may well
    be correct.

    What do you think?

    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.


    Emails are encrypted in transit. SMSes are not.

    Generally emails in transit are *not* encrypted. They may be transmitted
    over SSL/TLS but underneath they are plaintext.

    15 years ago I worked on a project and need to implement secure
    communication. The lack of knowledge at corporate IT departments about
    using something like PGP to encrypt email before sending told me that it
    will never be "a thing". I stand by that now.





    The attack surface for a phone is generally much larger than that of a properly secured computer.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to J Newman on Sun Dec 22 14:49:52 2024
    On Sun, 22 Dec 2024 21:05:37 +0800, J Newman wrote:

    On 21/12/2024 18:32, Jethro_uk wrote:
    On Sat, 21 Dec 2024 12:45:40 +0800, J Newman wrote:

    FBI warns against using text message based 2FA.

    https://nypost.com/2024/12/19/tech/feds-issue-another-warning-about-
    texting-dangers-the-scary-reason-to-stop-using-two-factor-
    authentication-
    now

    The temporary recommendation is that users switch their 2FA if
    possible to encrypted apps (such as WhatsApp) or email-based 2FA. The
    text message-based 2FA is transmitted in plaintext, making them
    susceptible to interception.

    Now that the OSA 2023 has received Royal Assent, such encrypted apps
    are potentially under threat, and the app that is unencrypted (SMSes)
    is a threat.

    It is conceivable that the original warnings against weakening
    encryption, i.e. that it would in fact make users less safe, may well
    be correct.

    What do you think?

    SMS has long been deprecated for grown up 2FA. This is nothing new.


    It is still being used by many banks, email services, etc.

    So banks aren't doing grown up 2FA. It's a simple deduction.

    However that said, banks (and other organisations) also have the problem
    of dealing with the public. An amorphous mass with 50% being below
    average intelligence. They are already struggling with SMS 2FA, gawd
    forbid anything more complicated is used. And being commercial entities
    in the main, there is little incentive for banks to spend more than they
    really need on anything (except director bonuses, naturally).

    Finally, you only need "just so" security. Unless you are a very high net
    worth target, the baseline of bank provided security *properly used*
    should suffice.

    Most scams involving banks are predicated on the account holder doing
    something stupid that the bank has warned over. The paradigm being the journalist who managed to get a 4-page feature with the headline
    "Terrifying new tactic puts everyones bank account at risk", only to
    (very quietly on page 4) reveal that they had been scammed because in
    defiance of their banks advice, they told the scammer their PIN.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Roger Hayter on Sun Dec 22 17:35:15 2024
    Roger Hayter wrote:

    My emails are not encrypted in transit.

    You might be surprised, @portfast does support TLS

    Whose are?

    A lot of transit encryption happens opportunistically these days, a hell
    of a lot of mail routes through google/microsoft for starters.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Andy Burns on Sun Dec 22 17:42:25 2024
    On Sun, 22 Dec 2024 17:35:15 +0000, Andy Burns wrote:

    Roger Hayter wrote:

    My emails are not encrypted in transit.

    You might be surprised, @portfast does support TLS

    Whose are?

    A lot of transit encryption happens opportunistically these days, a hell
    of a lot of mail routes through google/microsoft for starters.

    But the underlying email is in plaintext. So legible by anyone with [the
    right level of] access to the server.

    That said, there aren't many people (I know of) who use PGP email (for example).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to All on Sun Dec 22 17:17:15 2024
    On 22 Dec 2024 at 13:06:45 GMT, "J Newman" <jenniferkatenewman@gmail.com> wrote:

    On 22/12/2024 19:20, Max Demian wrote:
    On 21/12/2024 10:32, Jethro_uk wrote:
    On Sat, 21 Dec 2024 12:45:40 +0800, J Newman wrote:

    FBI warns against using text message based 2FA.

    https://nypost.com/2024/12/19/tech/feds-issue-another-warning-about-
    texting-dangers-the-scary-reason-to-stop-using-two-factor-authentication- >>> now

    The temporary recommendation is that users switch their 2FA if possible >>>> to encrypted apps (such as WhatsApp) or email-based 2FA. The text
    message-based 2FA is transmitted in plaintext, making them susceptible >>>> to interception.

    Now that the OSA 2023 has received Royal Assent, such encrypted apps are >>>> potentially under threat, and the app that is unencrypted (SMSes) is a >>>> threat.

    It is conceivable that the original warnings against weakening
    encryption, i.e. that it would in fact make users less safe, may well be >>>> correct.

    What do you think?

    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.


    Emails are encrypted in transit. SMSes are not.

    The attack surface for a phone is generally much larger than that of a properly secured computer.

    My emails are not encrypted in transit. Whose are?

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Andy Burns on Sun Dec 22 17:48:42 2024
    On 22 Dec 2024 at 17:35:15 GMT, "Andy Burns" <usenet@andyburns.uk> wrote:

    Roger Hayter wrote:

    My emails are not encrypted in transit.

    You might be surprised, @portfast does support TLS

    Whose are?

    A lot of transit encryption happens opportunistically these days, a hell
    of a lot of mail routes through google/microsoft for starters.

    Much of my outgoing mail goes direct from home via smtp, and I haven't
    bothered to implement TLS on that. But even if encrypted on some hops it's available unencrypted on each server it passes.


    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Roger Hayter on Sun Dec 22 18:17:06 2024
    On 2024-12-22, Roger Hayter <roger@hayter.org> wrote:
    On 22 Dec 2024 at 17:35:15 GMT, "Andy Burns" <usenet@andyburns.uk> wrote:
    Roger Hayter wrote:
    My emails are not encrypted in transit.

    You might be surprised, @portfast does support TLS

    Whose are?

    A lot of transit encryption happens opportunistically these days, a hell
    of a lot of mail routes through google/microsoft for starters.

    Much of my outgoing mail goes direct from home via smtp, and I haven't bothered to implement TLS on that. But even if encrypted on some hops it's available unencrypted on each server it passes.

    Indeed. Which makes it *at best* the same as SMS rather than better than
    SMS. Although we're ignoring the fact that almost all of the time it
    won't verify who it is communicating with, so the encryption doesn't
    actually mean what it should.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to J Newman on Sun Dec 22 19:54:02 2024
    On 2024-12-22, J Newman <jenniferkatenewman@gmail.com> wrote:
    On 23/12/2024 02:17, Jon Ribbens wrote:
    On 2024-12-22, Roger Hayter <roger@hayter.org> wrote:
    On 22 Dec 2024 at 17:35:15 GMT, "Andy Burns" <usenet@andyburns.uk> wrote: >>>> Roger Hayter wrote:
    My emails are not encrypted in transit.

    You might be surprised, @portfast does support TLS

    Whose are?

    A lot of transit encryption happens opportunistically these days, a hell >>>> of a lot of mail routes through google/microsoft for starters.

    Much of my outgoing mail goes direct from home via smtp, and I haven't
    bothered to implement TLS on that. But even if encrypted on some hops it's >>> available unencrypted on each server it passes.

    Indeed. Which makes it *at best* the same as SMS rather than better than
    SMS. Although we're ignoring the fact that almost all of the time it
    won't verify who it is communicating with, so the encryption doesn't
    actually mean what it should.

    Respectfully, you are mistaken.

    Respectfully, you are completely changing your argument, and then
    purporting to treat my comments on your previous argument as if
    they applied to your new one. The mistake is not mine.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John Levine@21:1/5 to All on Sun Dec 22 21:13:58 2024
    According to Max Demian <max_demian@bigfoot.com>:
    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    TOTP, see my recent message

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.

    a) People don't understand the threat model very well.

    2) E-mail has different security issues, not necessarily better, but different. Your mail provider can read your mail, but the connection between them and the mail program on your PC or phone is encrypted unless you're using a very old
    or misconfigured mail program.

    Some people say that mail should be "end to end" encrypted, but in a world where most people use webmail or an app managed by their mail provider, I
    do not know where the "end" is and neither does anyone else.



    --
    Regards,
    John Levine, johnl@taugh.com, Primary Perpetrator of "The Internet for Dummies",
    Please consider the environment before reading this e-mail. https://jl.ly

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Dec 23 08:46:39 2024
    In message <vk92t4$kjqu$2@dont-email.me>, at 21:06:45 on Sun, 22 Dec
    2024, J Newman <jenniferkatenewman@gmail.com> remarked:

    Emails are encrypted in transit. SMSes are not.

    I'd have thought it was the other way round! I pick up my emails by
    POP3, and there's no encryption on that, whereas GSM has been encrypted
    since day 1.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to John Levine on Mon Dec 23 10:02:11 2024
    On Sun, 22 Dec 2024 21:13:58 +0000, John Levine wrote:

    According to Max Demian <max_demian@bigfoot.com>:
    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    TOTP, see my recent message

    And why is "email-based 2FA" suggested? Emails aren't (by default) >>encrypted, and senders can be spoofed.

    a) People don't understand the threat model very well.

    2) E-mail has different security issues, not necessarily better, but different.
    Your mail provider can read your mail, but the connection between them
    and the mail program on your PC or phone is encrypted unless you're
    using a very old or misconfigured mail program.

    Some people say that mail should be "end to end" encrypted, but in a
    world where most people use webmail or an app managed by their mail
    provider, I do not know where the "end" is and neither does anyone else.

    No a great situation if you need to establish it for the purposes of law.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to John Levine on Mon Dec 23 10:42:57 2024
    John Levine wrote:

    Some people say that mail should be "end to end" encrypted, but in a world where most people use webmail or an app managed by their mail provider, I
    do not know where the "end" is and neither does anyone else.

    I would expect a web front-end to email to be more likely to be
    encrypted than IMAP/POP, though most of the foot-draggers now support IMAPS/POPS even if they don't force their users to use it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to J Newman on Mon Dec 23 11:57:13 2024
    On 22/12/2024 19:18, J Newman wrote:
    On 22/12/2024 22:52, Jethro_uk wrote:
    On Sun, 22 Dec 2024 21:06:45 +0800, J Newman wrote:
    On 22/12/2024 19:20, Max Demian wrote:

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.


    Emails are encrypted in transit. SMSes are not.

    Generally emails in transit are *not* encrypted. They may be transmitted
    over SSL/TLS but underneath they are plaintext.

    TLS encrypts emails in transit between servers. They may be stored on
    servers in plaintext but that's something else.

    Something important I would have thought.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to John Levine on Mon Dec 23 12:01:43 2024
    On 22/12/2024 21:13, John Levine wrote:
    According to Max Demian <max_demian@bigfoot.com>:
    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    TOTP, see my recent message

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.

    a) People don't understand the threat model very well.

    2) E-mail has different security issues, not necessarily better, but different.
    Your mail provider can read your mail, but the connection between them and the
    mail program on your PC or phone is encrypted unless you're using a very old or misconfigured mail program.

    Some people say that mail should be "end to end" encrypted, but in a world where most people use webmail or an app managed by their mail provider, I
    do not know where the "end" is and neither does anyone else.

    The "ends" are the sender and the recipient.

    Presumably webmail would be impossible if there is end to end encryption.

    Maybe a mailing app could be encrypted all the way. I don't know if they
    are.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nib@21:1/5 to Max Demian on Mon Dec 23 12:24:12 2024
    On 2024-12-23 12:01, Max Demian wrote:
    On 22/12/2024 21:13, John Levine wrote:
    According to Max Demian  <max_demian@bigfoot.com>:
    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    TOTP, see my recent message

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.

    a) People don't understand the threat model very well.

    2) E-mail has different security issues, not necessarily better, but
    different.
    Your mail provider can read your mail, but the connection between them
    and the
    mail program on your PC or phone is encrypted unless you're using a
    very old
    or misconfigured mail program.

    Some people say that mail should be "end to end" encrypted, but in a
    world
    where most people use webmail or an app managed by their mail provider, I
    do not know where the "end" is and neither does anyone else.

    The "ends" are the sender and the recipient.

    Presumably webmail would be impossible if there is end to end encryption.

    There are browser extensions that work with webmail systems that can
    enable PGP encryption on the body of the e-mail, I played with one a
    little while back and proved it could communicate with PGP on
    Thunderbird at the other end.

    nib

    Maybe a mailing app could be encrypted all the way. I don't know if they
    are.


    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to nib on Mon Dec 23 13:38:55 2024
    On Mon, 23 Dec 2024 12:24:12 +0000, nib wrote:

    On 2024-12-23 12:01, Max Demian wrote:
    On 22/12/2024 21:13, John Levine wrote:
    According to Max Demian  <max_demian@bigfoot.com>:
    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    TOTP, see my recent message

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.

    a) People don't understand the threat model very well.

    2) E-mail has different security issues, not necessarily better, but
    different.
    Your mail provider can read your mail, but the connection between them
    and the mail program on your PC or phone is encrypted unless you're
    using a very old or misconfigured mail program.

    Some people say that mail should be "end to end" encrypted, but in a
    world where most people use webmail or an app managed by their mail
    provider, I do not know where the "end" is and neither does anyone
    else.

    The "ends" are the sender and the recipient.

    Presumably webmail would be impossible if there is end to end
    encryption.

    There are browser extensions that work with webmail systems that can
    enable PGP encryption on the body of the e-mail, I played with one a
    little while back and proved it could communicate with PGP on
    Thunderbird at the other end.

    I implemented one on an Windows Server 2008 Exchange setup. Total waste
    of time as none of the recipients (IT departments in major insurers) had
    a clue what to do.

    It is the lack of any universal encryption for email (with it's
    associated ability to authenticate) that keeps most organisations
    dependence on POTS going. Allegedly.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to All on Mon Dec 23 17:39:45 2024
    On 23/12/2024 13:38, Jethro_uk wrote:
    On Mon, 23 Dec 2024 12:24:12 +0000, nib wrote:
    On 2024-12-23 12:01, Max Demian wrote:
    On 22/12/2024 21:13, John Levine wrote:

    Some people say that mail should be "end to end" encrypted, but in a
    world where most people use webmail or an app managed by their mail
    provider, I do not know where the "end" is and neither does anyone
    else.

    The "ends" are the sender and the recipient.

    Presumably webmail would be impossible if there is end to end
    encryption.

    There are browser extensions that work with webmail systems that can
    enable PGP encryption on the body of the e-mail, I played with one a
    little while back and proved it could communicate with PGP on
    Thunderbird at the other end.

    I implemented one on an Windows Server 2008 Exchange setup. Total waste
    of time as none of the recipients (IT departments in major insurers) had
    a clue what to do.

    It is the lack of any universal encryption for email (with it's
    associated ability to authenticate) that keeps most organisations
    dependence on POTS going. Allegedly.

    PGP is conceptually hard to understand, and how can you reliably get
    hold of other people's public keys?

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Max Demian on Mon Dec 23 18:18:09 2024
    On Mon, 23 Dec 2024 17:39:45 +0000, Max Demian wrote:

    On 23/12/2024 13:38, Jethro_uk wrote:
    On Mon, 23 Dec 2024 12:24:12 +0000, nib wrote:
    On 2024-12-23 12:01, Max Demian wrote:
    On 22/12/2024 21:13, John Levine wrote:

    Some people say that mail should be "end to end" encrypted, but in a >>>>> world where most people use webmail or an app managed by their mail
    provider, I do not know where the "end" is and neither does anyone
    else.

    The "ends" are the sender and the recipient.

    Presumably webmail would be impossible if there is end to end
    encryption.

    There are browser extensions that work with webmail systems that can
    enable PGP encryption on the body of the e-mail, I played with one a
    little while back and proved it could communicate with PGP on
    Thunderbird at the other end.

    I implemented one on an Windows Server 2008 Exchange setup. Total waste
    of time as none of the recipients (IT departments in major insurers)
    had a clue what to do.

    It is the lack of any universal encryption for email (with it's
    associated ability to authenticate) that keeps most organisations
    dependence on POTS going. Allegedly.

    PGP is conceptually hard to understand, and how can you reliably get
    hold of other people's public keys?

    The clue is in the name "public"

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to jethro_uk@hotmailbin.com on Mon Dec 23 22:01:47 2024
    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    On Mon, 23 Dec 2024 17:39:45 +0000, Max Demian wrote:

    On 23/12/2024 13:38, Jethro_uk wrote:
    On Mon, 23 Dec 2024 12:24:12 +0000, nib wrote:
    On 2024-12-23 12:01, Max Demian wrote:
    On 22/12/2024 21:13, John Levine wrote:

    Some people say that mail should be "end to end" encrypted, but in a >>>>>> world where most people use webmail or an app managed by their mail >>>>>> provider, I do not know where the "end" is and neither does anyone >>>>>> else.

    The "ends" are the sender and the recipient.

    Presumably webmail would be impossible if there is end to end
    encryption.

    There are browser extensions that work with webmail systems that can
    enable PGP encryption on the body of the e-mail, I played with one a
    little while back and proved it could communicate with PGP on
    Thunderbird at the other end.

    I implemented one on an Windows Server 2008 Exchange setup. Total waste
    of time as none of the recipients (IT departments in major insurers)
    had a clue what to do.

    It is the lack of any universal encryption for email (with it's
    associated ability to authenticate) that keeps most organisations
    dependence on POTS going. Allegedly.

    PGP is conceptually hard to understand, and how can you reliably get
    hold of other people's public keys?

    The clue is in the name "public"

    If you have one of the keys of an asymmetric cryptography key pair, how do
    you know who has access to the other key of the pair? Calling one ‘public’ and the other ‘secret’ does not in itself make them conform to those labels. Even if the counterpart to the one you have is closely guarded and known only to one person, how do you know who they are?

    One of the parts of PGP that makes it conceptually hard to understand is
    the web of trust. It is different from the chain of trust in SSL and its successors.

    Elliptic curve cryptography introduces yet another trust model. From what I remember it makes it possible to send someone an end-to-end encrypted
    message before they know that they will need the deciphering key, let alone have it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Owen Rees on Tue Dec 24 10:36:56 2024
    On Mon, 23 Dec 2024 22:01:47 +0000, Owen Rees wrote:

    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    [quoted text muted]

    If you have one of the keys of an asymmetric cryptography key pair, how
    do you know who has access to the other key of the pair? Calling one ‘public’
    and the other ‘secret’ does not in itself make them conform to those labels. Even if the counterpart to the one you have is closely guarded
    and known only to one person, how do you know who they are?

    All of which applies to phone calls, SMS and indeed written
    correspondence.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to All on Tue Dec 24 10:38:56 2024
    On 23/12/2024 18:18, Jethro_uk wrote:
    On Mon, 23 Dec 2024 17:39:45 +0000, Max Demian wrote:
    On 23/12/2024 13:38, Jethro_uk wrote:

    It is the lack of any universal encryption for email (with it's
    associated ability to authenticate) that keeps most organisations
    dependence on POTS going. Allegedly.

    PGP is conceptually hard to understand, and how can you reliably get
    hold of other people's public keys?

    The clue is in the name "public"

    How do I know it's *your* public key, and not that of an imposter? If I
    know you personally, you could hand it to me on a USB stick, or put it
    on a website and hand me a scribbled note with the URL of the site.

    If we've only communicated by email, how do I know that an email I
    receive containing the key is really from you? It's easy enough to
    change the "From" line of an email.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Max Demian on Tue Dec 24 11:50:57 2024
    On Tue, 24 Dec 2024 10:38:56 +0000, Max Demian wrote:

    On 23/12/2024 18:18, Jethro_uk wrote:
    On Mon, 23 Dec 2024 17:39:45 +0000, Max Demian wrote:
    On 23/12/2024 13:38, Jethro_uk wrote:

    It is the lack of any universal encryption for email (with it's
    associated ability to authenticate) that keeps most organisations
    dependence on POTS going. Allegedly.

    PGP is conceptually hard to understand, and how can you reliably get
    hold of other people's public keys?

    The clue is in the name "public"

    How do I know it's *your* public key, and not that of an imposter? If I
    know you personally, you could hand it to me on a USB stick, or put it
    on a website and hand me a scribbled note with the URL of the site.

    If we've only communicated by email, how do I know that an email I
    receive containing the key is really from you? It's easy enough to
    change the "From" line of an email.

    Well quite.

    However MD5 hashes are used to guarantee the provenance of software in
    various forms on the internet. And you could apply the same challenges to
    that.

    There are ways to verify a public key belongs to the person claiming it,
    by the way. Although I admit they increase complexity. However it is
    Pretty Good Privacy, not Pretty Simple Privacy ....

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to All on Wed Dec 25 11:40:08 2024
    On 24/12/2024 11:50, Jethro_uk wrote:
    On Tue, 24 Dec 2024 10:38:56 +0000, Max Demian wrote:

    On 23/12/2024 18:18, Jethro_uk wrote:
    On Mon, 23 Dec 2024 17:39:45 +0000, Max Demian wrote:
    On 23/12/2024 13:38, Jethro_uk wrote:

    It is the lack of any universal encryption for email (with it's
    associated ability to authenticate) that keeps most organisations
    dependence on POTS going. Allegedly.

    PGP is conceptually hard to understand, and how can you reliably get
    hold of other people's public keys?

    The clue is in the name "public"

    How do I know it's *your* public key, and not that of an imposter? If I
    know you personally, you could hand it to me on a USB stick, or put it
    on a website and hand me a scribbled note with the URL of the site.

    If we've only communicated by email, how do I know that an email I
    receive containing the key is really from you? It's easy enough to
    change the "From" line of an email.

    Well quite.

    However MD5 hashes are used to guarantee the provenance of software in various forms on the internet. And you could apply the same challenges to that.

    How? (If it's something really complicated and technical, that in itself
    is a disadvantage.)

    There are ways to verify a public key belongs to the person claiming it,
    by the way. Although I admit they increase complexity. However it is
    Pretty Good Privacy, not Pretty Simple Privacy ....

    How? What is a "person"? (A person only exists in the real world, other entities are just data.)

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to jethro_uk@hotmailbin.com on Sat Dec 28 15:01:54 2024
    On Tue, 24 Dec 2024 10:36:56 -0000 (UTC), Jethro_uk
    <jethro_uk@hotmailbin.com> wrote in <vke2s8$m2hq$11@dont-email.me>:

    On Mon, 23 Dec 2024 22:01:47 +0000, Owen Rees wrote:

    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    [quoted text muted]

    If you have one of the keys of an asymmetric cryptography key pair, how
    do you know who has access to the other key of the pair? Calling one
    ‘public’
    and the other ‘secret’ does not in itself make them conform to those
    labels. Even if the counterpart to the one you have is closely guarded
    and known only to one person, how do you know who they are?

    All of which applies to phone calls, SMS and indeed written
    correspondence.

    You seem to be suggesting that using asymmetric cryptography is little
    better than sending messages in cleartext.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to All on Sat Dec 28 21:01:24 2024
    On Sun, 22 Dec 2024 11:20:02 +0000, Max Demian <max_demian@bigfoot.com>
    wrote:

    On 21/12/2024 10:32, Jethro_uk wrote:
    On Sat, 21 Dec 2024 12:45:40 +0800, J Newman wrote:

    FBI warns against using text message based 2FA.

    https://nypost.com/2024/12/19/tech/feds-issue-another-warning-about-
    texting-dangers-the-scary-reason-to-stop-using-two-factor-authentication-
    now

    The temporary recommendation is that users switch their 2FA if possible
    to encrypted apps (such as WhatsApp) or email-based 2FA. The text
    message-based 2FA is transmitted in plaintext, making them susceptible
    to interception.

    Now that the OSA 2023 has received Royal Assent, such encrypted apps are >>> potentially under threat, and the app that is unencrypted (SMSes) is a
    threat.

    It is conceivable that the original warnings against weakening
    encryption, i.e. that it would in fact make users less safe, may well be >>> correct.

    What do you think?

    SMS has long been deprecated for grown up 2FA. This is nothing new.

    What else is there (that everyone can be assumed to have access to)?

    Authenticator apps. If you've got a smartphone, you've got access to them.

    And why is "email-based 2FA" suggested? Emails aren't (by default)
    encrypted, and senders can be spoofed.

    It's harder to intercept emails. The fact that they can be spoofed isn't
    really an issue here; an attacker can send an email claiming to be from the target's bank (or whatever), but they can't send an email containing the correct 2FA code. Because if they could, then they wouldn't need to spoof an email anyway.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Owen Rees on Sun Dec 29 11:47:36 2024
    On Sat, 28 Dec 2024 15:01:54 +0000, Owen Rees wrote:

    On Tue, 24 Dec 2024 10:36:56 -0000 (UTC), Jethro_uk <jethro_uk@hotmailbin.com> wrote in <vke2s8$m2hq$11@dont-email.me>:

    On Mon, 23 Dec 2024 22:01:47 +0000, Owen Rees wrote:

    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    [quoted text muted]

    If you have one of the keys of an asymmetric cryptography key pair,
    how do you know who has access to the other key of the pair? Calling
    one ‘public’ and the other ‘secret’ does not in itself make them
    conform to those labels. Even if the counterpart to the one you have
    is closely guarded and known only to one person, how do you know who
    they are?

    All of which applies to phone calls, SMS and indeed written
    correspondence.

    You seem to be suggesting that using asymmetric cryptography is little
    better than sending messages in cleartext.

    No. I am stating that the problem of verifying you are using the correct
    key for the person you wish to securely communicate doesn't just go away
    when you find a better method. A fact a lot of rather dim criminals will
    have discovered when they were convicted because it turned out their
    messages were going direct to Plod Central.

    All of which being said, have a system where you can openly publish your
    key and invite others to use it to send you messages does seem quite
    robust if you are 100% sure the key you are using belongs to the person
    you are messaging. And asymmetric encryption does allow for a sender to
    be verified in the first place if you want to verify the keys provenance.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to jethro_uk@hotmailbin.com on Mon Dec 30 00:08:46 2024
    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    On Sat, 28 Dec 2024 15:01:54 +0000, Owen Rees wrote:

    On Tue, 24 Dec 2024 10:36:56 -0000 (UTC), Jethro_uk
    <jethro_uk@hotmailbin.com> wrote in <vke2s8$m2hq$11@dont-email.me>:

    On Mon, 23 Dec 2024 22:01:47 +0000, Owen Rees wrote:

    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    [quoted text muted]

    If you have one of the keys of an asymmetric cryptography key pair,
    how do you know who has access to the other key of the pair? Calling
    one ‘public’ and the other ‘secret’ does not in itself make them
    conform to those labels. Even if the counterpart to the one you have
    is closely guarded and known only to one person, how do you know who
    they are?

    All of which applies to phone calls, SMS and indeed written
    correspondence.

    You seem to be suggesting that using asymmetric cryptography is little
    better than sending messages in cleartext.

    No. I am stating that the problem of verifying you are using the correct
    key for the person you wish to securely communicate doesn't just go away
    when you find a better method. A fact a lot of rather dim criminals will
    have discovered when they were convicted because it turned out their
    messages were going direct to Plod Central.

    All of which being said, have a system where you can openly publish your
    key and invite others to use it to send you messages does seem quite
    robust if you are 100% sure the key you are using belongs to the person
    you are messaging. And asymmetric encryption does allow for a sender to
    be verified in the first place if you want to verify the keys provenance.

    Asymmetric encryption does not in itself do that.

    In SSL and its successors there is a chain of trust back to some
    certification authority who you are assumed to trust to have done due
    diligence in creating a certificate that can be verified to be the authority’s statement that the key belongs to the entity that claims to control it.

    In PGP and its successors, there is the web of trust that provides a
    similar assurance back to some entity that you have chosen to designate as trustworthy for that purpose. IIRC PGP provides more complex mechanisms so
    that you can trace multiple paths back to entities that you trust to
    different degrees. I think I have some very early PGP documentation lurking around somewhere that describes this.

    Note in particular the assumptions that are embedded into the various approaches and consider how much you can rely on them when faced with an adversary with the resources of a nation state or a criminal enterprise
    that can probably pay better than a nation state in order to enrich
    themselves at your expense.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Sun Jan 5 10:29:58 2025
    In message <ltqprsF46b0U2@mid.individual.net>, at 18:50:36 on Fri, 3 Jan
    2025, Simon Parker <simonparkerulm@gmail.com> remarked:

    My preferred 2FA is an authenticator app as I can use it wherever I am
    as not all locations have brilliant mobile coverage (to receive an SMS)
    or 4/5G coverage to receive e-mail / WhatsApp - something not everyone
    seems to appreciate.

    Yes, I'm locked in a thread in another place, where people who
    presumably live in major metro areas are in complete denial that
    there is any such thing as a GSM not-spot.

    ...

    They've called me on my mobile, which I've answered using my name. They
    ask me if I am the person they were trying to call, thereby telling me
    the name of the person for whom they are looking if I didn't know it,
    and then send a four-digit PIN to a phone they already know I have in
    my possession and control because I've just answered a call on it. How
    is that supposed to make me feel secure or verify anything? At best it
    is a tick box exercise, at worst it is security theatre or no practical
    use and a waste of everyone's time.

    I completely agree. And worse than that, if doing an online transaction
    they'll say stupid things like "Do not tell anyone the PIN, not even
    us", or "Anyone asking you for the PIN is a criminal".

    So they are not only a self-confessed criminal, but failing to tell them
    the PIN means the transaction is deadlocked.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Handsome Jack@21:1/5 to Simon Parker on Sun Jan 5 16:29:13 2025
    On Fri, 3 Jan 2025 18:50:36 +0000, Simon Parker wrote:

    On 21/12/2024 04:45, J Newman wrote:
    FBI warns against using text message based 2FA.

    https://nypost.com/2024/12/19/tech/feds-issue-another-warning-about-
    texting-dangers-the-scary-reason-to-stop-using-two-factor-
    authentication-now

    The temporary recommendation is that users switch their 2FA if possible
    to encrypted apps (such as WhatsApp) or email-based 2FA. The text
    message-based 2FA is transmitted in plaintext, making them susceptible
    to interception.

    Now that the OSA 2023 has received Royal Assent, such encrypted apps
    are potentially under threat, and the app that is unencrypted (SMSes)
    is a threat.

    It is conceivable that the original warnings against weakening
    encryption, i.e. that it would in fact make users less safe, may well
    be correct.

    What do you think?

    I think the article is click bait and of little, if any, practical
    benefit.

    My preferred 2FA is an authenticator app as I can use it wherever I am
    as not all locations have brilliant mobile coverage (to receive an SMS)
    or 4/5G coverage to receive e-mail / WhatsApp - something not everyone
    seems to appreciate.

    But an authenticator app works without being permanently connected to
    the network and should be, IMO, the default option proffered.


    The problem being is that the customer does not seem to be able to choose
    it. I've opened quite a few accounts lately and I couldn't see any way of choosing the authenticator route - not that I was too distressed, as I
    don't actually know how to do it. Chicken and egg.

    I used to have a bank account with one of those little gadgets you slide a
    card into and then enter your pin and it gives you a one-time code that
    you type in the web page. I assume that's the same technology.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)