Security Blog

The latest news and insights from Google on security and safety on the Internet

Making end-to-end encryption easier to use

3 de junho de 2014
Share on Twitter Share on Facebook
Google

46 comentários :

Unknown disse...

This is great looking forward in seeing the new end-to-end changes.

3 de junho de 2014 às 16:37
Unknown disse...

Sounds good. Will Google permit/encourage/develop solutions for other browsers, too, such as Firefox?

3 de junho de 2014 às 17:27
Unknown disse...

Well done, folks. More of this.

3 de junho de 2014 às 17:46
Unknown disse...

Hi, I would like to help people to install the project.

To install, you need to get the contents from https://code.google.com/p/end-to-end/wiki/BuildInstructions?tm=6 and use the following instructions (after resolving the dependencies (like git, svc, wget, java and etc) in case you don't have them installed before hand):

vim install.sh
chmod a+x install.sh
./install.sh

cd e2e_dev/
vim compile.sh
chmod a+x compile.sh
shopt -s expand_aliases
./compile.sh

Then just install the unpacked extension using the path e2e_dev/end-to-end/javascript/crypto/e2e/extension/
(More details about it in
https://developer.chrome.com/extensions/getstarted )

Congratulations for the amazing project https://code.google.com/p/end-to-end/

Kindest regards,
Luan

3 de junho de 2014 às 18:31
Ricky Burgin disse...

This is absolutely fantastic and I am surprised such a thing has not yet been implemented! Any plans for similar mobile support on Chrome Browser for Android or as a separate app?

Cannot wait for it to hit the Chrome Store so I can get my friends to use it!

3 de junho de 2014 às 18:32
Anônimo disse...

Been waiting for a very long time for this.

3 de junho de 2014 às 18:40
Jonathan Harker disse...

Bravo! It's long past due when OpenPGP should have gone mainstream. Thank you Google, and thanks to everyone who is working on this project. Private communications are a necessity in a Democracy.

3 de junho de 2014 às 18:42
Unknown disse...

Do you plan on recoding End-to-end to use Web Crypto once it is generally available and supports the algorithms you require? That will likely increase security and definitely increase performance.

3 de junho de 2014 às 19:41
Unknown disse...

Google + USA + Three-Letter-Organisations = Encrypted E-mails?
Somehow, this equation does not add up.

3 de junho de 2014 às 19:55
PacoBell disse...

Wait, you guys are implementing RFC 6637? Aren't P-256 and P-384 known to be weak?

http://safecurves.cr.yp.to/

3 de junho de 2014 às 21:06
admin disse...

thanks for that email security
awesome!

3 de junho de 2014 às 21:09
InspiredHeart disse...

It seems a tad ironic, or perhaps hypocritical is the right adjective, that a company which is complicit in NSA surveillance of our data is at the same time claiming to be such a great advocate of privacy and encryption. Every email that passes to or from a Gmail account is scanned for keywords, and added to a database. One purpose of that is for targeted advertising to the Gmail account holder. What else that data is used for, or who is granted access to it (such as the NSA?) we may never know.

How about Google take a firm stand on not complying with NSA and other Government surveillance programs?

3 de junho de 2014 às 22:30
Unknown disse...

Great effort again, thank you Google.
Would be awesome if PGP is incorporated in SPDY !

4 de junho de 2014 às 03:06
Pixelmatsch disse...

So how do we test this on Chrome for Windows? You must be aware it's impossible to install anything from outside the store.

4 de junho de 2014 às 04:37
Alfred Portengen disse...

Will this extension be available exclusively for Chrome, or will you make it available for other browsers as well?

4 de junho de 2014 às 05:46
Unknown disse...

Will End-To-End also be added to the Android Gmail app eventually? The Chrome extension us great but a lot of email is sent through mobile these days.

4 de junho de 2014 às 07:57
Unknown disse...

This is cool, a long missed feature. I am looking forward to check it out. For now - thanks a lot guys!

4 de junho de 2014 às 08:34
Unknown disse...

How about collecting email addresses so that you can email those people when end to end is ready for prime time (at the Google store)?

4 de junho de 2014 às 09:37
Unknown disse...

Please implement a more easy way to exchange and find public keys. That's only point keeping end-users from using encryption. You are Google ... You can do it. E.g. Automatically search all known key-servers, and web pages for the recipients public key. You are Google ... You can do it.

4 de junho de 2014 às 09:48
Unknown disse...

Does this plugin also encrypt email headers, containing information such as Subject:, Date:, and Received:, or is only the body of the message encrypted?

Does the plugin prevent Google from scanning the body of the email (for the purposes of targeted advertising)?

4 de junho de 2014 às 09:57
Unknown disse...

But by choosing Elliptic Curve as your default cipher for keys generated by your extension, you will be incompatible with 99% of the PGP implementations already in existence.

A GnuPG user with the current stable GnuPG release will not be able to encrypt a message to public key that is using EC since it is not supported by their software.

Nice that you have allowed for people to import their own existing keys, but do you anticipate some issues from using a non-standard PGP extension when trying to exchange messages from a pure 4880 implementation?

4 de junho de 2014 às 10:11
Unknown disse...

That's a great news! Thank you!

4 de junho de 2014 às 10:25
JoeV disse...

What tools will you be providing to assist in the management and distribution of public keys?

4 de junho de 2014 às 11:54
Unknown disse...

great info thank you..

4 de junho de 2014 às 19:54
Unknown disse...

Au contraire,

"We recognize that this sort of encryption will probably only be used for very sensitive messages or by those who need added protection."

Personally,

given the events of the past years, I consider the need for secure, private, communication a necessary prerequisite for human growth and exploration.

4 de junho de 2014 às 21:59
Unknown disse...

I wish some large email provider, such as GMail or Yahoo Mail, would start using end-to-end (client-to-client) encryption routinely, and transparently. When you click the Send button, software (maybe an open-source browser plug-in) looks to see if your recipient has a preferred encryption method and public key registered anywhere (or if one is cached locally, via prior key-exchange). If recipient does, the message gets encrypted (by open-source browser plug-in) via that method before sending. If recipient is not registered anywhere, message goes unencrypted, as usual. Simple ! And now the email provider itself can't read or decrypt the messages, and can't decrypt them for the government.

The company that does this first could seize the mantle of "privacy champion".

They still could do targeted advertising based on keywords: the plug-in that does the encryption first extracts a few keywords, and then passes them on along with the encrypted message.

Searching your messages on the server would be affected; the server wouldn't be able to read the text of the messages. I suppose you could do a search by sending all of the encrypted messages to the client (browser), and decrypting them and doing the search there, but that would be horribly inefficient.

The reason I want an existing large provider to do this, as opposed to new secure-email startups, is that the change by an existing large provider would immediately make encryption easily available to hundreds of millions of existing users. No need for users to change providers, with new UI and new email addresses and having to transfer their contact lists. Most users will NOT move to new secure-email services; we need to get encryption into existing services.

5 de junho de 2014 às 04:07
Unknown disse...

What was the reason to not use s/mine? PGP is fine when it comes to desktops, but s/mime is supported even on most mobile phones and integrated into tons of mail clients.

5 de junho de 2014 às 10:50
Zach Taylor disse...

Cool beans.

5 de junho de 2014 às 17:28
Unknown disse...

Why are there no comments here yet? Were all comments obfuscated via end-to-end encryption?

5 de junho de 2014 às 19:52
? disse...

Are there any plans to offer this so it's available for Firefox users? Thanks.

6 de junho de 2014 às 12:03
Mark Wilson disse...

Put it in the Chrome Web Store!!!! Hurry!

Also... does this put an end to MITM?

7 de junho de 2014 às 05:58
Unknown disse...

Does using this mean email will be stored encrypted on google servers and not even google can access it?

The only way to stop government-level bad actors like the NSA is implementing the above.

10 de junho de 2014 às 09:53
Unknown disse...

Hi,
Will it be possible to use the Js crypto library as a separate tool for securing web apps ?

Thanks !

10 de junho de 2014 às 12:59
Bob Brown disse...

The blog post says, "We recognize that this sort of encryption will probably only be used for very sensitive messages..."

Please, encrypt everything and encourage everyone to do so. Law enforcement, and in a very few cases, judges, have used the presence of encryption as an indication of wrongdoing. If nearly everyone encrypted nearly everything, that could not happen.

11 de junho de 2014 às 15:11
Zikalify disse...

Will you allow it to work with gpg implementations that already exist, I haven't looked at it but does it give the user a public key that I can then take and store in my thunderbird install and when I emaail them the plugin can do the unencryption with their private key?

11 de junho de 2014 às 21:34
Joachim disse...

Dear Stephan Somogyi,

thank you for releasing this extremely useful extension!

Do you plan to implement smart card support in the future? If yes, will you support the Microsoft Crypto API?

Best regards,
Joachim

13 de junho de 2014 às 05:00
Wireless.Phil disse...

After the last Chrome update, the browser has been locking up my Samsung Galaxy Tab 3

TWICE in a few days!

Once I was able to reboot back to factory settings.

The next time I was able to uninstall the Chrome browser and use the supplied alternate.

This is not a new problem, during my research on Android support, problems go back to 2012.

Don't you think it would be better to fix the Chrome problems, BEFORE adding things to the browser that could complicate fixing the problem in the first place?

15 de junho de 2014 às 21:59
Unknown disse...

Google security is not that much compared to Facebook , Microsoft and other service providers...

For example you can log out somebody indefinitely from using Google services by just exploiting CSRF vulnerability ...

Put this link in a loop in your website form load event and the other person will not be able to use Google services...a DOS attack ...pretty simple flaw ....

https://mail.google.com/mail/u/0/?ui=2&ik=310bc0d947&view=om&th=146a8759aa7f7af8

17 de junho de 2014 às 02:39
Unknown disse...

iPGMail (https://ipgmail.com) now supports PGP/ECC keys also which will be helpful for people who want to exchange PGP msgs with your users. Also it might be helpful for interoperability testing purposes.

21 de junho de 2014 às 10:38
Dedwarmo disse...

Thanks! This is great news.

1 de julho de 2014 às 11:33
Vytek disse...

Hi,
any news to the release of this extensions??

7 de julho de 2014 às 11:53
Legion disse...

"We recognize that this sort of encryption will probably only be used for very sensitive messages or by those who need added protection."

Most likely millions of people will utilize the encryption regardless of message sensitivity inasmuch as the fascist State illegally farms emails which everyone sends and receives, and even mundane messaging requires encryption to reduce gross civil rights violations committed by fascist regimes.

The worse bad actors are the Christofascist corporate Oligarchy running the United States, and if you trust them with your unencrypted emails given the ease of encryption, you have nobody to blame but yourself when the thugs kick in your doors.

21 de julho de 2014 às 13:43
Unknown disse...

Any update on the release?

30 de julho de 2014 às 15:31
Son of LOL disse...

We recognize that this sort of encryption will probably only be used for very sensitive messages or by those who need added protection

I certainly hope not. The whole point, in my estimation (or one of them, at any rate), of the Snowden revelations was just how badly the entire web is in need of encryption, to prevent everything from garden-variety cyber-theft to surveillance by governments. If encryption is seen by most people as something one does only when one needs to send sensitive messages, it will be very easy - too easy - for said bad actors, governments, etc to know which messages to spend more time trying to crack.

Additionally, people who more-habitually use encryption as a matter of course in such a world would be de facto penalized because their ordinary activities would by definition bring them under extra scrutiny. The only way to prevent this is for people to up their game - for most people to begin thinking of encryption as a habit that needs to be acquired and practiced, just as a hundred years ago, people from the country would learn the habit of locking their front door every time they went out, if they moved to the city.

11 de agosto de 2014 às 18:50
Simson disse...

It's unfortunate that Google has decided to go with PGP rather than S/MIME, since S/MIME has many profound usability advantages (such as automatically distributing public keys with each message). An S/MIME extension could have made the keys in the browser and then automatically sent the CSR to google and downloaded the corresponding S/MIME certificate.

16 de agosto de 2014 às 20:11
Anônimo disse...

There is some solution that handles public key exchange automatically. I personally use Pandor and I heighly recommend for others.It is a quite user friendly extension that works with most popular mail services such as Gmail, Outlook or Yahoo and it uses PGP for mails encryption. It is available in Chrome Web store in this link and as a firefox add-Ons in this one.

21 de outubro de 2014 às 08:36

Postar um comentário

  

Marcadores


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2024
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2023
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2022
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2021
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2020
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2019
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2018
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2017
    • dez.
    • nov.
    • out.
    • set.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2016
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2015
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2014
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2013
    • dez.
    • nov.
    • out.
    • ago.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2012
    • dez.
    • set.
    • ago.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2011
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
  •     2010
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • mai.
    • abr.
    • mar.
  •     2009
    • nov.
    • out.
    • ago.
    • jul.
    • jun.
    • mar.
  •     2008
    • dez.
    • nov.
    • out.
    • ago.
    • jul.
    • mai.
    • fev.
  •     2007
    • nov.
    • out.
    • set.
    • jul.
    • jun.
    • mai.

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms