LWN: Comments on "Future directions for PGP" https://lwn.net/Articles/742542/ This is a special feed containing comments posted to the individual LWN article titled "Future directions for PGP". en-us Mon, 20 Oct 2025 01:16:08 +0000 Mon, 20 Oct 2025 01:16:08 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net How to automate GnuPG https://lwn.net/Articles/743742/ https://lwn.net/Articles/743742/ ber <div class="FormattedComment"> <a href="https://wiki.gnupg.org/APIs">https://wiki.gnupg.org/APIs</a> gives you a number of pointers how to run the GnuPG crypto backend from your application. Note that GPGME language bindings like python-gnupg have become an official part of GnuPG with 2.2, so there is much better support for them.<br> <p> If there is something missing in GPGME, please let the gnupg-devs know.<br> <p> Best Regards,<br> Bernhard<br> (Disclosure: I'm part of the GnuPG team.)<br> </div> Tue, 09 Jan 2018 20:51:39 +0000 Progress towards more End-to-End Usability https://lwn.net/Articles/743734/ https://lwn.net/Articles/743734/ ber <div class="FormattedComment"> There is a perception with some people that OpenPGP, its backend and frontend applications have not seen much progress over the last years. I can understand where it comes from. However about 2-3 years ago, the group around Werner Koch (g10code) and Intevation (my company) got more funding, partly in the aftermath of the Snowden revelations and from the German Federal Agency for Information Secutiry. It allowed for getting ahead of quite a bit of backlog and to come up with larger changes, which now are pending to reach more users.<br> <p> The whole idea is to design for people that do not need to think in security terms, but still get some reasonable<br> end-to-end security.<br> <p> * The web key directory (<a href="https://wiki.gnupg.org/WKD">https://wiki.gnupg.org/WKD</a>) allows for detecting a (somewhat) valid pubkey for a given email address, it is a precondition for a nicely working automated encryption. <br> * GnuPG in 2.2 gained the ability to save and consider the communication history to allow assigning some basic trust levels based on it.<br> * There is a Free Software OpenPGP/MIME plugin for Outlook (which still is a wide spread email desktop client) gaining more communication partners.<br> * Some of the concepts show how a user friendly end-to-end crypto can be improved. The reasoning is published for others to build on see <a href="https://wiki.gnupg.org/EasyGpg2016/VisionAndStories">https://wiki.gnupg.org/EasyGpg2016/VisionAndStories</a> and <a href="https://wiki.gnupg.org/EasyGpg2016/AutomatedEncryption">https://wiki.gnupg.org/EasyGpg2016/AutomatedEncryption</a><br> <p> Bernhard<br> (Disclosure: I'm part of the team and a gnupg-verein member.)<br> </div> Tue, 09 Jan 2018 20:45:56 +0000 Future directions for PGP https://lwn.net/Articles/743733/ https://lwn.net/Articles/743733/ ber <div class="FormattedComment"> Reading your comment I think that you want something for people who are hosting a few email addresses. I will see that I can a section about this to wiki.gnupg.org. Thanks for the link!<br> <p> Note that for small organizations, there is <a href="https://wiki.gnupg.org/WKDHosting">https://wiki.gnupg.org/WKDHosting</a> and for medium hosters <a href="https://wiki.gnupg.org/WKS">https://wiki.gnupg.org/WKS</a> and the specification rfc draft for larger hosters that may want to implement the server side for themselves.<br> <p> DNS potentially loses more information, this is why we have preferred https.<br> <p> Bernhard<br> (I'm among the people that have developed WKD.)<br> </div> Tue, 09 Jan 2018 20:27:24 +0000 Keybase options https://lwn.net/Articles/743362/ https://lwn.net/Articles/743362/ craniumslows <div class="FormattedComment"> Apologies for the slow response. The service has you sign or encrypt the actions that you take against your profile. Things like adding a friend which I think they call following or verifying a web identity are ones that I can think of off the top of my head. You don’t have to upload a private key, but they do allow it. That’s where my concern comes in. <br> <p> That said the site is superbly simple to use and with the desktop apps your key stays local and under your control. I really like it and it makes sharing your key and all your other online identities a lot easier. <br> </div> Sat, 06 Jan 2018 15:35:30 +0000 Keybase options https://lwn.net/Articles/743099/ https://lwn.net/Articles/743099/ raof You need to upload your private key (or, equivalently, use a keypair generated by them) if you want to be able to <a href=https://keybase.io/decrypt>decrypt</a> or <a href=https://keybase.io/sign>sign</a> stuff on the website. If Keybase doesn't host your private key, those pages will tell you to use the <tt>keybase</tt> command line tool or <tt>gpg</tt>, which will use your local key. Thu, 04 Jan 2018 23:04:37 +0000 Future directions for PGP https://lwn.net/Articles/743086/ https://lwn.net/Articles/743086/ mcatanzaro <div class="FormattedComment"> Trivia: WebKit (on Linux) uses libgcrypt to implement Web Crypto (for better or for worse) and Content Security Policy (where it's used for hashing stuff). So it's not entirely specific to GnuPG.<br> </div> Thu, 04 Jan 2018 22:22:21 +0000 Usability https://lwn.net/Articles/743028/ https://lwn.net/Articles/743028/ jcrawfordor <p>There's sort of a famous article in security software usability research titled <a href="https://people.eecs.berkeley.edu/~tygar/papers/Why_Johnny_Cant_Encrypt/OReilly.pdf">"Why Johnny Can't Encrypt,"</a> on the usability challenges of PGP proper in '05.</p> <p>Take a read through it some time with a modern GUI frontend for GnuPG and see what's improved... you won't find a lot. The commercial products aren't much better, most of them have improved the UI just by hiding things away until there's not a lot left you can do with them. And it'd be tempting for some Linux users to wave their hands and say something about encryption just not fitting the GUI paradigm, but I don't think even they would suggest that the gpg textmode tool has a sane UI.</p> Thu, 04 Jan 2018 19:16:02 +0000 Keybase options https://lwn.net/Articles/743007/ https://lwn.net/Articles/743007/ dany <div class="FormattedComment"> they require users to upload private keys? which features if I may ask?<br> </div> Thu, 04 Jan 2018 17:19:09 +0000 Future directions for PGP https://lwn.net/Articles/742869/ https://lwn.net/Articles/742869/ flussence <div class="FormattedComment"> WKD is pretty awfully documented on the GnuPG site if you're a website owner wanting to make your pubkey visible. I found this howto[1] which makes it pretty straightforward. Would prefer to just use DNS records, but my DNS provider is somewhat crippled when it comes to extensions added in the past 10 years…<br> <p> [1]: <a href="https://gist.github.com/kafene/0a6e259996862d35845784e6e5dbfc79">https://gist.github.com/kafene/0a6e259996862d35845784e6e5...</a><br> </div> Thu, 04 Jan 2018 11:35:47 +0000 Keybase options https://lwn.net/Articles/742856/ https://lwn.net/Articles/742856/ craniumslows <div class="FormattedComment"> I really wish keybase didn’t implement features that require users to upload their private key. That said I like this service and use it to share my public key. It’s a neat idea. <br> </div> Thu, 04 Jan 2018 09:56:42 +0000 Keybase options https://lwn.net/Articles/742797/ https://lwn.net/Articles/742797/ dmarti <div class="FormattedComment"> You don't need to use social networks to share your key with Keybase. You can put a file on your web site. Example, for my blog:<br> <p> <a href="https://blog.zgp.org/.well-known/keybase.txt">https://blog.zgp.org/.well-known/keybase.txt</a><br> <p> This was easy to do. Keybase supports other fun features too, such as letting you share an encrypted directory with someone you know only by GitHub username.<br> </div> Thu, 04 Jan 2018 02:35:51 +0000 Usability https://lwn.net/Articles/742788/ https://lwn.net/Articles/742788/ ringerc <div class="FormattedComment"> The key issue with GnuPG it its (lack of) usability.<br> <p> Experienced software developers I work with often simply cannot get it right. People especially struggle with key creation / management / security / revocation.<br> <p> It's also often deliberately user-hostile, e.g. in terms of how much of a nightmare it is to script and automate.<br> <p> I don't see it getting far without a major rethink of how the user interacts with it.<br> </div> Thu, 04 Jan 2018 01:28:55 +0000 Future directions for PGP https://lwn.net/Articles/742743/ https://lwn.net/Articles/742743/ josh <div class="FormattedComment"> There's another interesting trust model for GPG, as well: Web Key Directory. If you want the key for foo@example.org, you can ask example.org for it via HTTPS. See <a href="https://wiki.gnupg.org/WKD">https://wiki.gnupg.org/WKD</a> .<br> </div> Wed, 03 Jan 2018 22:24:39 +0000