Colin Arnott

My feedback

  1. 1 vote
    Vote
    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  General  ·  Admin →
    • 6 votes
      Vote
      Sign in
      Check!
      (thinking…)
      Reset
      or sign in with
      • facebook
      • google
        Password icon
        Signed in as (Sign out)
        You have left! (?) (thinking…)
        1 comment  ·  General  ·  Admin →
      • 57 votes
        Vote
        Sign in
        Check!
        (thinking…)
        Reset
        or sign in with
        • facebook
        • google
          Password icon
          Signed in as (Sign out)
          You have left! (?) (thinking…)
          9 comments  ·  General  ·  Admin →
          Colin Arnott commented  · 

          I support this feature request, but for now you could use a folder to implement it.

        • 9 votes
          Vote
          Sign in
          Check!
          (thinking…)
          Reset
          or sign in with
          • facebook
          • google
            Password icon
            Signed in as (Sign out)
            You have left! (?) (thinking…)
            1 comment  ·  General  ·  Admin →
            Colin Arnott supported this idea  · 
          • 755 votes
            Vote
            Sign in
            Check!
            (thinking…)
            Reset
            or sign in with
            • facebook
            • google
              Password icon
              Signed in as (Sign out)
              You have left! (?) (thinking…)
              under review  ·  18 comments  ·  General  ·  Admin →
              Colin Arnott commented  · 

              I agree and would love to see this feature, but could see a use case for an alias with the same identity:

              Give address 0 to good friends, and address 1 to everyone else; let address 0 pass directly to your inbox and filter address 1 to an unimportant folder.

              This is especially useful for automated services, you can have an address junk@example.com and sign up for spammy mailing lists without worrying about too much distracting mail.

            • 5 votes
              Vote
              Sign in
              Check!
              (thinking…)
              Reset
              or sign in with
              • facebook
              • google
                Password icon
                Signed in as (Sign out)
                You have left! (?) (thinking…)
                1 comment  ·  General  ·  Admin →
                Colin Arnott commented  · 
              • 0 votes
                Vote
                Sign in
                Check!
                (thinking…)
                Reset
                or sign in with
                • facebook
                • google
                  Password icon
                  Signed in as (Sign out)
                  You have left! (?) (thinking…)
                  1 comment  ·  General  ·  Admin →
                  Colin Arnott commented  · 

                  In the same vein, it would be nice if you could add a pgp signature and date stamp, as can be seen in the document that riseup.net provides: https://help.riseup.net/en/canary

                • 13 votes
                  Vote
                  Sign in
                  Check!
                  (thinking…)
                  Reset
                  or sign in with
                  • facebook
                  • google
                    Password icon
                    Signed in as (Sign out)
                    You have left! (?) (thinking…)
                    0 comments  ·  General  ·  Admin →
                    Colin Arnott shared this idea  · 
                  • 5 votes
                    Vote
                    Sign in
                    Check!
                    (thinking…)
                    Reset
                    or sign in with
                    • facebook
                    • google
                      Password icon
                      Signed in as (Sign out)
                      You have left! (?) (thinking…)
                      under review  ·  2 comments  ·  General  ·  Admin →
                      Colin Arnott commented  · 

                      This may be non-trivial to implement on its own, and gpg support could be simpler.

                    • 4 votes
                      Vote
                      Sign in
                      Check!
                      (thinking…)
                      Reset
                      or sign in with
                      • facebook
                      • google
                        Password icon
                        Signed in as (Sign out)
                        You have left! (?) (thinking…)
                        2 comments  ·  General  ·  Admin →
                        Colin Arnott commented  · 

                        I think this would be best implemented as a subset of inbox rules: https://tutanota.uservoice.com/forums/237921-general/suggestions/6858986-2-factor-authentication

                        That way users can truly have granularity of control over their mail routing.

                      • 5 votes
                        Vote
                        Sign in
                        Check!
                        (thinking…)
                        Reset
                        or sign in with
                        • facebook
                        • google
                          Password icon
                          Signed in as (Sign out)
                          You have left! (?) (thinking…)
                          5 comments  ·  General  ·  Admin →
                          Colin Arnott commented  · 
                        • 41 votes
                          Vote
                          Sign in
                          Check!
                          (thinking…)
                          Reset
                          or sign in with
                          • facebook
                          • google
                            Password icon
                            Signed in as (Sign out)
                            You have left! (?) (thinking…)
                            under review  ·  8 comments  ·  General  ·  Admin →
                            Colin Arnott commented  · 

                            You are aware that this article is discussing the use of quantum computers. Since these do not exist this, for the time, is a moot point. It is also known that most modern crypto is broken with quantum computing.

                            Colin Arnott commented  · 

                            While your article is informative, I think you have the wrong take away message and it seems like you did not read many parts:

                            0) the only NIST standard that is known to be compromised is the Dual Elliptic Curve Deterministic Random Bit Generator; and "Researchers have warned since 2007 that Dual_EC_DRBG has a serious weakness".

                            1) "Silent Circle's new decision ... doesn't mean that these standards are insecure"

                            2) even Silent Circle is not moving away from ECC: "Silent Circle plans to replace the P-384 elliptic curve with one or more curves that are being designed by cryptographers Daniel Bernstein and Tanja Lange"

                            Now, if you read through all the comments to this request, you will notice that I never suggested any NIST curves be used. This is because for me too, "the spell is broken". Of curves that I proposed [Curve1174, Curve25519, Curve383187, Curve41417], Curve1174, Curve25519, and Curve41417] were designed by the same "Daniel Bernstein and Tanja Lange" that Silent Circle is using. So correct me if I am wrong, but I believe I am suggesting curves from the same subset that Silent Circle is using.

                            There are several other considerations that you can use when selecting a good curve and there are such things as secure or safe elliptic curves. For this, I once again direct anyone to [ http://safecurves.cr.yp.to/ ] for a more in depth analysis by PhDs.

                            Furthermore, ECC is based on a difficult maths problem [discrete logarithm] in the same way that RSA is based on a difficult maths problem [prime number factoring]. While the two problems are likely not of the same difficulty, they are both hard enough that current computational methods cannot solve current implementations. So, it is not as though one was weakened by the NSA. As well the discrete logarithm problem is used elsewhere in crypto [diffie-helman key exchanges], so there is twice the implementation to find possible flaws.

                            Colin Arnott supported this idea  · 
                            Colin Arnott commented  · 

                            While any ecc curve can be used, you should really look into cryptographically secure curves. I would advise the following curves based on your key-size preference: [Curve1174, Curve25519, Curve383187, Curve41417] See the following for more information about why to NOT use NIST and some other curves: <http://safecurves.cr.yp.to/>.

                            Colin Arnott shared this idea  · 
                          • 38 votes
                            Vote
                            Sign in
                            Check!
                            (thinking…)
                            Reset
                            or sign in with
                            • facebook
                            • google
                              Password icon
                              Signed in as (Sign out)
                              You have left! (?) (thinking…)
                              2 comments  ·  General  ·  Admin →
                              Colin Arnott commented  · 
                            • 16 votes
                              Vote
                              Sign in
                              Check!
                              (thinking…)
                              Reset
                              or sign in with
                              • facebook
                              • google
                                Password icon
                                Signed in as (Sign out)
                                You have left! (?) (thinking…)
                                1 comment  ·  General  ·  Admin →
                                Colin Arnott commented  · 

                                This would work for users that only send unencrypted email, but seems difficult at best to do for encrypted mail.

                              • 2 votes
                                Vote
                                Sign in
                                Check!
                                (thinking…)
                                Reset
                                or sign in with
                                • facebook
                                • google
                                  Password icon
                                  Signed in as (Sign out)
                                  You have left! (?) (thinking…)
                                  2 comments  ·  General  ·  Admin →
                                  Colin Arnott commented  · 

                                  I agree their use of aliases is confusing and could lead to some issues, and they should work on making clear what is happening to the user. But I would caution you that if you need that level of privacy/security you should be more careful.

                                  Also, they have hidden the encryption from the client, so as to make the user experience cleaner, but you can confirm that it is working by inspecting the source code and the data that is being transmitted to their servers.

                                • 1 vote
                                  Vote
                                  Sign in
                                  Check!
                                  (thinking…)
                                  Reset
                                  or sign in with
                                  • facebook
                                  • google
                                    Password icon
                                    Signed in as (Sign out)
                                    You have left! (?) (thinking…)
                                    1 comment  ·  General  ·  Admin →
                                    Colin Arnott commented  · 

                                    To be clear, you would like an additional layer of encryption for some select mail messages?

                                    Also, what is your use case and who is the adversary that you are protecting from with this additional encryption?

                                  • 7 votes
                                    Vote
                                    Sign in
                                    Check!
                                    (thinking…)
                                    Reset
                                    or sign in with
                                    • facebook
                                    • google
                                      Password icon
                                      Signed in as (Sign out)
                                      You have left! (?) (thinking…)
                                      2 comments  ·  General  ·  Admin →
                                      Colin Arnott commented  · 

                                      Remember that all this must be done client side, due to the client side encryption.

                                      As such, a pdf viewer is somewhat redundant because most browsers have one built in already. side note: tutao could build in code that leveraged this viewer and did not force a page reload.

                                      The display of *.docx files and any other formats you would like would be doable, but would likely come with sizeable delays due to crypto and the client side nature. Conversion too is feasible, but could be painfully slow for the same reasons.

                                    • 1 vote
                                      Vote
                                      Sign in
                                      Check!
                                      (thinking…)
                                      Reset
                                      or sign in with
                                      • facebook
                                      • google
                                        Password icon
                                        Signed in as (Sign out)
                                        You have left! (?) (thinking…)
                                        1 comment  ·  General  ·  Admin →
                                        Colin Arnott commented  · 

                                        This is almost impossible for content that is encrypted, but could be implemented on plain text mail. However, even gmail who should have some protection like this has trouble archive files as a malicious vector looks very different when compressed.

                                        This is something that really should be pushed to the user. If you get a shady link [ file.doc.exe ] from an unknown email: do not open it. There is no way to write code to scan for all the viruses, and frequently I have been encumbered by virus tools, not benefited.

                                        However, of there is a security issue to tutao's software [eg. a file that does malicious things automatically due to shortcomings in tutao's code], that is something that should be fixed.

                                      • 944 votes
                                        Vote
                                        Sign in
                                        Check!
                                        (thinking…)
                                        Reset
                                        or sign in with
                                        • facebook
                                        • google
                                          Password icon
                                          Signed in as (Sign out)
                                          You have left! (?) (thinking…)
                                          42 comments  ·  General  ·  Admin →

                                          Thank you all for your feedback. Please let us explain in more detail why we don’t plan to add pgp-support at the moment:

                                          Current encryption standards like pgp and S/MIME have several issue that we plan to address with Tutanota. These standards do not support forward secrecy and are not resistant to attacks from quantum computers.

                                          In addition, it is important to us that the subject line in emails is also encrypted. That’s why we have developed a solution that is also based on recognized algorithms (RSA and AES) and that automatically encrypts the subject, the content and the attachments. In the future, we plan to upgrade these algorithms to quantum-resistant ones that also support forward secrecy.

                                          We also see the importance that Tutanota needs to be interoperable with other encryption solutions. We will develop an API so that Tutanota users can communicate with users of other…

                                          Colin Arnott supported this idea  · 
                                          Colin Arnott commented  · 
                                        • 402 votes
                                          Vote
                                          Sign in
                                          Check!
                                          (thinking…)
                                          Reset
                                          or sign in with
                                          • facebook
                                          • google
                                            Password icon
                                            Signed in as (Sign out)
                                            You have left! (?) (thinking…)
                                            5 comments  ·  General  ·  Admin →
                                            Colin Arnott commented  · 

                                            This is PFS for messages, not for TLS.

                                            It should be noted that DANE gives better security by pinning the TLS cert to the DNS tree, but on its own does not give PFS. PFS occurs at the TLS level, and only diffie-helman TLS key exchange mechanisms support PFS: plain DHE and elliptic curve ECDHE.

                                            Colin Arnott shared this idea  · 

                                          Feedback and Knowledge Base