{"id":25960,"date":"2014-09-16T05:40:44","date_gmt":"2014-09-16T09:40:44","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25960"},"modified":"2014-09-16T05:40:44","modified_gmt":"2014-09-16T09:40:44","slug":"open-source-project-promises-easy-to-use-encryption-for-email-instant-messaging-and-more","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/open-source-project-promises-easy-to-use-encryption-for-email-instant-messaging-and-more.php","title":{"rendered":"Open-source project promises easy-to-use encryption for email, instant messaging and more"},"content":{"rendered":"<p><p>    A    software development project launched Monday aims to create    free tools that simplify the encryption of online forms of    communication like email, instant messaging, SMS and more by    solving the complexity associated with the exchange and    management of encryption keys.  <\/p>\n<p>    Called    Pretty Easy Privacy (PEP), the projects goal is to integrate    the technology with existing communication tools on different    desktop and mobile platforms. The development team launched a    preview    PEP implementation Monday for the Microsoft Outlook email    client, but plans to build similar products to encrypt    communications in Android, iOS, Firefox OS, Thunderbird, Apple    Mail, Jabber, IRC (Internet Relay Chat), WhatsApp, Facebook    Messenger, Snapchat and Twitter.  <\/p>\n<p>    The PEP    developers launched a crowdfunding    campaign on Indiegogo to raise funds that would allow them    to set up a foundation to support the project and speed up the    development of the various implementations for different    platforms.  <\/p>\n<p>    While    most PEP software will be released under the GNU General Public    License version 3 and will be free to use, the team will also    develop business products that will be commercialized through a    new Luxembourg-based company called PEP Security.  <\/p>\n<p>    The PEP    engine relies on existing open-source technologies like GnuPG,    an implementation of the OpenPGP encryption standard; GNUnet, a    framework for decentralized, peer-to-peer networking; and    NetPGP, an OpenPGP implementation for platforms like iOS, where    GnuPG is not supported. However, its primary goal is to provide    no hassle privacy through a zero-touch user experience,    according to its developers.  <\/p>\n<p>    On    installation PEP automatically generates encryption keys for    the user or imports them from a local PGP client. It is also    able to discover the keys for the users communication partners    if they uploaded them on public keyservers or already sent    signed emails in the past. This means PEP will start encrypting    communications straight away with some users and works even if    the other side doesnt use PEP, but other PGP, S\/MIME or CMS    implementations.  <\/p>\n<p>    The    PEP engine is doing exactly what a hacker does when he or she    is using PGP: create a good keypair with reliable algorithms,    handle it safely, manage public keys of other people, and    operate the crypto solution in the best known way to keep it    safe, said Volker Birk, a German software architect and one of    the projects founders, in a blog    post.  <\/p>\n<p>    The PEP    plug-in for Outlook uses color-coded trust indicators for email    contacts. The default one is grey and signifies that encrypted    communication is not yet possible with the selected contact.    When the recipients keys are known and already in the    keystore, the trust indicator switches to yellow, which means    encrypted communication is possible, but potentially vulnerable    to man-in-the-middle attacks.  <\/p>\n<p>    In    order to achieve the highest level of protection, signaled by a    green indicator, the two parties need to exchange PEP-generated    safe words over the phone. Once this handshake is confirmed,    the communication is protected against all known attacks, the    PEP developers said on the projects Indiegogo page.  <\/p>\n<p>    The    technology does not rely on centralized infrastructure and uses    peer-to-peer technology for anonymous transport. When both    parties use it, its not just the content of messages that get    encrypted, but metadata like the subject line in the case of    emails.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2683332\/opensource-project-promises-easytouse-encryption-for-email-instant-messaging-and-more.html\/RK=0\/RS=OZHjmGbVX.sdyiTTBA7obIijU50-\" title=\"Open-source project promises easy-to-use encryption for email, instant messaging and more\">Open-source project promises easy-to-use encryption for email, instant messaging and more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A software development project launched Monday aims to create free tools that simplify the encryption of online forms of communication like email, instant messaging, SMS and more by solving the complexity associated with the exchange and management of encryption keys. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25960","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25960"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25960"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25960\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}