Comments (10)
Notes
- This is related to #59, which is about displaying encryption status in all other types of messages. It could make sense to wait until it is done to work on this one.
- We should split it in two, one for signature, one for encryption, unless there's a strong technical reason to do it.
Why we are doing it
Knowing after the fact if a given message I have sent is encrypted. Sent messages use a different wording than all others.
How do we know when it is done
When I open a message I have sent (in sent folder or in a tag), I can see messages telling me I have encrypted and/or signed the message or not. A table with the labels will be provided when the story is picked up. Look for @albogabriel or @lqust.
from pixelated-user-agent.
This can be done as soon as Duda's pull request is released.
from pixelated-user-agent.
This issue is connected with #17
We will have to deal with multiple outcomes for multiple recipients (ex. for recipient A it was possible to encrypt, for recipient B it wasn't possible to encrypt and for recipient C address doesn't exist, etc.)
from pixelated-user-agent.
So here is the situation:
Right now, it is possible to send an email to multiple recipients where not all of them have public keys available - resulting on encrypted mail for those that have a public key and plain text for those that don't (this is the default behaviour of leap mail).
To show the encryption information for the sender one option would be to say "This message was encrypted for some of the recipients" with the option to get more details on who got it plain and who got it PGP.
Other option would be to do not encrypt to the message anybody if at least one recipient doesn't have an available public key (this is harder to achieve given leap mail architecture).
Another option would be to not send the mail at all if at least one recipient doesn't have an available public key (easier to do since we can check for keys before entering leap mail code).
@olabini what you think? any other ideas?
from pixelated-user-agent.
So this is one of those cases where a holistic, coherent UX strategy around encryption and signing is necessary. My immediate reaction would be to say that allowing a person to send an email under these circumstances would be irresponsible. However, that depends on if we the user requires the encryption, or it's just a nice to have.
It's for questions like this where we need that whole experience designed - without taking current limitations of LEAP mail into account.
One alternative would be to have different profiles, such as
- Paranoid: never send email unless it can be encrypted to trusted/verified keys
- Prudent: never send email unless it can be encrypted (although it can be to unverified keys)
- Opportunistic/I don't care: do a best case effort, but don't fail if it doesn't work
These profiles could be choosable on an email-by-email basis as well.
Another alternative is to do something similar to Mailpile, which is to indicate which receivers we have encryption information on, before even pressing the send button.
I can't answer the question as such, since I think @albogabriel needs to design the experience. I would be unhappy if the opportunistic profile is the only available behavior.
from pixelated-user-agent.
My take on this, is that we might lose the confidence of the whole system
if we allow mixed encryption.
If we do an all or nothing approach, someone that receives an encrypted
mail can be somewhat confident that the contents of the email were always
encrypted (anyone who saw it was a recipient).
If we allow the mixed case, receiving an encrypted mail doesn't guarantee
that the contents of the mail could not be intercept on the way to someone
else (that didn't have a gpg key), the person will be suspicious of every
encrypt mail it receives with sensitive content.
I would say, if someone doesn't have a key, warn before sending and send it
only on plain text, so everyone that receives will know the information is
public anyway and react accordingly (or don't).
Bruno W.G.
[email protected]
On 13 February 2015 at 19:38, Ola Bini [email protected] wrote:
So this is one of those cases where a holistic, coherent UX strategy
around encryption and signing is necessary. My immediate reaction would be
to say that allowing a person to send an email under these circumstances
would be irresponsible. However, that depends on if we the user requires
the encryption, or it's just a nice to have.It's for questions like this where we need that whole experience designed
- without taking current limitations of LEAP mail into account.
One alternative would be to have different profiles, such as
- Paranoid: never send email unless it can be encrypted to
trusted/verified keys- Prudent: never send email unless it can be encrypted (although it
can be to unverified keys)- Opportunistic/I don't care: do a best case effort, but don't fail if
it doesn't workThese profiles could be choosable on an email-by-email basis as well.
Another alternative is to do something similar to Mailpile, which is to
indicate which receivers we have encryption information on, before even
pressing the send button.I can't answer the question as such, since I think @albogabriel
https://github.com/albogabriel needs to design the experience. I would
be unhappy if the opportunistic profile is the only available behavior.—
Reply to this email directly or view it on GitHub
#28 (comment)
.
from pixelated-user-agent.
Hey,
If we allow the mixed case, receiving an encrypted mail doesn't guarantee
that the contents of the mail could not be intercept on the way to someone
else (that didn't have a gpg key), the person will be suspicious of every
encrypt mail it receives with sensitive content.
You can't stop this from happening as long as you use an open system like GPG. Since someone could use Enigmail and send a mixed email, you
received it in Pixelated - and you have no idea which one it was. The responsibility here has to lie on the sender, not the receiver,
although we might think about introducing some kind of header that indicates whether the content was confidential to all receivers or
something. However, that's a complicated new feature.
Cheers
Ola Bini (https://olabini.se)
"Yields falsehood when quined" yields falsehood when quined.
from pixelated-user-agent.
Another alternative is to do something similar to Mailpile, which is to indicate which receivers we have encryption information on, before even pressing the send button.
I did some experiments around that today, see c52ce25
I like the profile idea though, it seems like a good way to include different kinds of user and make them understand what are the consequences of selecting each profile.
The responsibility here has to lie on the sender, not the receiver,
although we might think about introducing some kind of header that indicates whether the content was confidential to all receivers or
something. However, that's a complicated new feature.
That wouldn't be too complicated in our side, the problem here is to have the other MUAs implementing something to read that header and presenting that info to the user. If we understand that having the info in the message is already good for certain users that look at headers then this is something we should consider implementing for when the "Opportunistic/I don't care" profile sends mixed encryption (i'll just call it like that) messages.
from pixelated-user-agent.
#59 is closed. We still have problems with signatures ( #165 ) , so we could fix this one for encryption and create one for signatures?
from pixelated-user-agent.
We decided we will not monkey patch Leap for these features anymore, so we'll have this for free when we or leap add support directly in Leap mail. Closing this in the user agent since this doesn't make sense anymore
from pixelated-user-agent.
Related Issues (20)
- Retrieve webapp admins HOT 1
- Mailboxes created from within Pixelated are not compatible with Bitmask IMAP HOT 1
- Error: Attachment with 'None' id HOT 1
- Disable action buttons right after a request
- declare missing dependencies HOT 2
- use treq instead of requests HOT 1
- display inline attachments if they are of a recognized image type
- Plan postmorten @ face2face
- Logout is not present after login
- UnicodeEncodeError HOT 4
- deprecate the usage of requests HOT 2
- Change config path from ~/.leap/pixleated to ~/.config/leap/pixelated
- Long startup, only mails from before start
- Generated packages fail with leap.soledad.client._crypto.InvalidBlob HOT 4
- Error when running `vagrant up` HOT 17
- Tests fail with "ImportError: No module named multibackend" HOT 4
- Cannot generate GPG keys when using GPG 2.1 HOT 1
- Split node modules into production and development groups HOT 6
- Vagrant doesn't allow symlinks on shared folders HOT 1
- AttributeError: 'NoneType' object has no attribute 'checkcache'
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from pixelated-user-agent.