Anyone familiar with Safester? A friend of mine just wrote to me..
"While doing some early morning surfing, I came across yet another "better way to do email encryption" called "Safester".
"It is available for windows, linux, macOS, iOS and android.
"They publish their C# code on github so theoretically their stuff is open source. The free option has unlimited inbox size, but outbox is limited in size to 500MB.
"They apparently use openpgp for end to end encryption, and they use your existing email address, but their own servers for storage of the encrypted email content (ie. they are a cloud email storage server).
"They do NOT allow you to use your own PGP keys, though!!!
"Have you heard anything good/bad/ugly about it?
I'm giving it a go. It's actually not too bad. It's almost like Protonmail (they generate a key/pair in the background, they claim the passphrase is never on the server, and the messages and attachments
are stored encrypted on their server.) But unlike Protonmail, you
operate the system with a standalone DT program that they provide, and
get to use your existing email address of your choosing. (Protonmail creates an @protonmail.com address for you). And, ofcourse there are Android and iOS versions too.
Unlike Protonmail, there is no export of the keys to share or
adapt to another OpenGPG system.
You basically have to trust that all the security concerns on
the FAQ are legit.
They do however store the passphrase using a SHA-1 hashcode. I
thought SHA-1 was depricated.
I wonder if that could be an issue if their database of SHA-1 hashes
ever leaked.
Safester *is* different operationally. It doesn't use the internet
email system. Messages are only between client/server/ client.
No Linux DT version?
They do however store the passphrase using a SHA-1
hashcode. I thought SHA-1 was depricated.
It is considered no longer safe, afaik...
An attacker with enough resources could in theory find
some or all passwords. And of course that becomes
progressively easier in the future...
Safester *is* different operationally. It doesn't use
the internet email system. Messages are only between
client/server/ client.
So you can only exchange messages with other Safester
users.
You're not a good sales person for Safester! Because all
the things you mention make me not want to use it! ;-)
They do however store the passphrase using a SHA-1
hashcode. I thought SHA-1 was depricated.
It is considered no longer safe, afaik...
But does it matter so much if the keymanagement is local on the
client?
However, it is somewhat astonishing that SHA-1 was/is even used
in the design.
An attacker with enough resources could in theory find
some or all passwords. And of course that becomes
progressively easier in the future...
I am not impressed with the reports that people can process
millions of hashes per second using dedicated GPUs. So what if
the hashes are decoded. They can't do anything with them to
target millions of people enmasse anyway. I think they would
have to target SPECIFIC accounts and run the passwords one by
one.
In Safester, the decoded hash would reveal the passphrase, but
the decrypting of the messages would be useless without the
user's key which would reside in the local Safester prog or
app.
So you can only exchange messages with other Safester
users.
Yeah. :( But it's not as bad as it sounds! ;) I think that
may be better than forcing people to try DeltaChat as a 1st-
time venture into secure communications.
An attacker with enough resources could in theory find some or all
passwords. And of course that becomes progressively easier in the
future...
I am not impressed with the reports that people can process millions
of hashes per second using dedicated GPUs. So what if the hashes are decoded.
They can't do anything with them to target millions of people enmasse anyway. I think they would have to target SPECIFIC accounts and run
the passwords one by one.
In Safester, the decoded hash would reveal the passphrase, but the decrypting of the messages would be useless without the user's key
which would reside in the local Safester prog or app.
However, it is somewhat astonishing that SHA-1 was/is
even used in the design.
Indeed. Which makes you question if they made other
mistakes.
In Safester, the decoded hash would reveal the
passphrase, but the decrypting of the messages would be
useless without the user's key which would reside in the
local Safester prog or app.
Well if your life depended on it, would you rather use
Safester or Opengpg?
The biggest drawback to me is you depend on a commercial
company for your secure mail. What if someone pays them a
big sum for being able to eavesdrop on your
conversations, will they make a backdoor? What if they go
bankrupt? Is your mail lost forever?
Sysop: | StingRay |
---|---|
Location: | Woodstock, GA |
Users: | 29 |
Nodes: | 15 (0 / 15) |
Uptime: | 34:09:44 |
Calls: | 591 |
Calls today: | 1 |
Files: | 359 |
Messages: | 227,755 |
Posted today: | 1 |