1. 14
  1.  

  2. 9

    threat models:

    • (A) no attacker
    • (B) passive adversary
    • (C) active adversary

    and

    • (A) is solved by plaintext email, which we all currently use.
    • (B) is solved by autocrypt
    • (C) is solved by GPG + keyservers/web of trust

    currently almost everybody uses A and almost nobody uses C.

    If we get lots of people using B it’s going to increase the cost of mass surveillance enormously. and may ease the transition to C significantly. This is a huge win.

    related: https://tools.ietf.org/html/rfc7435

    1. 5

      Found out about this software from HOPE. Talk is here https://livestream.com/accounts/9198012/hope/videos/177999980 but has extra content after.

      Looks very promising