An Op-Ed piece from ArsTechnica:
Every once in a while, a prominent member of the security community publishes an article about how horrible OpenPGP is. Matthew Green wrote one in 2014 and Moxie Marlinspike wrote one in 2015. The most recent was written by Filippo Valsorda, here on the pages of Ars Technica, which Matthew Green says "sums up the main reason I think PGP is so bad and dangerous."
In this article I want to respond to the points that Filippo raises. In short, Filippo is right about some of the details, but wrong about the big picture. For the record, I work on GnuPG, the most popular OpenPGP implementation.
(Score: 3, Funny) by takyon on Monday December 26 2016, @01:02PM
They should change it to PAP: Pretty Alright Privacy.
I've only used PGP to communicate clunkily with a couple of other paranoids a couple of times. And as we know, the NSA is collecting encrypted messages so it can decrypt them later when it goes quantum and RSA goes down the toilet. And where's our 8192-bit keys, GnuPG?!
Get ProtonMail or something.
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 0) by Anonymous Coward on Tuesday December 27 2016, @03:42AM
(Score: 3, Interesting) by takyon on Tuesday December 27 2016, @04:13AM
An assertion based on what is available to you and not what the NSA and others can do, covertly. But there is no doubt that an 8192 bit key is more secure than 4096.
http://www.slate.com/articles/health_and_science/new_scientist/2014/04/mathematicians_at_the_nsa_and_gchq_is_it_ethical_to_work_for_spy_agencies.html [slate.com]
https://www.quora.com/Since-NSA-mathematicians-cannot-publish-or-speak-about-their-results-how-likely-is-it-that-the-NSA-has-mathematical-knowledge-exceeding-that-of-major-research-universities [quora.com]
https://www.nsa.gov/what-we-do/research/ [nsa.gov]
https://en.wikipedia.org/wiki/Key_size [wikipedia.org]
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]