The PGP problem (2019)

New vulnerabilities and project responses

  • Thread resurfaces the article due to recent CCC “gpg.fail” issues.
  • GnuPG is criticized for declaring some serious bugs “out of scope”/WONTFIX; others are patched but not yet widely shipped.
  • Minisign and age were also affected by some findings, but minisign’s issue is described as much less severe and quickly fixed; the age issue was a simple path-sanitization bug, not cryptographic.
  • Several comments stress that the key security criterion is how maintainers handle bugs, not bug-free code; age’s use of Discord as a primary contact is seen as a bad look.

Replacing PGP/GnuPG: practicality and use cases

  • Many agree age + minisign provide a cleaner stack that covers common needs (file encryption, signing, backups, commit signing), but ecosystem support (e.g. Git forges) lags.
  • One recurring theme: PGP is hard to get rid of because distros and tooling assume it; shipping minisign by default is suggested to break the chicken-and-egg problem.
  • Some users note PGP’s flaws feel “esoteric” compared to their modest threat models; for them, migration pain outweighs theoretical benefits.

Web of Trust, key discovery, and centralization

  • Web of Trust is called “security theater” by some; others point to new designs based on key transparency logs rather than WoT.
  • Keyservers are argued to have mostly “solved” simple key distribution, though modern efforts try to make this auditable and extensible (e.g., auxiliary data for age/minisign/SSH keys).
  • Debate over centralization: one side says E2EE should make server trust irrelevant; the other emphasizes availability and censorship (centralized systems can be blocked, e.g., Signal in some countries).

Sequoia and “modern” OpenPGP vs moving on

  • Some argue the article mostly attacks GnuPG, not PGP, and promote Sequoia (Rust, modern crypto, AEAD, Argon2, PQC) as a sane OpenPGP implementation.
  • The counterargument: once you use new features that break compatibility with most existing PGP clients, you’ve sacrificed the main remaining benefit (interoperability), so you may as well adopt non-PGP tools.
  • There’s disagreement over whether OpenPGP’s 1990s design is “dangerous and antiquated” or merely ugly but serviceable.

Alternatives and their downsides

  • Suggested replacements: Signal (messaging), age (file encryption), minisign/ssh/Sigstore (signing), restic/gocryptfs/age for backups, magic-wormhole for ad‑hoc file transfer.
  • Critiques: some are centralized, require phone numbers, or depend on proprietary infrastructure; availability under blocking and lack of distro integration are concerns.
  • Signal specifically is debated: its cryptography and clients are said to be open source and solid, while others highlight MobileCoin, broken reproducible builds, Google dependencies, and a centralized, number‑tied model as trust and privacy issues.

Email, UX, and protocol design

  • A major line of criticism is that encrypted email (with PGP) is structurally unsafe: users routinely break confidentiality by replying in plaintext, and the protocol doesn’t enforce secure behavior.
  • Some insist this is a client/UI issue; others respond that any protocol relying on clients to “opt in” to security is broken by design.
  • There’s also discussion of MDC/integrity handling (EFAIL vs gpg.fail), with disagreement over whether GnuPG’s error behavior is defensible or dangerously lax.

Complexity, simplicity, and real-world threat models

  • GPG and OpenSSL are seen as huge, complex, and full of “footguns”; minisign/signify are praised for single‑algorithm simplicity (Ed25519) and small attack surface.
  • Others report GPG “just works” for them and question whether the article’s examples (e.g., forwarded plaintext) justify abandoning a tool that appears to have resisted state-level adversaries in practice.
  • Overall, the thread reflects a split: one camp pushing to abandon PGP in favor of narrowly scoped modern tools, another emphasizing PGP’s versatility, installed base, and acceptable security when carefully used.