Re: [BASE-Trustee] Email encryption
Yes, but the problem with those solutions are that they add complexity to your system. When I say system, I mean everything from the house that your computer is in to the little microcontroller on your motherboard that's in charge of a couple of LEDs, to the software you're using from circuit firmware to application level software.
Last year at the CCC in Berlin, a guy demonstrated how you could use a wire inside the computer (I think it was a wire for some status LED) for RF-emissions to create a hidden channel. Of course, the strength of such a signal is not that great but it makes you think a lot about the possibilities.
A couple of years ago, I played around with a piece of software written by a german guy ( http://www.erikyyy.de/tempest/ ). It basically turns your CRT monitor into an AM transmitter. Makes you think. There's a lot of things inside your computer that can be made to transmit information.
Over at work, they showed us these information security movies from the late eighties complete with data tapes, 5.25' floppies and everything. Now this was before everything got complicated, right. Even back then they where able to read CRT monitors remotely. It's called RÖS over here, you might want to do a search for compromising emissions on google.
Also, if you use VPN tunnels or other kinds of proxy tech you need to be aware that, while it might make you more anonymous to your peers, you hand over the control of your information to an unknown third party. It's bad enough your traffic has to pass through your ISP, now it passes through some computer that tells you "hey, if you got stuff to hide, let me hide it for you. I promise I won't look at anything." Well, you see the problems here.
I did a little research a couple of years ago. I wrote a socks5 server (a kind of proxy server), deployed it and published the IP on various proxy lists. within minutes, very interesting traffic was passed through my computer. There was another guy some time ago who set up a TOR exit node and sniffed the traffic, he got stuff from embassies and corporations. People didn't realize anonymity is not the same as security.
Let's say you use PGP mail and you use an open implementation like gnupg that can be trusted. You verified the hashes to make sure that your download wasn't tampered with along the way. You use this application on a computer that you also use for surfing the web. Now we all know web browsers don't have the cleanest record when it comes to security. Add all the shit like Flash, stuff like the GDI+ bug of '05 and you realize that there's a lot of ways for people to enter your computer. Hell, microsoft released a remote vuln report on their TCP/IP implementation a couple of month ago. Who else knew?
So you use a pgp implementation on a system like that. You think it's secure? It's not secure. And then you hand your traffic over to untrusted third parties. Security is not about the applications you run, it's a complete concept.
What you need is a machine not hooked up to anything. Not even a wall socket. It must not be allowed to comunicate with the outside world at all. Copper mesh cage as in "Enemy of the State". A power generator too. Diesel. And you need a simple machine. You can build your own with TTL logic, but that might be a bit too much. A microcontroller based design (avr or arm are good) or something FPGA based will probably do. Have an SD card slot on it, a keyboard and a minimal display (like an HD44780 or a cheap Nokia display). Make that two SD slots, one for the keys and one for the outgoing (encryped and signed) data. Make sure the hardware cannot be tampered with in any way (easier said than done, physical security is hard work too). Make sure the keys are protected.
After a while of thinking like this, you'll either become an insane conspiracy theorist or you'll say "fuck it" and realize there are more fun things in life to care about.
But a little security might be better than none :)