A couple days ago, one of the first reviews of ProtonMail showed up on the web, the review I’m referring to can be found here:
http://www.hacker10.com/other-computing/review-encrypted-email-service-protonmail-ch/
We were actually a bit surprised to see this since ProtonMail is still in a very limited beta. At the moment, ProtonMail accounts are still relatively exclusive since we haven’t fully opened up a public beta yet.
Anyways, returning to the review, we found it to be fair but at the same time a bit troubling because a number of the characteristics of ProtonMail we were faulted for were actually things we had intentionally built in. It was almost as if the reviewer had missed the point of ProtonMail.
Upon reflection, this is not the fault of the reviewer, it seems we have never fully explained the design philosophy behind ProtonMail. So briefly below, I will lay out our main objectives while responding to some criticism made by our very first reviewer.
1. Make encryption easy to use.
In truth, there is not a whole lot that ProtonMail does that is not already accomplished by PGP, at least from a security standpoint. But, to quote what Bruce Schneier said to us when he visited MIT, “all PGP has demonstrated is that even one click is too much”.
Basically, security is not useful if it is not easy enough for mass adoption. It is simply difficult to convince people to adopt a higher standard of security if it forces them to do more work. So from day one, the principle guiding our architecture was that the end product cannot be more complex than Gmail.
And in the end, I think we have accomplished that. Encryption in ProtonMail is end-to-end, like PGP, but at the same time, completely invisible to both recipient and sender. What we gave up to accomplish that however, and what the reviewer faulted us for, is compatibility with PGP. In effect, we cannot easily abstract away the complexity of a system like PGP while maintaining backwards compatibility with it.
The keyword in the above sentence actually is ‘easily’. It is actually possible in our architecture to support PGP, but in the end, we decided this was less of a priority because our end goal is a more secure internet. The current users of PGP already benefit from end-to-end encryption and don’t need our help. What we really want to provide is privacy for the much larger segment of the population that isn’t sophisticated enough to use PGP.
2. Trust the user not to be stupid.
Our reviewer pointed out that we don’t have a password length requirement, and we don’t have an auto logout. I think it is common knowledge nowadays that you using a password like ’1234′ or ’1111′ is NOT a good idea. But it is also NOT a good idea to force a user to use a password like ‘yYbkza#NGMeAW_kE21fxeQbB’. At that point, a user would simply find ProtonMail too much of a hassle to use. What we try to do is take the middle road. When you go to set your password when creating your ProtonMail account, we will tell you whether your password is strong or weak, and then let the user make the final decision. Our philosophy here is simple, we trust that our users are not stupid, but we’re not going to turn you away either if you are stupid.
As for the auto logout….early Alpha builds of ProtonMail had a 10 minute auto logout. As somebody who was using it day in and day out for all of my email communications, you should trust me when I say a 10 minute logout is incredibly annoying and does NOT enhance the product.
3. Give the user control
The reviewer pointed out that encrypted messages to outside users do not instantly destruct. This again, is intentional. Instead of instant destruction, we give the sender control over when they want the message to destruct (or if they want it to destruct at all). So you can fine tune the time for each email. Right now, the minimum is 1 hour from the time the message is sent, but in the future, we will also be adding the option for instant destruction once the message is read.
And, one final loose end…
The reviewer pointed out that we are not audited by third parties. Actually, we have been audited by the computer security staff at CERN (European Center for Nuclear Research), that’s actually where half of our developers work. But better yet, you can audit ProtonMail yourself. Our front-end JavaScript encryption/decryption codes are sent to browsers uncompressed, a simple view source and you can see our source code!
We look forward to continuing to improve ProtonMail so don’t hesitate to send us comments or suggestions!
Read More