| ▲ | SahAssar 4 days ago | |||||||||||||||||||||||||
But if you use the modern crypto stuff you loose interoperability, right? What is the point of keeping the cruft of the format if you still won't have compatability if you use the modern crypto? The article mentions this: > Take AEAD ciphers: the Rust-language Sequoia PGP defaulted to the AES-EAX AEAD mode, which is great, and nobody can read those messages because most PGP installs don’t know what EAX mode is, which is not great. Other implementations also don't support stuff like Argon2. So it feels like the article is on point when it says > You can have backwards compatibility with the 1990s or you can have sound cryptography; you can’t have both. | ||||||||||||||||||||||||||
| ▲ | zimmerfrei 4 days ago | parent [-] | |||||||||||||||||||||||||
When you encrypt something, you are the one deciding which level of interoperability you want and you can select the crypto primitives matching capabilities you know you recipient reasonably have. I don't see anything special with this: when you run a web service, you also decide if you want to talk to TLS 1.0 clients (hopefully not). sequoia's defaults are reasonable as far as I remember. It's also bit strange that the post found it defaulted to using AEAD in 2019 when AEAD was standardized only in 2024 with RFC 9580. But the elephant in the room is that gpg famously decided to NOT adopt RFC 9580 (which Sequoia and Proton do support) and stick to a variant of the older RFC (LibrePGP), officially because the changes to the crypto were seen as too "ground-breaking". | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||