Conversation

The lack of any higher level crypto primitives in the Swift standard library seems to have resulted in people just deciding to shell out to openssl to generate a CSR, which feels like an important lesson
5
125
Replying to
This feels like not *necessarily* the wrong implementation but I’d prefer the library that shells out to OpenSSL to be part of the Swift standard library
1
1
Replying to and
Involving unnecessary CLI interfaces and parsing in both directions is far worse than using it directly. It can be used in a separate process (which does not imply any isolation without further work) without involving the CLI interface if that was actually the goal.
1
11
Replying to and
gpgme is a library wrapping the CLI tools rather than a library used by the CLI tools. It's backwards. It's far from one of GPG's biggest issues. It's a legacy hobby project rather than serious or modern cryptography. PGP is highly flawed and GPG is a really bad implementation.
1
1
Replying to and
PGP is massively overly complex with cryptography choices and usage that are considered insecure. Key fingerprints inherently SHA-1 and there's a whole bunch of legacy cryptography algorithms and misuse even when trying to use modern algorithms with it.
1
2
It's increasingly less usable now that you shouldn't be using those key servers. GPG itself has a highly insecure implementation with immense complexity / attack surface and largely abandoned forks of cryptography code, etc. It's badly designed and written through and through.
2
2
The maintainers are highly hostile to security researchers reporting problems with the design / implementation and they've driven away people from doing it. Chances are you just get derided for telling them about a flaw rather than it being fixed, so people don't do much of that.
2