Conversation

The lack of any higher level crypto primitives in the Swift standard library seems to have resulted in people just deciding to shell out to openssl to generate a CSR, which feels like an important lesson
5
125
Replying to
This feels like not *necessarily* the wrong implementation but I’d prefer the library that shells out to OpenSSL to be part of the Swift standard library
1
1
Replying to and
Involving unnecessary CLI interfaces and parsing in both directions is far worse than using it directly. It can be used in a separate process (which does not imply any isolation without further work) without involving the CLI interface if that was actually the goal.
1
11
Replying to and
gpgme is a library wrapping the CLI tools rather than a library used by the CLI tools. It's backwards. It's far from one of GPG's biggest issues. It's a legacy hobby project rather than serious or modern cryptography. PGP is highly flawed and GPG is a really bad implementation.
1
1
Replying to and
PGP is massively overly complex with cryptography choices and usage that are considered insecure. Key fingerprints inherently SHA-1 and there's a whole bunch of legacy cryptography algorithms and misuse even when trying to use modern algorithms with it.
1
2
The key system is overly complex and misguided. It's based on incredibly strange ideas about transitive trust not aligned with reality. In practice, it's also very dangerous to import keys into GPG and the normal key server system ended up being totally insecure / broken too.
1
3
The maintainers are highly hostile to security researchers reporting problems with the design / implementation and they've driven away people from doing it. Chances are you just get derided for telling them about a flaw rather than it being fixed, so people don't do much of that.
2