Skip to content →

Lavabit is back!

The title pretty much says it all.  On Friday January 20, 2017 Ladar Levinson revealed that Lavabit is back and the new Dark Mail protocol is available.  I can’t tell you how HUGE this is.  The email system is broken.  And while most won’t understand this new protocol, all will benefit from it.

So let’s discuss why this is so important to just about everyone.  There are two parts to this thing to make it work.  First isDIME (Dark Internet Mail Environment).  This is what does all the heavy lifting.  The second is Magma, which is the mail server itself.

What is DIME?

Developed by Lavabit, DIME (Dark Internet Mail Environment) is an open source secure end-to-end communications platform for asynchronous messaging across the Internet. DIME follows in the footsteps of innovative email protocols, but takes advantage of the lessons learned during the 20-year history of PGP based encrypted communication. DIME is the technological evolution over current standards, OpenPGP and S/MIME, which are both difficult to deploy and only narrowly adopted. Recent revelations regarding surveillance have pushed OpenPGP and S/MIME to the forefront, but these standards simply can’t address the current privacy crisis because they don’t provide automatic encryption or protect metadata. By encrypting all facets of an email transmission (body, metadata and transport layer), DIME guarantees the security of users and the least amount of information leakage possible. A security first design, DIME solves problems that plague legacy standards and combines the best of current technologies into a complete system that gives users the greatest protection possible without sacrificing functionality.

The above statement comes from Lavabit.com.  And the most important thing out of the entire statement is that DIME encrypts all parts of the email(body, metadata and transport layer).  This in my opinion, is what we have been needing.  So much of our information can be gleamed from the metadata.  It’s this and the SSL certificates that the government and hackers want.  So by addressing and encrypting, and stripping the metadata, this has taken the guessing out of who the user or the identity of the person is.

What is Magma?

Magma is Lavabit’s open source, commercial-grade, and full-featured server ready for use with the Dark Internet Mail Environment. Magma is now ready for commercial implementation and will fundamentally change the way business transmits encrypted data. Whether you are an individual, SME, or corporate enterprise wanting your own DIME compatible server, the Lavabit technical team can assist with your implementation and development needs.

So to keep it simple.  DIME is the protocol that does all the voodoo, and Magma, is the mail server that does what a mail server is supposed to do.  Collect and send emails.  Again, that’s simply put.

Modes of Encryption

Lavabit provides 3 levels of encryption.  What is nice about this, is that it gives a user choices.  Yup, choices.  Unlike Gmail, or Hotmail, or Yahoo, where users have to accept that stuff is secure.  Well we know how well that worked out for people who utilized Yahoo’s service now don’t we?????

Having choices is what makes this so much better already.  Even before anything happens.  And I like that.  I like the fact that I can choose how I want to handle MY DATA!

Trustful Mode

For users who want a more secure email environment, but require the ability to use existing email software, we created Trustful mode. As the name suggests, Trustful mode requires users to “trust” the server to manage encryption. This mode ensures an ease of use, as users do not need to worry about technical requirements, or incompatibility with existing email clients. We envision Trustful mode as the mode of choice for businesses, which have regulatory requirements, data retention practices, and unique needs like escrow keys. Lavabit’s free and open source server, Magma, supports these users.

In Trustful mode, your key is within our server’s memory only while you are logged into the server. The server performs the encryption on your behalf, and as such, you must trust that the server will not be rewritten in such a way that it captures your password, or peeks at your messages during processing. This magic black box mode is no different from many other encryption systems, which perform encryption automatically. The only difference is where the encryption takes place. The key question is whether you are comfortable trusting the implementation to function securely. If you feel that trusting our servers to perform the encryption is unacceptable, we offer other modes of operation, Cautious or Paranoid.

As stated, this is the easiest way to go.  Kind of a “set it and forget it” mode.  This is best used if you just want to have encrypted emails and not worry about the fuss and muss of everything else!  Perfect for the family or small business.

Cautious Mode

Cautious mode is the first level of true end-to-end encryption, your key, used for encryption is only in plaintext within the memory of your device, be it phone, laptop, desktop, etc. The key is encrypted in your device and is transmitted encrypted to our servers. Here it is secure, we cannot encrypt it, and only store it encrypted in a space designated for your user account.

If you have your account on one phone and decide to also install the client software onto your laptop, you log into the system and can request your encrypted key from the server. Then on your laptop, using your passphrase, you can unlock the key and import it into the client software on your laptop. Only on the devices you control does your key exist in a format that it can be “seen”. We anticipate most users will use Cautious mode as it ensures you don’t have to trust your provider while ensuring your privacy is always under your control. Some users who believe they have a higher threat level and don’t want a key to exist anywhere in any format except on devices where they maintain ABSOLUTE technical control may prefer Paranoid mode.

Cautious mode is for those who are more what to take a bit more ownership of their encryption and want a more “hands-on” approach. While I will recommend this way to most businesses who actually have their own mail server, this is also a great place for those who actually enjoy dealing with code and want to make sure that they are fully secured.

Paranoid Mode

Paranoid mode is our most advanced and ultimate security mode. In Paranoid mode, your key never transmits anywhere; You maintain ABSOLUTE control. It is up to the user to move their key to any new device. If you create the original key within client software and wish to also use it on your phone, you must devise a secure method to move your key. This will allow you to export it to a file securely and encrypted. You can use a data cable or your own trusted digital method to copy the key to your new device. You can use a device to communicate for a period and then destroy the key or device, without a copy of the key stored. This renders all communication that that the key opened inaccessible from that point on. Paranoid mode is ultra-secure, however, requires technical proficiency in user key management.

Let’s just put this out here.  If you want this mode, then you are super crazy!  You are the guy who’s in the back of the house, who hasn’t taken a shower in weeks, chain smoking and worried that “those crazy government people” are coming to get you.  And that is AWESOME!   To have this amount of control over your data and your information and emails is just what the doctor ordered.  This is the top of the food chain in email security.

I love that there is this mode.  I love that I have this choice. Then I can be the one who dictates how things works.  Not someone or something else.

SSL anyone??

So the two things that the hackers or governments want, are the metadata and the SSL keys.  The metadata tells who is and gives information in a somewhat general context.  And I say that loosely. But, the SSL keys allow access.  SSL keys are the things that ensures privacy for the communication between clients/customers and servers/providers in online banking, shopping, and logins across the internet.And that is the part that is what you NEVER want to give out.  The government wanted Ladar to give up his SSL keys so that they could “act like Lavabit” and thus effectively do a Man in the Middle attack, without ever having to actually attack.

So how is Lavabit going to handle the SSL keys and all the stuff that is involved with it?  With DIME, Lavabit now has (3) new operational modes to secure all customers: Cautious, Trustful and Paranoid. For the Cautious and Paranoid modes, all communication is encrypted on the user’s device making TLS (Transport Layer Security) less relevant. Even with end-to-end encryption, TLS ensures a client is connected to the provider’s server and provides perfect forward security for network traffic. In Trustful mode, we have moved from the SSL key typically stored on the server to a secure hardware device. The former is an extremely common setting for many SSL enabled sites throughout the internet. We have installed FIPS 140-2 hardware security modules which allows us to use a TLS key without having to access it directly. Any attempt to extract the key will trigger a tamper circuit causing the key to self-destruct. The only account capable of extracting the key is the HSM supervisor. To prevent this we set the passphrase blindly thus locking us out. We suggest anyone not comfortable with trusting the provider to utilize the Cautious or Paranoid modes.

By making sure that the TLS key is 100% protected and because they are unable to retrieve it at any point and time, this assures that no one, not even the company itself can access it.  Thus keeping it from those who wish to have this piece of valuable information.

In conclusion

I am a big fan of what Ladar and Lavabit are doing.  I like the fact that it is open source.  I like the fact that it is taking email security/encryption to a totally different level.  I like how they give me choices on how I want to access my data.  I like how they are handling the TLS/SSL keys.  By actually rewriting the email protocol itself, they have done the one thing that no other entity can do.  And that is encrypt email properly and in a way that will make every email more secure.

Email isn’t going away anytime soon.  Even though applications and programs like Slack, Ryver, Google’s Hangouts do help reduce the amount of email a person might receive.  But let’s just call it like it is.  Email isn’t going anywhere!  DIME is here to change how encryption helps secure the one thing that contains most of our information.  It’s changing how things are secured and how those securities are kept.  Lavabit has finally brought forward something that everyone can utilize.  IF they are willing to change to something new.

And that is going to be the biggest detractor for most companies and people.  It’s new.  Untested.  And shakes things up.  So have the courage and see what it’s all about.  You can go here to read all about it. And if you want to really get into it, then go to the links below.

 

 

 

Published in Editoral