2026年你需要了解的关于电子邮件加密的一切。
Everything You Need to Know About Email Encryption in 2026

原始链接: https://soatok.blog/2026/01/04/everything-you-need-to-know-about-email-encryption-in-2026/

## 加密邮件的徒劳 最近在PGP/GnuPG软件中发现的漏洞(详情见gpg.fail)重新引发了争论,但专家们已经 largely 放弃了追求真正安全的电子邮件。核心问题不仅仅是技术缺陷,而是电子邮件*运作方式*的根本性问题。 电子邮件是一个复杂的系统——信息传递、身份验证和群体沟通的混合体——本身缺乏安全性。虽然像PGP这样的加密试图保护内容,但元数据(收件人、主题行、时间戳)仍然暴露,提供了显著的跟踪潜力。即使加密成功,也容易因意外的“全部回复”错误而暴露明文。 此外,电子邮件基础设施依赖于DKIM,一个旨在防止垃圾邮件的系统,具有讽刺意味的是,它*证明*了消息的来源,从而否定了发送者的隐私。 至关重要的是,这个问题不能仅通过技术来解决。电子邮件的开放标准由一个寡头垄断控制,他们没有优先考虑隐私的动力,并且政府积极利用其漏洞进行监控。 诸如SMIMP之类的提议已经停滞。 最终,作者认为,电子邮件从根本上来说是不安全的——更像一张明信片而不是一封密封的信件——而加密尝试提供了一种虚假的安全性。 需要政治意愿的转变,但在当前的气候下不太可能实现。

## 电子邮件加密:黯淡前景 (Hacker News 讨论) 一篇关于电子邮件加密现状的博客文章引发了 Hacker News 的讨论,凸显了其固有的困难。许多评论者认为,目前结构下的电子邮件很可能“无法修复”,最好将其视为数字明信片。核心问题是缺乏实施必要变革的政治意愿。 讨论的解决方案包括 Delta Chat(一种“伪装成电子邮件的聊天隧道”,侧重于联邦/去中心化)以及使用 PGP 加密和 Thunderbird 等工具,但后者会引入摩擦和元数据泄露。一些人提倡完全放弃电子邮件,转而使用更安全的选项,如短信,但网络效应使得这样做很困难。 ProtonMail 被认为是在更广泛采用加密方面迈出的务实一步,尽管它存在局限性(例如不加密主题行和依赖服务器端密钥存储)。然而,一些用户对该服务表示不信任。最后,有人质疑,如果主题行不加密,为什么不直接通过年龄加密的附件进行交流。最终,共识是实现真正的电子邮件隐私需要多方面的努力,并接受固有的妥协。
相关文章

原文

If you think about emails as if they’re anything but the digital equivalent of a postcard–that is to say, postcards provide zero confidentiality–then someone lied to you and I’m sorry you had to find out from a furry blog that sometimes talks about applied cryptography.

At the end of 2025, at the 39th Chaos Communications Congress in Hamburg, Germany, a team of security researchers posted some devastating vulnerabilities in PGP software (with a focus on GnuPG), and published them at gpg.fail.

Note: They also discussed a minisign vulnerability and another attacking age’s plugin system, but these were much less severe than some of the GnuPG vulns.

This disclosure reignited message board debates about GnuPG, OpenPGP, and related topics. I’m not going to reiterate the many problems with PGP or what you should use instead.

Instead, I want to explain why cryptographers and security engineers that work on cryptography have largely abandoned any efforts to make “encrypted email” happen.

This post will probably annoy some technical people because I’m opting for clarity over precision when it comes to technical topics.

If something is factually incorrect, please feel free to email me and I will correct it. I’m certainly not immune to mistakes.

But if something is just “not precise enough”, that’s deliberate because I’m writing for a more general audience than engineers who specialize in your particular interest.

Why People Want to Encrypt Email

Email is not simple. Even before you get into protocol discussions, email is actually several things bundled into one software package:

  • The most basic mental model for email is an asynchronous “store-and-forward” message sent from you to other parties.
    • Not to mention the notion of Cc: and Bcc: fields.
  • Email addresses are an identity anchor for most of the Internet.
    • Forgot your password? Don’t worry, we’ll just… send you an email. Wow.
  • Mailing lists allow members of a group to send an email once and have everyone else receive an identical copy.

The way society uses email (at least in the United States, anyway) has conditioned everyone to treat email as more reliable than it actually is.

So it’s really no wonder that email is how most medical, legal, and financial workers operate in their day-to-day (assuming they aren’t using certified mail or fax machines).

But then the security nerds point out that:

  • SMTP, the protocol for sending email, rarely enforces TLS (if it’s even supported at all)
  • STARTLS, an opportunistic attempt to increase TLS usage for email protocols, is trivially stripped by active attackers
  • Emails are not end-to-end encrypted between inboxes

…it’s tempting to rush to PGP or S/MIME to reclaim a bit of privacy for your communications.

If that doesn’t make you feel all warm and fuzzy, remember that many industries still use FTP to transfer encrypted ZIP files back and forth in 2026.

Then, when even more security nerds point out how bad PGP and S/MIME are (EFAIL, gpg.fail, Why Johnny Can’t Encrypt, etc.), everyone gets frustrated.

How Email Encryption Fails

Let’s set aside all the security vulnerabilities for a moment and explore an extremely common failure mode.

Suppose you send some of your friends an encrypted email.

First, your friends need to have their own private/public key pairs and exchange public keys with each other.

In PGP land, this sometimes meant setting up a “key signing party” to attest to each other’s identities, so that others could see these vouches from the “Web of Trust”. (This was a really big thing right after the Snowden leaks.)

But for simplicity, let’s ignore PGP entirely.

Let’s say you do all this, and successfully begin sending encrypted emails. Hooray!

How long until one of them, in a hurry, hits “Reply All” without encrypting first?

This exact kind of failure happens all the time with encrypted email solutions.

And since email responses, by default, quote the thing they’re replying to, this kind of mistake can leak the entire message chain leading up to the mistake too.

One of the main reasons I recommend Signal over encrypted emails is because there is no plaintext mode to accidentally use.

But you can forward/screenshot Signal…

Sure, you can go out of your way to bypass the encryption if you want to. No one disputes that.

But what you cannot do with Signal is accidentally emit plaintext to the Internet by using the Reply feature.

With encrypted emails, the “accidentally disclose a bunch of plaintext” footgun is in the hot path of the user experience.

These are very different propositions of misuse and anyone that conflates them is being dishonest because they want to mislead you.

It Gets Worse, Of Course

One of the limitations of encrypting the message body of emails is that there is still a ton of metadata that gets transmitted in the clear (i.e., often without even transport-layer encryption).

If nothing else, a passive adversary learns the following:

  • The To: and Cc: fields (and, practically, always the Bcc: field)
  • The subject line for the email
  • Timestamps
  • Attachment metadata (file names, types)
  • DKIM signatures (more on that in a minute)
  • IP addresses (this one is included for completeness, since people forget about it)

But the subject line is the most critical. Users and software alike use the subject line to file replies into neat “threads”. (Yes, software has other mechanisms like In-Reply-To, but Subject is the fallback mechanism.)

Unfortunately, knowing the subject line and which person replied to whom at what point in time can tell you a lot even if you can’t read the message contents.

So now you’re forced to choose between perfect operational security discipline 100% of the time and using software in a totally normal way.

But that’s just metadata!

Nation-state spy agencies use metadata to decide who to kill.

If you care about privacy, you should never send this kind of extremely sensitive metadata in the clear.

Even if you take nation states off the table, private intelligence companies like Palantir and their international competitors are almost certainly up to no good.

“But the government isn’t coming after me!”

They don’t have to be coming after you to cause harm to you or the people in your life.

For starters, there are only so many degrees of separation between people.

Content warning:
Discussion of child abuse imagery in this section. (Skip)

This is a well-known phenomena among security nerds, but it’s rarely talked about: When law enforcement wants to infiltrate pedophile rings, they don’t need to harass private messaging app developers to demand a backdoor. Instead, they just need to look at the social graph and study how people are moving across it.

Metadata reveals people sharing CSAM and other contraband without even needing access to plaintext.

This is largely due to how these networks operate: In order to penetrate the deeper layers of worse abuse material, a prospective undercover agent would have to provide original abuse material (as a really fucked up sort of currency). This sort of gatekeeping and nomadic group chat behavior is a strong kind of compartmentalization that’s really easy to detect on the social graph.

When you give law enforcement (or private intelligence) a tool, it becomes Chekhov’s gun in their lives: Unless legally prohibited, given enough time, they will find a use for it in their other investigations.

Do you know who else has an interest in your [meta]data? Insurance companies. Metadata isn’t just about the government wielding state violence against nerds, and surveillance capitalism isn’t just about advertising and marketing.

Enter, Non-Repudiation

DKIM (RFC 4871), published in 2007, is an Internet Standard with near-universal adoption among email providers.

Without getting too technical, DKIM publishes a digital signature of every message sent from an email server. This signature was intended as an anti-spam measure, since the original email protocols were extremely permissive about senders.

In practice, this means that every email you send (even if it’s encrypted) has an additional layer of non-repudiation baked into it.

This means that, for example, every email you’ve ever sent through Gmail can be cryptographically proven to have been sent through Gmail’s servers. Even worse, this proof can be verified without Google’s involvement.

Non-repudiation is not a desirable property for private communications, as Ryan Castellucci explains in their blog post, DKIM: Show Your Privates.

This is the worst of all possible worlds

  1. You have virtually no email privacy. They’re like postcards, not envelopes.
  2. Anyone that sees your email can effectively prove you sent it (modulo your account or provider getting hacked).
  3. Even if you try to staple encryption onto your message contents, enough metadata gets leaked to still harm you.

At this point you might be wondering (especially if you work in tech), “Why hasn’t anyone tried to fix this?”

Edited to add: It’s also much worse than I spelled out here.

Email Cannot Be Salvaged

The main blockers for any proposal to fix email (updated RFCs, better use of encryption) have nothing to do with technology and everything to do with politics.

Repeat after me: all technical problems of sufficient scope or impact are actually political problems first.

Eleanor Saitta

Despite being an open protocol, email is (in practice) an oligopoly.

You cannot code your way out of social or political problems. Not directly, anyway.

Protocol Upgrades Have Been Proposed Before

At the very first year of the Crypto & Privacy Village at DEFCON (the year following the Snowden leaks), Adam Caudill proposed SMIMP as a way to make email secure and leak less metadata.

Neither SMIMP nor any other proposal to make emails private and secure have gained traction with the oligopoly that controls email, nor the governments that regulate them.

I need to emphasize, this isn’t due to a lack of awareness or effort. The big players have no incentive to change.

Setting aside that the “anti-regulation” party controls the United States right now, governments love to surveil their citizens..

Don’t believe me? Look no further than the EU’s recent Chat Control debacle for evidence of this. Just because a government launders their large-scale surveillance laws through the language of “keeping children safe” or “stopping terrorism” doesn’t mean that wasn’t their actual goal all along. The purpose of a system is what it does.

When you ask most people about privacy laws, they’ll blurt out something akin to “I have nothing to hide” and stop thinking about it entirely. You can draw a neat line between citizen apathy towards online privacy and the inertia on fixing email security by the big tech players.

Until the political climate changes, don’t count on email ever being fixed.

Privacy Tech Companies Are Not Silver Bullets

Please resist the temptation to think if you use a VPN service or a service like ProtonMail (which uses PGP) that you can magically be more secure than everyone else. It doesn’t work like that.

Here are some questions to ask yourself:

  1. How are secret keys managed?
  2. How are public keys managed? (Trust on first use, web of trust, etc.?)
  3. Where does the encryption take place, and where does that code come from?
  4. What doesn’t get encrypted? (Subject lines, etc.)
  5. How does this work for people not using the same service? Does everything silently downgrade to plaintext?

If you stare at any of these vendors for long enough, you’ll find that they provide at best a homeopathic level of privacy against any sophisticated adversaries.

TL;DR

Just don’t bother with email encryption. It’s a doomed effort.

I know that sounds rude or dismissive, but the situation is completely terrible and there’s no real political will to fix it. And you need political will to fix it.


Header art by CMYKat.

联系我们 contact @ memedata.com