From 96a0fd00b1876f0e72d8f83e15c261115d2a0b4f Mon Sep 17 00:00:00 2001 From: Jameson Graef Rollins Date: Tue, 8 Apr 2014 13:31:45 +1700 Subject: [PATCH] Re: Feature suggestion. Indexing encrypted mail? --- 6d/207835a6d298074c9c70788d4b2f9a566e922a | 102 ++++++++++++++++++++++ 1 file changed, 102 insertions(+) create mode 100644 6d/207835a6d298074c9c70788d4b2f9a566e922a diff --git a/6d/207835a6d298074c9c70788d4b2f9a566e922a b/6d/207835a6d298074c9c70788d4b2f9a566e922a new file mode 100644 index 000000000..f982ea2da --- /dev/null +++ b/6d/207835a6d298074c9c70788d4b2f9a566e922a @@ -0,0 +1,102 @@ +Return-Path: +X-Original-To: notmuch@notmuchmail.org +Delivered-To: notmuch@notmuchmail.org +Received: from localhost (localhost [127.0.0.1]) + by olra.theworths.org (Postfix) with ESMTP id 240F0431FBC + for ; Mon, 7 Apr 2014 13:31:56 -0700 (PDT) +X-Virus-Scanned: Debian amavisd-new at olra.theworths.org +X-Spam-Flag: NO +X-Spam-Score: -2.3 +X-Spam-Level: +X-Spam-Status: No, score=-2.3 tagged_above=-999 required=5 + tests=[RCVD_IN_DNSWL_MED=-2.3] autolearn=disabled +Received: from olra.theworths.org ([127.0.0.1]) + by localhost (olra.theworths.org [127.0.0.1]) (amavisd-new, port 10024) + with ESMTP id YUNm+e8MJSG5 for ; + Mon, 7 Apr 2014 13:31:52 -0700 (PDT) +Received: from outgoing-mail.its.caltech.edu (outgoing-mail.its.caltech.edu + [131.215.239.19]) + by olra.theworths.org (Postfix) with ESMTP id 36EEC431FC2 + for ; Mon, 7 Apr 2014 13:31:51 -0700 (PDT) +Received: from fire-doxen.imss.caltech.edu (localhost [127.0.0.1]) + by fire-doxen-postvirus (Postfix) with ESMTP id BDD672E50DD1; + Mon, 7 Apr 2014 13:31:50 -0700 (PDT) +X-Spam-Scanned: at Caltech-IMSS on fire-doxen by amavisd-new +Received: from finestructure.net (gwave-217.ligo.caltech.edu + [131.215.114.217]) (Authenticated sender: jrollins) by fire-doxen-submit + (Postfix) with ESMTP id AB2672E50E3F; Mon, 7 Apr 2014 13:31:48 -0700 (PDT) +Received: by finestructure.net (Postfix, from userid 1000) + id 2D4D4600FF; Mon, 7 Apr 2014 13:31:48 -0700 (PDT) +From: Jameson Graef Rollins +To: Jeremy Nickurak +Subject: Re: Feature suggestion. Indexing encrypted mail? +In-Reply-To: + +References: <86k3b3ybo6.fsf@someserver.somewhere> + <878urj1z3j.fsf@maritornes.cs.unb.ca> + <87txa7pp8z.fsf@servo.finestructure.net> + <20140406091516.GG26903@vilya.m0g.net> + <5341D252.90405@fifthhorseman.net> + <867g71y327.fsf@someserver.somewhere> + <87ob0dnndk.fsf@servo.finestructure.net> + +User-Agent: Notmuch/0.17+174~gaa1f476 (http://notmuchmail.org) Emacs/24.3.1 + (x86_64-pc-linux-gnu) +Date: Mon, 07 Apr 2014 13:31:45 -0700 +Message-ID: <87d2gsop8u.fsf@servo.finestructure.net> +MIME-Version: 1.0 +Content-Type: multipart/signed; boundary="=-=-="; + micalg=pgp-sha256; protocol="application/pgp-signature" +Cc: Notmuch Mailing List , + Daniel Kahn Gillmor , + Daniel Kahn Gillmor +X-BeenThere: notmuch@notmuchmail.org +X-Mailman-Version: 2.1.13 +Precedence: list +List-Id: "Use and development of the notmuch mail system." + +List-Unsubscribe: , + +List-Archive: +List-Post: +List-Help: +List-Subscribe: , + +X-List-Received-Date: Mon, 07 Apr 2014 20:31:56 -0000 + +--=-=-= +Content-Type: text/plain + +On Mon, Apr 07 2014, Jeremy Nickurak wrote: +> Nonetheess, if you can tell from the index that a given message contains +> the words "hotel" "wine" "wife" "secret" and "rendezvous", you can infer a +> *lot* about the contents of encrypted contents of the message. + +Of course. Given that the content of the message will be stored +unencrypted in the db, indexing encrypted messages is potentially a foot +gun. If we were to enable a feature like this, it would definitely be a +user-beware situation. I don't see any way around that. + +jamie. + +--=-=-= +Content-Type: application/pgp-signature + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQIcBAEBCAAGBQJTQwsyAAoJEO00zqvie6q86ywP/i0qNabQugK9HptgO8ZhxaIh +ttyLC7Opi8iiwiP8Glkoa+8xEZ0FJHmK/Q5iK1km971SeGl5cuwYSC+n8dZ5hzi8 +MSjFKWlp5R/BL8CkL8QLF1JPJ66aOOsG7LoHENBqWDuJg3MAJAqvet2NYz60F0Gd +9KvfLe5RSiuNHqnEXzI3NRkyc0y5+DD97a+K/2Kjma1YX1phdqdUEoYlBsZ9PQlH +sJh/pzvVO+r7G/F1x/iYji7oMkSh4S8sF4WLED27mq7gFKHHd249YHCKFZVw50/T +GHE60OO/9JUa1kYBcsnCEfJ09Ogy25J960R7/Rh9v4sJMg2CRYFUY7PVBJn0zGgr +ddkm4v5zt6VcOw1nfGRduv+Y69u8haKPSILiMdP9385LDaI/zoUrcSXIbbUo4v0O +PPPYfah0fnl/zsceU7UgzHUBjoIsL+DdZFiHNBJUGsn3jDQsGDUbgaHVUULjj25Y ++gzAR0AniCoRVmm8KA6e8bgZyIzj/liYnW3f3g5je+Aen9Ruk0Vcn0CHpBGvn4vZ +yjPyjzxbVUmHnhDFTPOgjhbi23vzEVJ2En29dPtupiC7qF7EFxqarSUvl8V+E7QL +qetY7wXfsQQdEKn7KYE+mYFvIVelw0z+MJ4r7bMoO7ErEzxmRl1g59SAdPs2su1V +vSJ4mqUXy6Kbs0btHwhS +=WQ7K +-----END PGP SIGNATURE----- +--=-=-=-- -- 2.26.2