{"id":9946,"date":"2017-09-10T06:07:01","date_gmt":"2017-09-10T06:07:01","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=9946"},"modified":"2017-09-11T06:10:31","modified_gmt":"2017-09-11T06:10:31","slug":"the-only-safe-email-is-text-only-email","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/the-only-safe-email-is-text-only-email\/","title":{"rendered":"The only safe email is text-only email"},"content":{"rendered":"<p><span><a href=\"https:\/\/theconversation.com\/profiles\/sergey-bratus-392060\">Sergey Bratus<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/dartmouth-college-1720\">Dartmouth College<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/anna-shubina-403945\">Anna Shubina<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/dartmouth-college-1720\">Dartmouth College<\/a><\/em><\/span><\/p>\n<p>It\u2019s troubling to think that at any moment you might open an email that looks like it comes from your employer, a relative or your bank, only to fall for a <a href=\"http:\/\/gizmodo.com\/a-huge-and-dangerously-convincing-google-docs-phishin-1794888973\">phishing<\/a> <a href=\"http:\/\/gizmodo.com\/beware-of-this-dangerously-convincing-google-docs-phish-1546278702\">scam<\/a>. Any one of the endless stream of innocent-looking emails you receive throughout the day could be trying to con you into handing over your login credentials and give criminals control of your confidential data or your identity.<\/p>\n<p>Most people tend to think that it\u2019s <a href=\"https:\/\/theconversation.com\/cybersecuritys-weakest-link-humans-57455\">users\u2019 fault<\/a> when they fall for phishing scams: Someone just clicked on the wrong thing. To fix it, then, users should just <a href=\"https:\/\/theconversation.com\/before-decrying-the-latest-cyberbreach-consider-your-own-cyberhygiene-37834\">stop clicking on the wrong thing<\/a>. But as security experts who study malware techniques, we believe that thinking chases the wrong problem. <\/p>\n<p>The real issue is that today\u2019s web-based email systems are electronic minefields filled with demands and enticements to click and engage in an increasingly responsive and interactive online experience. It\u2019s not just Gmail, Yahoo mail and similar services: Desktop-computer-based email programs like Outlook display messages in the same unsafe way. <\/p>\n<p>Simply put, safe email is plain-text email \u2013 showing only the plain words of the message exactly as they arrived, without embedded links or images. <a href=\"http:\/\/cromwell-intl.com\/cybersecurity\/html-email.html\">Webmail is convenient for advertisers<\/a> (and lets you write good-looking emails with images and nice fonts), but carries with it unnecessary \u2013 and serious \u2013 danger, because a webpage (or an email) can easily show one thing but do another.<\/p>\n<p>Returning email to its origins in plain text may seem radical, but it provides radically better security. Even the <a href=\"https:\/\/www.us-cert.gov\/\">federal government\u2019s top cybersecurity experts<\/a> have come to the startling, but important, conclusion that any person, organization or government serious about web security should <a href=\"https:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf#page=53\">return to plain-text email<\/a>:<\/p>\n<blockquote>\n<p>\u201cOrganizations should ensure that they have disabled HTML from being used in emails, as well as disabling links. Everything should be forced to plain text. This will reduce the likelihood of potentially dangerous scripts or links being sent in the body of the email, and also will reduce the likelihood of a user just clicking something without thinking about it. With plain text, the user would have to go through the process of either typing in the link or copying and pasting. This additional step will allow the user an extra opportunity for thought and analysis before clicking on the link.\u201d<\/p>\n<\/blockquote>\n<h2>Misunderstanding the problem<\/h2>\n<p>In recent years, webmail users have been <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0003-phishing\">sternly instructed<\/a> to <a href=\"https:\/\/www.wired.com\/2017\/03\/phishing-scams-fool-even-tech-nerds-heres-avoid\/\">pay perfect attention<\/a> to <a href=\"https:\/\/www.mcafee.com\/us\/threat-center\/resources\/security-tips-13-ways-to-protect-system.aspx\">every nuance of every email message<\/a>. They pledge <a href=\"http:\/\/www.phishing.org\/10-ways-to-avoid-phishing-scams\">not to open emails<\/a> from people they don\u2019t know. They say they won\u2019t <a href=\"https:\/\/ssd.eff.org\/en\/module\/how-avoid-phishing-attacks\">open attachments without careful vetting<\/a> first. Organizations <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/phishing-awareness-grows-but\/\">pay security companies to test<\/a> if their employees make good on these pledges. But phishing continues \u2013 and is <a href=\"https:\/\/www.scmagazine.com\/email-malware-phishing-and-spam-attempts-hit-new-highs-for-2017\/article\/680281\/\">becoming more common<\/a>.<\/p>\n<p>News coverage can make the issue even more confusing. The New York Times called the Democratic National Committee\u2019s email security breach <a href=\"https:\/\/www.nytimes.com\/2016\/12\/13\/us\/politics\/russia-hack-election-dnc.html\">somehow both \u201cbrazen\u201d and \u201cstealthy,\u201d<\/a> and pointed fingers at any number of possible problems \u2013 old network security equipment, sophisticated attackers, indifferent investigators and inattentive support staff \u2013 before revealing the weakness was really a busy user who acted \u201cwithout thinking much.\u201d<\/p>\n<p>But the real problem with webmail \u2013 the <a href=\"http:\/\/www.csoonline.com\/article\/2975807\/cyber-attacks-espionage\/phishing-is-a-37-million-annual-cost-for-average-large-company.html\">multi-million-dollar<\/a> security mistake \u2013 was the idea that if emails could be sent or received through a website, they could be more than just text, even webpages themselves, displayed by a web browser program. This mistake created the criminal phishing industry.<\/p>\n<h2>Engineered for danger<\/h2>\n<p>A web browser is the perfect tool for insecurity. Browsers are designed to <a href=\"https:\/\/www.theverge.com\/2017\/9\/7\/16257470\/little-snitch-connection-map-app-vpn-utility\">seamlessly mash together content<\/a> from multiple sources \u2013 text from one server, ads from another, images and video from a third, user-tracking \u201clike\u201d buttons from a fourth, and so on. A modern webpage is <a href=\"https:\/\/www.mozilla.org\/en-US\/lightbeam\/\">a patchwork of third-party sites<\/a>, which can number in the dozens. To make this assemblage of images, links and buttons appear unified and integrated, the browser doesn\u2019t show you where the pieces of a webpage come from \u2013 or where they\u2019ll lead if clicked. <\/p>\n<p>Worse, it allows webpages \u2013 and thereby emails \u2013 to lie about it. When you <a href=\"http:\/\/igoro.com\/archive\/what-really-happens-when-you-navigate-to-a-url\/\">type \u201cgoogle.com\u201d into your browser<\/a>, you can be reasonably sure you will get Google\u2019s page. But when you click a link or button labeled \u201cGoogle,\u201d are you actually heading to Google? Unless you carefully read the underlying HTML source of the email, there are a dozen ways your browser can be <a href=\"https:\/\/textslashplain.com\/2017\/01\/14\/the-line-of-death\/\">manipulated to trick you<\/a>.<\/p>\n<p>This is the opposite of security. Users can\u2019t predict the consequences of their actions, nor decide in advance if the potential results are acceptable. A perfectly safe link might be displayed right next to a malicious one, with no apparent difference between them. When a user is faced with a webpage and the decision to click on something, there is no reasonable way to know what might happen, or what company or other party the user will interact with as a result. By design, the browser hides this information. But at least, when browsing the web, you can choose to start at a trusted site; webmail, however, delivers an attacker-made webpage right into your mailbox!<\/p>\n<p>The only way to be sure of security in today\u2019s webmail environment is to learn the skills of a professional web developer. Only then will the layers of HTML, Javascript, and other code become clear; only then will the consequences of a click become known in advance. Of course, this is an unreasonable level of sophistication to require for users to protect themselves.<\/p>\n<p>Until software designers and developers fix browser software and webmail systems, and let users make informed decisions about where their clicks would lead them, we should follow the advice of C.A.R. Hoare, one of the early pioneers of computer security: \u201c<a href=\"https:\/\/www.cs.fsu.edu\/%7Eengelen\/courses\/COP4610\/hoare.pdf\">The price of reliability is the pursuit of the utmost simplicity<\/a>.\u201d<\/p>\n<h2>Safe email is plain-text email<\/h2>\n<p>Companies and other organizations are even more vulnerable than individuals. One person needs only to worry about his or her own clicking, but each worker in an organization is a separate point of weakness. It\u2019s a matter of simple math: If every worker has that same 1 percent chance of falling for a phishing scam, the <a href=\"http:\/\/www.statisticshowto.com\/what-is-a-bernoulli-trial\/\">combined risk to the company<\/a> as a whole is much higher. In fact, companies with 70 or more employees have a <a href=\"https:\/\/www.wolframalpha.com\/input\/?i=69+Bernoulli+trials+probability+0.01\">greater than 50 percent chance<\/a> that someone will be hoodwinked. Companies should look very critically at webmail providers who offer them worse security odds than they\u2019d get from a coin toss.<\/p>\n<p>As technologists, we have long since come to terms with the fact that some technology is just a bad idea, even if it looks exciting. Society needs to do the same. Security-conscious users must demand that their email providers offer a plain-text option. Unfortunately, such options are few and far between, but they are a key to stemming the webmail insecurity epidemic. <\/p>\n<p>Mail providers that refuse to do so should be avoided, just like back alleys that are bad places to conduct business. Those online back alleys may look eye-pleasing, with ads, images and animations, but they are not safe.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.edu.au\/content\/81434\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><em>This article was written in collaboration with cybersecurity researcher and developer <a href=\"http:\/\/blog.erratasec.com\/\">Robert Graham<\/a>.<\/em><\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/sergey-bratus-392060\">Sergey Bratus<\/a>, Research Associate Professor of Computer Science, <em><a href=\"http:\/\/theconversation.com\/institutions\/dartmouth-college-1720\">Dartmouth College<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/anna-shubina-403945\">Anna Shubina<\/a>, Post-doctoral Associate in Computer Science, <em><a href=\"http:\/\/theconversation.com\/institutions\/dartmouth-college-1720\">Dartmouth College<\/a><\/em><\/span><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>. Read the <a href=\"https:\/\/theconversation.com\/the-only-safe-email-is-text-only-email-81434\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sergey Bratus, Dartmouth College and Anna Shubina, Dartmouth College It\u2019s troubling to think that at any moment you might open an email that looks like it comes from your employer, a relative or your bank, only to fall for a phishing scam. Any one of the endless stream of innocent-looking emails you receive throughout the [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":9947,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[612,1521,3108,3109,3110,1634,3107],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/9946"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=9946"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/9946\/revisions"}],"predecessor-version":[{"id":9948,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/9946\/revisions\/9948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/9947"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=9946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=9946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=9946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}