Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform

Avatar
On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to send end-to-end encrypted (E2EE) to any user in any email inbox in a few clicks. The feature is rolling out starting today in beta, allowing users to send E2EE emails to Gmail users within an organization, with plans to send E2EE emails to any Gmail inbox in the coming weeks and to any email inbox

On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to send end-to-end encrypted (E2EE) to any user in any email inbox in a few clicks.

The feature is rolling out starting today in beta, allowing users to send E2EE emails to Gmail users within an organization, with plans to send E2EE emails to any Gmail inbox in the coming weeks and to any email inbox later this year.

What makes the new encryption model – an alternative to the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol – stand out is that it eliminates the need for senders or recipients to use custom software or exchange encryption certificates.

“This capability, requiring minimal efforts for both IT teams and end users, abstracts away the traditional IT complexity and substandard user experiences of existing solutions, while preserving enhanced data sovereignty, privacy, and security controls,” Google Workspace’s Johney Burke and Julien Duplant said.

The technology that powers E2EE emails is client-side encryption (CSE), which Google has already rolled out to Gmail and other services like Calendar, Drive, Docs, Slides, Sheets, and Meet.

Thus when an E2EE email is sent to another Gmail recipient, the message is automatically decrypted on the other end. In the case of a non-Gmail recipient (e.g., Microsoft Outlook), the Google email platform sends them an invitation to view the E2EE email in a restricted version of Gmail, which can be accessed via a guest Google Workspace account to securely view and respond to the message.

The fact that this is driven by CSE means that data gets encrypted on the client before it is transmitted or stored in Google’s cloud-based storage, thereby making it indecipherable to other third-party entities, including Google.

That said, one crucial difference between CSE and E2EE is that the clients use encryption keys that are generated and stored in a cloud-based key management service, thus allowing an organisation’s administrator to control the keys, revoke a user’s access to the keys, and even monitor encrypted files.

“First, at a structural level this approach offers more comprehensive encryption protection,” Burke and Deplane said. “It doesn’t matter who you send a message to, what email they are using, your message will be encrypted and you are in sole control. There’s just one set of keys, and you’re the only one who has them.”

“Second, it’s simple and easy to implement and use. It reduces friction for both IT teams and users, as no one has to be an encryption savant to make this work. It’ll save teams tons of time and money, and finally give them a path to what everyone craves: email encryption that is painless and just works.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

 The Hacker News 

Total
0
Shares
Previous Post

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing

Next Post

Russia tightens cybersecurity measures as financial fraud hits record high

Related Posts

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of "broken" pickle files to evade detection. "The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file," ReversingLabs researcher Karlo Zanki said in a report shared with The Hacker News. "
Avatar
Read More

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools. Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using a packer-as-a-service (PaaS
Avatar
Read More

Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool

As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. "Attackers can take control of a malicious server and read/write arbitrary files of any connected client," the CERT Coordination Center (CERT/CC) said in an advisory. "Sensitive data, such as SSH keys,
Avatar
Read More